Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2023 07:43
Static task
static1
Behavioral task
behavioral1
Sample
9951030ee369c5exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
9951030ee369c5exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
9951030ee369c5exeexeexeex.exe
-
Size
194KB
-
MD5
9951030ee369c5c7b83d2f7ccdb715df
-
SHA1
4947ce5b34a05d2e4bb3864c18480694b1ebcd3a
-
SHA256
cc9acb4031ffb7d3ee760932d3f0335af8da8927e0aa35364673d2500c1627ad
-
SHA512
1a6d34970d403216a656f91a1de55d43c355986c619062d9e0ef4534c31f9224aed76118d5cfda2fa011f1590f125c980931002a7b32740598057a9f2243244e
-
SSDEEP
3072:JrZhb8TaB3pZkOrLhMDhZRRHAavbDbuz+B7:J9h75G8LhMXsE
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" wmiprvse.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 40 2600 cscript.exe 43 2600 cscript.exe 47 2600 cscript.exe 48 2600 cscript.exe 50 2600 cscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation PgYEoUks.exe -
Executes dropped EXE 2 IoCs
pid Process 3296 fWgsIgEU.exe 2744 PgYEoUks.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fWgsIgEU.exe = "C:\\Users\\Admin\\LGsEMEok\\fWgsIgEU.exe" 9951030ee369c5exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PgYEoUks.exe = "C:\\ProgramData\\DeMIIMAc\\PgYEoUks.exe" 9951030ee369c5exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PgYEoUks.exe = "C:\\ProgramData\\DeMIIMAc\\PgYEoUks.exe" PgYEoUks.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fWgsIgEU.exe = "C:\\Users\\Admin\\LGsEMEok\\fWgsIgEU.exe" fWgsIgEU.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9951030ee369c5exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell32.dll.exe PgYEoUks.exe File created C:\Windows\SysWOW64\shell32.dll.exe PgYEoUks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4828 reg.exe 4228 Process not Found 4252 reg.exe 1240 reg.exe 2188 reg.exe 644 reg.exe 1904 reg.exe 4748 reg.exe 2592 reg.exe 4000 reg.exe 1492 reg.exe 4580 reg.exe 3580 reg.exe 1476 reg.exe 4028 reg.exe 4188 reg.exe 368 reg.exe 4076 reg.exe 3752 reg.exe 1136 reg.exe 3756 reg.exe 928 reg.exe 2564 reg.exe 4952 reg.exe 4848 reg.exe 2936 reg.exe 1428 reg.exe 568 reg.exe 4992 reg.exe 4028 reg.exe 1668 reg.exe 3524 reg.exe 3988 reg.exe 4188 reg.exe 1212 reg.exe 4980 reg.exe 2712 reg.exe 1460 reg.exe 4272 reg.exe 2736 reg.exe 4580 reg.exe 640 reg.exe 1492 reg.exe 2704 reg.exe 3596 reg.exe 4776 reg.exe 2876 reg.exe 1360 reg.exe 696 reg.exe 3168 reg.exe 1044 reg.exe 1732 reg.exe 4896 reg.exe 4860 reg.exe 1532 reg.exe 4228 reg.exe 4812 Process not Found 3740 reg.exe 2552 reg.exe 3576 reg.exe 1120 reg.exe 2864 reg.exe 5028 reg.exe 2596 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3288 9951030ee369c5exeexeexeex.exe 3288 9951030ee369c5exeexeexeex.exe 3288 9951030ee369c5exeexeexeex.exe 3288 9951030ee369c5exeexeexeex.exe 3336 9951030ee369c5exeexeexeex.exe 3336 9951030ee369c5exeexeexeex.exe 3336 9951030ee369c5exeexeexeex.exe 3336 9951030ee369c5exeexeexeex.exe 1920 9951030ee369c5exeexeexeex.exe 1920 9951030ee369c5exeexeexeex.exe 1920 9951030ee369c5exeexeexeex.exe 1920 9951030ee369c5exeexeexeex.exe 4440 9951030ee369c5exeexeexeex.exe 4440 9951030ee369c5exeexeexeex.exe 4440 9951030ee369c5exeexeexeex.exe 4440 9951030ee369c5exeexeexeex.exe 3124 reg.exe 3124 reg.exe 3124 reg.exe 3124 reg.exe 4616 9951030ee369c5exeexeexeex.exe 4616 9951030ee369c5exeexeexeex.exe 4616 9951030ee369c5exeexeexeex.exe 4616 9951030ee369c5exeexeexeex.exe 928 cmd.exe 928 cmd.exe 928 cmd.exe 928 cmd.exe 4988 Conhost.exe 4988 Conhost.exe 4988 Conhost.exe 4988 Conhost.exe 2084 9951030ee369c5exeexeexeex.exe 2084 9951030ee369c5exeexeexeex.exe 2084 9951030ee369c5exeexeexeex.exe 2084 9951030ee369c5exeexeexeex.exe 4260 9951030ee369c5exeexeexeex.exe 4260 9951030ee369c5exeexeexeex.exe 4260 9951030ee369c5exeexeexeex.exe 4260 9951030ee369c5exeexeexeex.exe 4820 9951030ee369c5exeexeexeex.exe 4820 9951030ee369c5exeexeexeex.exe 4820 9951030ee369c5exeexeexeex.exe 4820 9951030ee369c5exeexeexeex.exe 4680 Conhost.exe 4680 Conhost.exe 4680 Conhost.exe 4680 Conhost.exe 2100 9951030ee369c5exeexeexeex.exe 2100 9951030ee369c5exeexeexeex.exe 2100 9951030ee369c5exeexeexeex.exe 2100 9951030ee369c5exeexeexeex.exe 2148 9951030ee369c5exeexeexeex.exe 2148 9951030ee369c5exeexeexeex.exe 2148 9951030ee369c5exeexeexeex.exe 2148 9951030ee369c5exeexeexeex.exe 2528 9951030ee369c5exeexeexeex.exe 2528 9951030ee369c5exeexeexeex.exe 2528 9951030ee369c5exeexeexeex.exe 2528 9951030ee369c5exeexeexeex.exe 4100 9951030ee369c5exeexeexeex.exe 4100 9951030ee369c5exeexeexeex.exe 4100 9951030ee369c5exeexeexeex.exe 4100 9951030ee369c5exeexeexeex.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 PgYEoUks.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe 2744 PgYEoUks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3288 wrote to memory of 3296 3288 9951030ee369c5exeexeexeex.exe 85 PID 3288 wrote to memory of 3296 3288 9951030ee369c5exeexeexeex.exe 85 PID 3288 wrote to memory of 3296 3288 9951030ee369c5exeexeexeex.exe 85 PID 3288 wrote to memory of 2744 3288 9951030ee369c5exeexeexeex.exe 86 PID 3288 wrote to memory of 2744 3288 9951030ee369c5exeexeexeex.exe 86 PID 3288 wrote to memory of 2744 3288 9951030ee369c5exeexeexeex.exe 86 PID 3288 wrote to memory of 952 3288 9951030ee369c5exeexeexeex.exe 87 PID 3288 wrote to memory of 952 3288 9951030ee369c5exeexeexeex.exe 87 PID 3288 wrote to memory of 952 3288 9951030ee369c5exeexeexeex.exe 87 PID 3288 wrote to memory of 4260 3288 9951030ee369c5exeexeexeex.exe 89 PID 3288 wrote to memory of 4260 3288 9951030ee369c5exeexeexeex.exe 89 PID 3288 wrote to memory of 4260 3288 9951030ee369c5exeexeexeex.exe 89 PID 3288 wrote to memory of 1136 3288 9951030ee369c5exeexeexeex.exe 93 PID 3288 wrote to memory of 1136 3288 9951030ee369c5exeexeexeex.exe 93 PID 3288 wrote to memory of 1136 3288 9951030ee369c5exeexeexeex.exe 93 PID 3288 wrote to memory of 4476 3288 9951030ee369c5exeexeexeex.exe 92 PID 3288 wrote to memory of 4476 3288 9951030ee369c5exeexeexeex.exe 92 PID 3288 wrote to memory of 4476 3288 9951030ee369c5exeexeexeex.exe 92 PID 3288 wrote to memory of 1564 3288 9951030ee369c5exeexeexeex.exe 90 PID 3288 wrote to memory of 1564 3288 9951030ee369c5exeexeexeex.exe 90 PID 3288 wrote to memory of 1564 3288 9951030ee369c5exeexeexeex.exe 90 PID 952 wrote to memory of 3336 952 cmd.exe 97 PID 952 wrote to memory of 3336 952 cmd.exe 97 PID 952 wrote to memory of 3336 952 cmd.exe 97 PID 1564 wrote to memory of 1716 1564 cmd.exe 98 PID 1564 wrote to memory of 1716 1564 cmd.exe 98 PID 1564 wrote to memory of 1716 1564 cmd.exe 98 PID 3336 wrote to memory of 5024 3336 9951030ee369c5exeexeexeex.exe 99 PID 3336 wrote to memory of 5024 3336 9951030ee369c5exeexeexeex.exe 99 PID 3336 wrote to memory of 5024 3336 9951030ee369c5exeexeexeex.exe 99 PID 5024 wrote to memory of 1920 5024 cmd.exe 101 PID 5024 wrote to memory of 1920 5024 cmd.exe 101 PID 5024 wrote to memory of 1920 5024 cmd.exe 101 PID 3336 wrote to memory of 1904 3336 9951030ee369c5exeexeexeex.exe 109 PID 3336 wrote to memory of 1904 3336 9951030ee369c5exeexeexeex.exe 109 PID 3336 wrote to memory of 1904 3336 9951030ee369c5exeexeexeex.exe 109 PID 3336 wrote to memory of 2492 3336 9951030ee369c5exeexeexeex.exe 108 PID 3336 wrote to memory of 2492 3336 9951030ee369c5exeexeexeex.exe 108 PID 3336 wrote to memory of 2492 3336 9951030ee369c5exeexeexeex.exe 108 PID 3336 wrote to memory of 3636 3336 9951030ee369c5exeexeexeex.exe 107 PID 3336 wrote to memory of 3636 3336 9951030ee369c5exeexeexeex.exe 107 PID 3336 wrote to memory of 3636 3336 9951030ee369c5exeexeexeex.exe 107 PID 3336 wrote to memory of 3896 3336 9951030ee369c5exeexeexeex.exe 102 PID 3336 wrote to memory of 3896 3336 9951030ee369c5exeexeexeex.exe 102 PID 3336 wrote to memory of 3896 3336 9951030ee369c5exeexeexeex.exe 102 PID 3896 wrote to memory of 4708 3896 cmd.exe 110 PID 3896 wrote to memory of 4708 3896 cmd.exe 110 PID 3896 wrote to memory of 4708 3896 cmd.exe 110 PID 1920 wrote to memory of 1652 1920 9951030ee369c5exeexeexeex.exe 111 PID 1920 wrote to memory of 1652 1920 9951030ee369c5exeexeexeex.exe 111 PID 1920 wrote to memory of 1652 1920 9951030ee369c5exeexeexeex.exe 111 PID 1920 wrote to memory of 2556 1920 9951030ee369c5exeexeexeex.exe 119 PID 1920 wrote to memory of 2556 1920 9951030ee369c5exeexeexeex.exe 119 PID 1920 wrote to memory of 2556 1920 9951030ee369c5exeexeexeex.exe 119 PID 1920 wrote to memory of 2552 1920 9951030ee369c5exeexeexeex.exe 118 PID 1920 wrote to memory of 2552 1920 9951030ee369c5exeexeexeex.exe 118 PID 1920 wrote to memory of 2552 1920 9951030ee369c5exeexeexeex.exe 118 PID 1920 wrote to memory of 456 1920 9951030ee369c5exeexeexeex.exe 117 PID 1920 wrote to memory of 456 1920 9951030ee369c5exeexeexeex.exe 117 PID 1920 wrote to memory of 456 1920 9951030ee369c5exeexeexeex.exe 117 PID 1920 wrote to memory of 4296 1920 9951030ee369c5exeexeexeex.exe 116 PID 1920 wrote to memory of 4296 1920 9951030ee369c5exeexeexeex.exe 116 PID 1920 wrote to memory of 4296 1920 9951030ee369c5exeexeexeex.exe 116 PID 1652 wrote to memory of 4440 1652 cmd.exe 121 -
System policy modification 1 TTPs 50 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9951030ee369c5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9951030ee369c5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9951030ee369c5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9951030ee369c5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9951030ee369c5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9951030ee369c5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9951030ee369c5exeexeexeex.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\LGsEMEok\fWgsIgEU.exe"C:\Users\Admin\LGsEMEok\fWgsIgEU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3296
-
-
C:\ProgramData\DeMIIMAc\PgYEoUks.exe"C:\ProgramData\DeMIIMAc\PgYEoUks.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"6⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"8⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex9⤵PID:3124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"10⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"12⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex13⤵PID:928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"14⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex15⤵PID:4988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"16⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"18⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"20⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"22⤵PID:396
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV123⤵PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex23⤵PID:4680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"24⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"26⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"28⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"30⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"32⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex33⤵PID:1732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"34⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex35⤵PID:3720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"36⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex37⤵PID:1428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"38⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex39⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"40⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex41⤵PID:3464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"42⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex43⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"44⤵PID:856
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵
- UAC bypass
PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex45⤵PID:820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"46⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex47⤵PID:3764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"48⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex49⤵
- Modifies visibility of file extensions in Explorer
PID:2568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"50⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex51⤵PID:2204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"52⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex53⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"54⤵PID:2872
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵
- Modifies visibility of file extensions in Explorer
PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex55⤵
- Modifies visibility of file extensions in Explorer
PID:4000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"56⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex57⤵PID:3924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"58⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex59⤵PID:2732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"60⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex61⤵PID:1908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"62⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex63⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"64⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex65⤵PID:4948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"66⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex67⤵PID:2660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"68⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex69⤵PID:1208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"70⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex71⤵PID:4680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"72⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex73⤵PID:1904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"74⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex75⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"76⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex77⤵PID:1564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"78⤵
- Checks whether UAC is enabled
- System policy modification
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex79⤵PID:4048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"80⤵PID:1492
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex81⤵PID:2204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"82⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex83⤵PID:1672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"84⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex85⤵PID:5020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"86⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex87⤵PID:3492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"88⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex89⤵PID:2568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"90⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex91⤵PID:1032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"92⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex93⤵PID:2100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"94⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex95⤵PID:4044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"96⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex97⤵PID:4460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"98⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex99⤵PID:644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"100⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex101⤵
- Checks whether UAC is enabled
- System policy modification
PID:3580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"102⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex103⤵PID:1716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"104⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex105⤵PID:3340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"106⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex107⤵PID:1580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"108⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex109⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"110⤵PID:696
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex111⤵PID:772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"112⤵PID:1044
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex113⤵PID:3976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"114⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex115⤵PID:4648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"116⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex117⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"118⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex119⤵PID:1028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"120⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex121⤵PID:772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"122⤵PID:1652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-