Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 19:33
Static task
static1
Behavioral task
behavioral1
Sample
e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe
Resource
win10v2004-20220812-en
General
-
Target
e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe
-
Size
479KB
-
MD5
091b6e4511ae431c81e62025d55fa050
-
SHA1
474df2da9dd33141e6bc5c1554d363567a6b112b
-
SHA256
e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a
-
SHA512
1190ad1064d8b2413094a065efbdc9ff35adc97013b3e744f18d5a80d086271556fd4b665c3936503e43db30cd05dece2f95b87bdc4e8c25c181eae03a046900
-
SSDEEP
12288:MaocVmajhxkJgbswZpM/+FphU47WTI/2Sv7xww846I39:TVmajhsgAwvMGphUkWTvEKrmN
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 456 dGEkcphQ.exe 2512 HuQUooYA.exe 3732 CyEgEoME.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation dGEkcphQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dGEkcphQ.exe = "C:\\Users\\Admin\\YYsswcYw\\dGEkcphQ.exe" e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HuQUooYA.exe = "C:\\ProgramData\\EYwIYMgU\\HuQUooYA.exe" e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dGEkcphQ.exe = "C:\\Users\\Admin\\YYsswcYw\\dGEkcphQ.exe" dGEkcphQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HuQUooYA.exe = "C:\\ProgramData\\EYwIYMgU\\HuQUooYA.exe" HuQUooYA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HuQUooYA.exe = "C:\\ProgramData\\EYwIYMgU\\HuQUooYA.exe" CyEgEoME.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\YYsswcYw CyEgEoME.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\YYsswcYw\dGEkcphQ CyEgEoME.exe File created C:\Windows\SysWOW64\shell32.dll.exe dGEkcphQ.exe File opened for modification C:\Windows\SysWOW64\sheTestClose.wma dGEkcphQ.exe File opened for modification C:\Windows\SysWOW64\sheTraceLimit.docx dGEkcphQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2276 reg.exe 3408 reg.exe 4436 reg.exe 4412 reg.exe 4116 reg.exe 3924 reg.exe 3596 reg.exe 3160 reg.exe 2140 reg.exe 4032 reg.exe 3932 reg.exe 3600 reg.exe 3488 reg.exe 4112 reg.exe 4276 reg.exe 2052 reg.exe 4440 reg.exe 2440 reg.exe 4220 reg.exe 1884 reg.exe 928 reg.exe 4216 reg.exe 4988 reg.exe 1492 reg.exe 4152 reg.exe 5008 reg.exe 2448 reg.exe 1592 reg.exe 4808 reg.exe 2168 reg.exe 4744 reg.exe 4720 reg.exe 4956 reg.exe 4392 reg.exe 4412 reg.exe 4220 reg.exe 4432 reg.exe 756 reg.exe 4992 reg.exe 1888 reg.exe 1596 reg.exe 3180 reg.exe 4416 reg.exe 344 reg.exe 3648 reg.exe 4504 reg.exe 3268 reg.exe 1008 reg.exe 4272 reg.exe 2124 reg.exe 4408 reg.exe 5008 reg.exe 2664 reg.exe 4320 reg.exe 1112 reg.exe 4112 reg.exe 2152 reg.exe 2564 reg.exe 4616 reg.exe 2116 reg.exe 1320 reg.exe 4196 reg.exe 2824 reg.exe 4112 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 2104 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 2104 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 2104 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 2104 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4256 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4256 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4256 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4256 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 992 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 992 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 992 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 992 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4028 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4028 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4028 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4028 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4528 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4528 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4528 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4528 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 2312 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 2312 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 2312 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 2312 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 1032 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 1032 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 1032 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 1032 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4380 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4380 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4380 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4380 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 2140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 2140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 2140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 2140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4648 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4648 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4648 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 4648 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3884 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3884 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3884 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3884 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3304 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3304 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3304 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3304 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3900 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3900 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3900 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 3900 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 456 dGEkcphQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe 456 dGEkcphQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3444 wrote to memory of 456 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 80 PID 3444 wrote to memory of 456 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 80 PID 3444 wrote to memory of 456 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 80 PID 3444 wrote to memory of 2512 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 81 PID 3444 wrote to memory of 2512 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 81 PID 3444 wrote to memory of 2512 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 81 PID 3444 wrote to memory of 1056 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 83 PID 3444 wrote to memory of 1056 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 83 PID 3444 wrote to memory of 1056 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 83 PID 3444 wrote to memory of 4412 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 85 PID 3444 wrote to memory of 4412 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 85 PID 3444 wrote to memory of 4412 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 85 PID 3444 wrote to memory of 4440 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 89 PID 3444 wrote to memory of 4440 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 89 PID 3444 wrote to memory of 4440 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 89 PID 1056 wrote to memory of 4140 1056 cmd.exe 86 PID 1056 wrote to memory of 4140 1056 cmd.exe 86 PID 1056 wrote to memory of 4140 1056 cmd.exe 86 PID 3444 wrote to memory of 5088 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 88 PID 3444 wrote to memory of 5088 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 88 PID 3444 wrote to memory of 5088 3444 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 88 PID 4140 wrote to memory of 2064 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 92 PID 4140 wrote to memory of 2064 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 92 PID 4140 wrote to memory of 2064 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 92 PID 2064 wrote to memory of 1960 2064 cmd.exe 94 PID 2064 wrote to memory of 1960 2064 cmd.exe 94 PID 2064 wrote to memory of 1960 2064 cmd.exe 94 PID 4140 wrote to memory of 4112 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 95 PID 4140 wrote to memory of 4112 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 95 PID 4140 wrote to memory of 4112 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 95 PID 4140 wrote to memory of 4408 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 97 PID 4140 wrote to memory of 4408 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 97 PID 4140 wrote to memory of 4408 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 97 PID 4140 wrote to memory of 228 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 98 PID 4140 wrote to memory of 228 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 98 PID 4140 wrote to memory of 228 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 98 PID 4140 wrote to memory of 2372 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 99 PID 4140 wrote to memory of 2372 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 99 PID 4140 wrote to memory of 2372 4140 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 99 PID 1960 wrote to memory of 3640 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 103 PID 1960 wrote to memory of 3640 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 103 PID 1960 wrote to memory of 3640 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 103 PID 1960 wrote to memory of 3924 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 105 PID 1960 wrote to memory of 3924 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 105 PID 1960 wrote to memory of 3924 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 105 PID 1960 wrote to memory of 3556 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 113 PID 1960 wrote to memory of 3556 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 113 PID 1960 wrote to memory of 3556 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 113 PID 1960 wrote to memory of 2676 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 111 PID 1960 wrote to memory of 2676 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 111 PID 1960 wrote to memory of 2676 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 111 PID 2372 wrote to memory of 2884 2372 cmd.exe 106 PID 2372 wrote to memory of 2884 2372 cmd.exe 106 PID 2372 wrote to memory of 2884 2372 cmd.exe 106 PID 1960 wrote to memory of 3948 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 109 PID 1960 wrote to memory of 3948 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 109 PID 1960 wrote to memory of 3948 1960 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 109 PID 3948 wrote to memory of 4304 3948 cmd.exe 115 PID 3948 wrote to memory of 4304 3948 cmd.exe 115 PID 3948 wrote to memory of 4304 3948 cmd.exe 115 PID 3640 wrote to memory of 2104 3640 cmd.exe 114 PID 3640 wrote to memory of 2104 3640 cmd.exe 114 PID 3640 wrote to memory of 2104 3640 cmd.exe 114 PID 2104 wrote to memory of 4016 2104 e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe 116 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe"C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\YYsswcYw\dGEkcphQ.exe"C:\Users\Admin\YYsswcYw\dGEkcphQ.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:456
-
-
C:\ProgramData\EYwIYMgU\HuQUooYA.exe"C:\ProgramData\EYwIYMgU\HuQUooYA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"2⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"4⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"6⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"8⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"10⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a11⤵
- Suspicious behavior: EnumeratesProcesses
PID:992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"12⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"14⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"16⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"18⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"20⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"22⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"24⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"26⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"28⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"30⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"32⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a33⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"34⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a35⤵PID:2540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"36⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a37⤵PID:4756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"38⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a39⤵PID:1632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"40⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a41⤵PID:2556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"42⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a43⤵PID:1192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"44⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a45⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"46⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a47⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"48⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a49⤵PID:4744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"50⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a51⤵PID:4676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"52⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a53⤵PID:2556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"54⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a55⤵PID:2372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"56⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a57⤵PID:3388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"58⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a59⤵PID:5056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"60⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a61⤵PID:1452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"62⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a63⤵PID:4304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"64⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a65⤵
- Modifies visibility of file extensions in Explorer
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"66⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a67⤵PID:3696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"68⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a69⤵PID:3600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"70⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a71⤵PID:3232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"72⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:400 -
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a73⤵PID:3428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"74⤵PID:5064
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵
- Modifies visibility of file extensions in Explorer
PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a75⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"76⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a77⤵PID:1836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"78⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a79⤵PID:4732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"80⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a81⤵PID:4028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"82⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a83⤵PID:5084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"84⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a85⤵PID:5060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"86⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a87⤵PID:1444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"88⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a89⤵PID:1456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"90⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a91⤵PID:3388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"92⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a93⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"94⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a95⤵PID:3968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"96⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a97⤵PID:440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"98⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a99⤵PID:3856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"100⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a101⤵PID:2300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"102⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a103⤵PID:1072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"104⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a105⤵PID:3916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"106⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a107⤵PID:3152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"108⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a109⤵PID:2276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"110⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a111⤵PID:2624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"112⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a113⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"114⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a115⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"116⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a117⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"118⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a119⤵PID:2392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"120⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a.exeC:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a121⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e89450b226086995c372afd2b8457467d63c71a6cbde91ba3ea142bede85404a"122⤵PID:4396
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-