Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
993d2674077cd5exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
993d2674077cd5exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
993d2674077cd5exeexeexeex.exe
-
Size
201KB
-
MD5
993d2674077cd569f2ea3cc2b72e8974
-
SHA1
dfcaf4adb3f29638ed75d5ec50c78b65767f16b7
-
SHA256
813461a3a081432c973b8fb35dbd0228b90432ff57c6235f99a0c854cf866f6f
-
SHA512
255af30f8a5d8ad479344fc28bbddd057c784ebb3ed60d09ad5b40de904d5a0b80255a228890cbff7b132698ec1dbc075b1ebfa0873fdc6aa043047b10c46d1c
-
SSDEEP
3072:k7rDRbCM0PPrC5l0MlhWz5wTS1F8WKv0DLyH7qIpVjoJDD+5qxAYUzyGxxizXjNH:4HVC7W12FhKsaGOiDBxAxhxxizN
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sihclient.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation xaMcwwYU.exe -
Executes dropped EXE 2 IoCs
pid Process 5036 xaMcwwYU.exe 2752 EgooQIMk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaMcwwYU.exe = "C:\\Users\\Admin\\uCcEIEgg\\xaMcwwYU.exe" xaMcwwYU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\EgooQIMk.exe = "C:\\ProgramData\\BgUYMIss\\EgooQIMk.exe" EgooQIMk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaMcwwYU.exe = "C:\\Users\\Admin\\uCcEIEgg\\xaMcwwYU.exe" 993d2674077cd5exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\EgooQIMk.exe = "C:\\ProgramData\\BgUYMIss\\EgooQIMk.exe" 993d2674077cd5exeexeexeex.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 993d2674077cd5exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 993d2674077cd5exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe xaMcwwYU.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe xaMcwwYU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1140 reg.exe 1848 reg.exe 1068 reg.exe 1608 reg.exe 3928 reg.exe 224 reg.exe 4012 reg.exe 1724 reg.exe 4768 reg.exe 4636 reg.exe 3052 reg.exe 4444 reg.exe 1724 reg.exe 3052 reg.exe 3224 reg.exe 4768 reg.exe 4432 reg.exe 2780 reg.exe 936 reg.exe 2200 reg.exe 4676 reg.exe 2944 reg.exe 3292 reg.exe 3344 reg.exe 776 reg.exe 1804 reg.exe 1108 reg.exe 4532 reg.exe 1804 reg.exe 4236 reg.exe 2920 reg.exe 5116 reg.exe 2368 reg.exe 3040 reg.exe 1804 reg.exe 2520 reg.exe 1192 reg.exe 3852 reg.exe 4804 reg.exe 2952 reg.exe 808 reg.exe 3852 reg.exe 2652 reg.exe 1660 reg.exe 1084 reg.exe 3688 reg.exe 4688 reg.exe 3340 reg.exe 584 reg.exe 3880 reg.exe 4740 reg.exe 752 reg.exe 1956 reg.exe 772 reg.exe 1016 reg.exe 4392 reg.exe 1828 reg.exe 4368 reg.exe 1296 reg.exe 3192 reg.exe 4224 reg.exe 1992 reg.exe 3620 reg.exe 4524 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 208 993d2674077cd5exeexeexeex.exe 208 993d2674077cd5exeexeexeex.exe 208 993d2674077cd5exeexeexeex.exe 208 993d2674077cd5exeexeexeex.exe 4432 993d2674077cd5exeexeexeex.exe 4432 993d2674077cd5exeexeexeex.exe 4432 993d2674077cd5exeexeexeex.exe 4432 993d2674077cd5exeexeexeex.exe 2428 cmd.exe 2428 cmd.exe 2428 cmd.exe 2428 cmd.exe 764 reg.exe 764 reg.exe 764 reg.exe 764 reg.exe 3016 993d2674077cd5exeexeexeex.exe 3016 993d2674077cd5exeexeexeex.exe 3016 993d2674077cd5exeexeexeex.exe 3016 993d2674077cd5exeexeexeex.exe 2804 Conhost.exe 2804 Conhost.exe 2804 Conhost.exe 2804 Conhost.exe 4536 993d2674077cd5exeexeexeex.exe 4536 993d2674077cd5exeexeexeex.exe 4536 993d2674077cd5exeexeexeex.exe 4536 993d2674077cd5exeexeexeex.exe 2116 Conhost.exe 2116 Conhost.exe 2116 Conhost.exe 2116 Conhost.exe 3076 Conhost.exe 3076 Conhost.exe 3076 Conhost.exe 3076 Conhost.exe 1660 993d2674077cd5exeexeexeex.exe 1660 993d2674077cd5exeexeexeex.exe 1660 993d2674077cd5exeexeexeex.exe 1660 993d2674077cd5exeexeexeex.exe 1956 993d2674077cd5exeexeexeex.exe 1956 993d2674077cd5exeexeexeex.exe 1956 993d2674077cd5exeexeexeex.exe 1956 993d2674077cd5exeexeexeex.exe 1608 993d2674077cd5exeexeexeex.exe 1608 993d2674077cd5exeexeexeex.exe 1608 993d2674077cd5exeexeexeex.exe 1608 993d2674077cd5exeexeexeex.exe 2860 cmd.exe 2860 cmd.exe 2860 cmd.exe 2860 cmd.exe 3400 Conhost.exe 3400 Conhost.exe 3400 Conhost.exe 3400 Conhost.exe 2000 reg.exe 2000 reg.exe 2000 reg.exe 2000 reg.exe 3904 reg.exe 3904 reg.exe 3904 reg.exe 3904 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5036 xaMcwwYU.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe 5036 xaMcwwYU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 208 wrote to memory of 5036 208 993d2674077cd5exeexeexeex.exe 83 PID 208 wrote to memory of 5036 208 993d2674077cd5exeexeexeex.exe 83 PID 208 wrote to memory of 5036 208 993d2674077cd5exeexeexeex.exe 83 PID 208 wrote to memory of 2752 208 993d2674077cd5exeexeexeex.exe 84 PID 208 wrote to memory of 2752 208 993d2674077cd5exeexeexeex.exe 84 PID 208 wrote to memory of 2752 208 993d2674077cd5exeexeexeex.exe 84 PID 208 wrote to memory of 4376 208 993d2674077cd5exeexeexeex.exe 85 PID 208 wrote to memory of 4376 208 993d2674077cd5exeexeexeex.exe 85 PID 208 wrote to memory of 4376 208 993d2674077cd5exeexeexeex.exe 85 PID 208 wrote to memory of 2716 208 993d2674077cd5exeexeexeex.exe 87 PID 208 wrote to memory of 2716 208 993d2674077cd5exeexeexeex.exe 87 PID 208 wrote to memory of 2716 208 993d2674077cd5exeexeexeex.exe 87 PID 208 wrote to memory of 4368 208 993d2674077cd5exeexeexeex.exe 90 PID 208 wrote to memory of 4368 208 993d2674077cd5exeexeexeex.exe 90 PID 208 wrote to memory of 4368 208 993d2674077cd5exeexeexeex.exe 90 PID 208 wrote to memory of 2944 208 993d2674077cd5exeexeexeex.exe 88 PID 208 wrote to memory of 2944 208 993d2674077cd5exeexeexeex.exe 88 PID 208 wrote to memory of 2944 208 993d2674077cd5exeexeexeex.exe 88 PID 208 wrote to memory of 4560 208 993d2674077cd5exeexeexeex.exe 89 PID 208 wrote to memory of 4560 208 993d2674077cd5exeexeexeex.exe 89 PID 208 wrote to memory of 4560 208 993d2674077cd5exeexeexeex.exe 89 PID 4376 wrote to memory of 4432 4376 cmd.exe 94 PID 4376 wrote to memory of 4432 4376 cmd.exe 94 PID 4376 wrote to memory of 4432 4376 cmd.exe 94 PID 4560 wrote to memory of 2912 4560 cmd.exe 96 PID 4560 wrote to memory of 2912 4560 cmd.exe 96 PID 4560 wrote to memory of 2912 4560 cmd.exe 96 PID 4432 wrote to memory of 3764 4432 993d2674077cd5exeexeexeex.exe 97 PID 4432 wrote to memory of 3764 4432 993d2674077cd5exeexeexeex.exe 97 PID 4432 wrote to memory of 3764 4432 993d2674077cd5exeexeexeex.exe 97 PID 4432 wrote to memory of 4768 4432 993d2674077cd5exeexeexeex.exe 102 PID 4432 wrote to memory of 4768 4432 993d2674077cd5exeexeexeex.exe 102 PID 4432 wrote to memory of 4768 4432 993d2674077cd5exeexeexeex.exe 102 PID 4432 wrote to memory of 4048 4432 993d2674077cd5exeexeexeex.exe 101 PID 4432 wrote to memory of 4048 4432 993d2674077cd5exeexeexeex.exe 101 PID 4432 wrote to memory of 4048 4432 993d2674077cd5exeexeexeex.exe 101 PID 4432 wrote to memory of 4736 4432 993d2674077cd5exeexeexeex.exe 100 PID 4432 wrote to memory of 4736 4432 993d2674077cd5exeexeexeex.exe 100 PID 4432 wrote to memory of 4736 4432 993d2674077cd5exeexeexeex.exe 100 PID 4432 wrote to memory of 3076 4432 993d2674077cd5exeexeexeex.exe 99 PID 4432 wrote to memory of 3076 4432 993d2674077cd5exeexeexeex.exe 99 PID 4432 wrote to memory of 3076 4432 993d2674077cd5exeexeexeex.exe 99 PID 3764 wrote to memory of 2428 3764 cmd.exe 107 PID 3764 wrote to memory of 2428 3764 cmd.exe 107 PID 3764 wrote to memory of 2428 3764 cmd.exe 107 PID 3076 wrote to memory of 4408 3076 cmd.exe 108 PID 3076 wrote to memory of 4408 3076 cmd.exe 108 PID 3076 wrote to memory of 4408 3076 cmd.exe 108 PID 2428 wrote to memory of 1496 2428 cmd.exe 191 PID 2428 wrote to memory of 1496 2428 cmd.exe 191 PID 2428 wrote to memory of 1496 2428 cmd.exe 191 PID 2428 wrote to memory of 1296 2428 cmd.exe 111 PID 2428 wrote to memory of 1296 2428 cmd.exe 111 PID 2428 wrote to memory of 1296 2428 cmd.exe 111 PID 2428 wrote to memory of 1428 2428 cmd.exe 112 PID 2428 wrote to memory of 1428 2428 cmd.exe 112 PID 2428 wrote to memory of 1428 2428 cmd.exe 112 PID 2428 wrote to memory of 1840 2428 cmd.exe 118 PID 2428 wrote to memory of 1840 2428 cmd.exe 118 PID 2428 wrote to memory of 1840 2428 cmd.exe 118 PID 2428 wrote to memory of 2368 2428 cmd.exe 113 PID 2428 wrote to memory of 2368 2428 cmd.exe 113 PID 2428 wrote to memory of 2368 2428 cmd.exe 113 PID 1496 wrote to memory of 764 1496 Conhost.exe 186 -
System policy modification 1 TTPs 32 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 993d2674077cd5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 993d2674077cd5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 993d2674077cd5exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 993d2674077cd5exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\uCcEIEgg\xaMcwwYU.exe"C:\Users\Admin\uCcEIEgg\xaMcwwYU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:5036
-
-
C:\ProgramData\BgUYMIss\EgooQIMk.exe"C:\ProgramData\BgUYMIss\EgooQIMk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2752
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex5⤵PID:2428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"6⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex7⤵PID:764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"8⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"10⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex11⤵PID:2804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"12⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"14⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex15⤵PID:2116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"16⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex17⤵PID:3076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"18⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"20⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex21⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"22⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"24⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex25⤵PID:2860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"26⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex27⤵PID:3400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"28⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex29⤵PID:2000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"30⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex31⤵PID:3904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"32⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex33⤵PID:3008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"34⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex35⤵PID:4376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"36⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex37⤵PID:3256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"38⤵PID:1632
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex39⤵PID:1220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"40⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex41⤵PID:2200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"42⤵PID:724
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex43⤵PID:1192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"44⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex45⤵PID:2572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"46⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex47⤵PID:1720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"48⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex49⤵PID:4784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"50⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex51⤵PID:4632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"52⤵PID:496
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex53⤵PID:4212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"54⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex55⤵PID:2952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"56⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex57⤵PID:704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"58⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex59⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"60⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex61⤵PID:5068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"62⤵
- Modifies visibility of file extensions in Explorer
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex63⤵PID:4860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"64⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex65⤵PID:4948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"66⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex67⤵PID:752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"68⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex69⤵PID:3960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"70⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex71⤵PID:4640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"72⤵
- Modifies visibility of file extensions in Explorer
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex73⤵PID:4072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"74⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex75⤵PID:444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"76⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex77⤵PID:2944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"78⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex79⤵PID:840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"80⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex81⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"82⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex83⤵PID:1300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"84⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex85⤵PID:3816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"86⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex87⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"88⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex89⤵PID:3292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"90⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex91⤵PID:4952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"92⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex93⤵PID:2052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"94⤵PID:4540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex95⤵PID:224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"96⤵PID:1712
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex97⤵PID:2816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"98⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex99⤵PID:5060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"100⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex101⤵PID:1092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"102⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex103⤵PID:3848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"104⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex105⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"106⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex107⤵PID:4640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"108⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex109⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"110⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex111⤵PID:3912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"112⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex113⤵PID:2652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"114⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex115⤵PID:244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"116⤵PID:1948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵
- Modifies visibility of file extensions in Explorer
PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex117⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"118⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex119⤵PID:1992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"120⤵PID:3720
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵
- UAC bypass
PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex121⤵PID:1144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"122⤵PID:3248
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-