Analysis
-
max time kernel
16s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2023 06:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e4d99b4c2398c9exeexeexeex.exe
Resource
win7-20230703-en
windows7-x64
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
e4d99b4c2398c9exeexeexeex.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
e4d99b4c2398c9exeexeexeex.exe
-
Size
189KB
-
MD5
e4d99b4c2398c93b1f2b10e2654f6a16
-
SHA1
4fae6d358c1c12e60734d7af63d4e00aad92b751
-
SHA256
641130fcae1b019622ed1c9711c7cd6888cee2006e9393dd19d9bf17563c3a4a
-
SHA512
0a938b6a5df7139907ea4d866cd47493f9e362ee2bb63780dce5dd3be463d78dd14a070cfe5a16f76762789803fe999726e964914d425d9cbd923efbc723c32b
-
SSDEEP
3072:SH06xfl/ijOsiekvgU3o3pjrgkNVZIJmWcoINr6Akl8oefTwKeEWPPrg0:IXvgU30pnV2JmWcoINr6Akl8oEwKeBLT
Score
10/10
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 42 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" e4d99b4c2398c9exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" e4d99b4c2398c9exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e4d99b4c2398c9exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e4d99b4c2398c9exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e4d99b4c2398c9exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 4256 yswcMwss.exe 3320 IAkMsQQE.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yswcMwss.exe = "C:\\Users\\Admin\\MMksoswg\\yswcMwss.exe" e4d99b4c2398c9exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\IAkMsQQE.exe = "C:\\ProgramData\\QAUgkMsg\\IAkMsQQE.exe" e4d99b4c2398c9exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yswcMwss.exe = "C:\\Users\\Admin\\MMksoswg\\yswcMwss.exe" yswcMwss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\IAkMsQQE.exe = "C:\\ProgramData\\QAUgkMsg\\IAkMsQQE.exe" IAkMsQQE.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e4d99b4c2398c9exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e4d99b4c2398c9exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e4d99b4c2398c9exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e4d99b4c2398c9exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e4d99b4c2398c9exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e4d99b4c2398c9exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Kills process with taskkill 2 IoCs
pid Process 3280 taskkill.exe 4832 taskkill.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2432 reg.exe 4860 reg.exe 3280 reg.exe 4492 reg.exe 5032 reg.exe 2124 reg.exe 464 reg.exe 4408 reg.exe 3292 reg.exe 5032 reg.exe 1588 reg.exe 2916 reg.exe 3260 reg.exe 3580 reg.exe 4328 reg.exe 2688 reg.exe 3108 reg.exe 2056 reg.exe 4764 reg.exe 3496 reg.exe 452 reg.exe 2256 reg.exe 2624 reg.exe 2728 reg.exe 4516 reg.exe 4260 reg.exe 2680 reg.exe 3340 reg.exe 5004 reg.exe 1680 reg.exe 4876 reg.exe 392 reg.exe 3756 reg.exe 1880 reg.exe 4804 reg.exe 4708 reg.exe 4336 reg.exe 4520 reg.exe 4796 reg.exe 1884 reg.exe 3108 reg.exe 1932 reg.exe 2072 reg.exe 3380 reg.exe 2660 reg.exe 3508 reg.exe 4988 reg.exe 4332 reg.exe 3864 reg.exe 2652 reg.exe 4304 reg.exe 2388 reg.exe 2652 reg.exe 1588 reg.exe 5024 reg.exe 4240 reg.exe 668 reg.exe 4152 reg.exe 4544 reg.exe 2056 reg.exe 1044 reg.exe 4456 reg.exe 4952 reg.exe 4472 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4680 e4d99b4c2398c9exeexeexeex.exe 4680 e4d99b4c2398c9exeexeexeex.exe 4680 e4d99b4c2398c9exeexeexeex.exe 4680 e4d99b4c2398c9exeexeexeex.exe 4584 e4d99b4c2398c9exeexeexeex.exe 4584 e4d99b4c2398c9exeexeexeex.exe 4584 e4d99b4c2398c9exeexeexeex.exe 4584 e4d99b4c2398c9exeexeexeex.exe 5076 e4d99b4c2398c9exeexeexeex.exe 5076 e4d99b4c2398c9exeexeexeex.exe 5076 e4d99b4c2398c9exeexeexeex.exe 5076 e4d99b4c2398c9exeexeexeex.exe 5036 e4d99b4c2398c9exeexeexeex.exe 5036 e4d99b4c2398c9exeexeexeex.exe 5036 e4d99b4c2398c9exeexeexeex.exe 5036 e4d99b4c2398c9exeexeexeex.exe 4200 e4d99b4c2398c9exeexeexeex.exe 4200 e4d99b4c2398c9exeexeexeex.exe 4200 e4d99b4c2398c9exeexeexeex.exe 4200 e4d99b4c2398c9exeexeexeex.exe 4008 e4d99b4c2398c9exeexeexeex.exe 4008 e4d99b4c2398c9exeexeexeex.exe 4008 e4d99b4c2398c9exeexeexeex.exe 4008 e4d99b4c2398c9exeexeexeex.exe 1676 cmd.exe 1676 cmd.exe 1676 cmd.exe 1676 cmd.exe 1312 e4d99b4c2398c9exeexeexeex.exe 1312 e4d99b4c2398c9exeexeexeex.exe 1312 e4d99b4c2398c9exeexeexeex.exe 1312 e4d99b4c2398c9exeexeexeex.exe 1712 Conhost.exe 1712 Conhost.exe 1712 Conhost.exe 1712 Conhost.exe 4068 e4d99b4c2398c9exeexeexeex.exe 4068 e4d99b4c2398c9exeexeexeex.exe 4068 e4d99b4c2398c9exeexeexeex.exe 4068 e4d99b4c2398c9exeexeexeex.exe 4796 e4d99b4c2398c9exeexeexeex.exe 4796 e4d99b4c2398c9exeexeexeex.exe 4796 e4d99b4c2398c9exeexeexeex.exe 4796 e4d99b4c2398c9exeexeexeex.exe 2104 e4d99b4c2398c9exeexeexeex.exe 2104 e4d99b4c2398c9exeexeexeex.exe 2104 e4d99b4c2398c9exeexeexeex.exe 2104 e4d99b4c2398c9exeexeexeex.exe 1904 e4d99b4c2398c9exeexeexeex.exe 1904 e4d99b4c2398c9exeexeexeex.exe 1904 e4d99b4c2398c9exeexeexeex.exe 1904 e4d99b4c2398c9exeexeexeex.exe 4444 Conhost.exe 4444 Conhost.exe 4444 Conhost.exe 4444 Conhost.exe 3876 cmd.exe 3876 cmd.exe 3876 cmd.exe 3876 cmd.exe 2848 e4d99b4c2398c9exeexeexeex.exe 2848 e4d99b4c2398c9exeexeexeex.exe 2848 e4d99b4c2398c9exeexeexeex.exe 2848 e4d99b4c2398c9exeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4680 wrote to memory of 4256 4680 e4d99b4c2398c9exeexeexeex.exe 86 PID 4680 wrote to memory of 4256 4680 e4d99b4c2398c9exeexeexeex.exe 86 PID 4680 wrote to memory of 4256 4680 e4d99b4c2398c9exeexeexeex.exe 86 PID 4680 wrote to memory of 3320 4680 e4d99b4c2398c9exeexeexeex.exe 89 PID 4680 wrote to memory of 3320 4680 e4d99b4c2398c9exeexeexeex.exe 89 PID 4680 wrote to memory of 3320 4680 e4d99b4c2398c9exeexeexeex.exe 89 PID 4680 wrote to memory of 4876 4680 e4d99b4c2398c9exeexeexeex.exe 87 PID 4680 wrote to memory of 4876 4680 e4d99b4c2398c9exeexeexeex.exe 87 PID 4680 wrote to memory of 4876 4680 e4d99b4c2398c9exeexeexeex.exe 87 PID 4680 wrote to memory of 4132 4680 e4d99b4c2398c9exeexeexeex.exe 90 PID 4680 wrote to memory of 4132 4680 e4d99b4c2398c9exeexeexeex.exe 90 PID 4680 wrote to memory of 4132 4680 e4d99b4c2398c9exeexeexeex.exe 90 PID 4680 wrote to memory of 4064 4680 e4d99b4c2398c9exeexeexeex.exe 93 PID 4680 wrote to memory of 4064 4680 e4d99b4c2398c9exeexeexeex.exe 93 PID 4680 wrote to memory of 4064 4680 e4d99b4c2398c9exeexeexeex.exe 93 PID 4680 wrote to memory of 3724 4680 e4d99b4c2398c9exeexeexeex.exe 92 PID 4680 wrote to memory of 3724 4680 e4d99b4c2398c9exeexeexeex.exe 92 PID 4680 wrote to memory of 3724 4680 e4d99b4c2398c9exeexeexeex.exe 92 PID 4680 wrote to memory of 4440 4680 e4d99b4c2398c9exeexeexeex.exe 91 PID 4680 wrote to memory of 4440 4680 e4d99b4c2398c9exeexeexeex.exe 91 PID 4680 wrote to memory of 4440 4680 e4d99b4c2398c9exeexeexeex.exe 91 PID 4440 wrote to memory of 1752 4440 cmd.exe 99 PID 4440 wrote to memory of 1752 4440 cmd.exe 99 PID 4440 wrote to memory of 1752 4440 cmd.exe 99 PID 4876 wrote to memory of 4584 4876 cmd.exe 98 PID 4876 wrote to memory of 4584 4876 cmd.exe 98 PID 4876 wrote to memory of 4584 4876 cmd.exe 98 PID 4584 wrote to memory of 3400 4584 e4d99b4c2398c9exeexeexeex.exe 100 PID 4584 wrote to memory of 3400 4584 e4d99b4c2398c9exeexeexeex.exe 100 PID 4584 wrote to memory of 3400 4584 e4d99b4c2398c9exeexeexeex.exe 100 PID 3400 wrote to memory of 5076 3400 cmd.exe 102 PID 3400 wrote to memory of 5076 3400 cmd.exe 102 PID 3400 wrote to memory of 5076 3400 cmd.exe 102 PID 4584 wrote to memory of 1532 4584 e4d99b4c2398c9exeexeexeex.exe 103 PID 4584 wrote to memory of 1532 4584 e4d99b4c2398c9exeexeexeex.exe 103 PID 4584 wrote to memory of 1532 4584 e4d99b4c2398c9exeexeexeex.exe 103 PID 4584 wrote to memory of 2992 4584 e4d99b4c2398c9exeexeexeex.exe 110 PID 4584 wrote to memory of 2992 4584 e4d99b4c2398c9exeexeexeex.exe 110 PID 4584 wrote to memory of 2992 4584 e4d99b4c2398c9exeexeexeex.exe 110 PID 4584 wrote to memory of 1676 4584 e4d99b4c2398c9exeexeexeex.exe 151 PID 4584 wrote to memory of 1676 4584 e4d99b4c2398c9exeexeexeex.exe 151 PID 4584 wrote to memory of 1676 4584 e4d99b4c2398c9exeexeexeex.exe 151 PID 4584 wrote to memory of 544 4584 e4d99b4c2398c9exeexeexeex.exe 109 PID 4584 wrote to memory of 544 4584 e4d99b4c2398c9exeexeexeex.exe 109 PID 4584 wrote to memory of 544 4584 e4d99b4c2398c9exeexeexeex.exe 109 PID 544 wrote to memory of 3480 544 cmd.exe 111 PID 544 wrote to memory of 3480 544 cmd.exe 111 PID 544 wrote to memory of 3480 544 cmd.exe 111 PID 5076 wrote to memory of 4152 5076 e4d99b4c2398c9exeexeexeex.exe 112 PID 5076 wrote to memory of 4152 5076 e4d99b4c2398c9exeexeexeex.exe 112 PID 5076 wrote to memory of 4152 5076 e4d99b4c2398c9exeexeexeex.exe 112 PID 5076 wrote to memory of 1008 5076 e4d99b4c2398c9exeexeexeex.exe 114 PID 5076 wrote to memory of 1008 5076 e4d99b4c2398c9exeexeexeex.exe 114 PID 5076 wrote to memory of 1008 5076 e4d99b4c2398c9exeexeexeex.exe 114 PID 5076 wrote to memory of 2652 5076 e4d99b4c2398c9exeexeexeex.exe 115 PID 5076 wrote to memory of 2652 5076 e4d99b4c2398c9exeexeexeex.exe 115 PID 5076 wrote to memory of 2652 5076 e4d99b4c2398c9exeexeexeex.exe 115 PID 5076 wrote to memory of 3108 5076 e4d99b4c2398c9exeexeexeex.exe 116 PID 5076 wrote to memory of 3108 5076 e4d99b4c2398c9exeexeexeex.exe 116 PID 5076 wrote to memory of 3108 5076 e4d99b4c2398c9exeexeexeex.exe 116 PID 5076 wrote to memory of 3396 5076 e4d99b4c2398c9exeexeexeex.exe 117 PID 5076 wrote to memory of 3396 5076 e4d99b4c2398c9exeexeexeex.exe 117 PID 5076 wrote to memory of 3396 5076 e4d99b4c2398c9exeexeexeex.exe 117 PID 4152 wrote to memory of 5036 4152 cmd.exe 122 -
System policy modification 1 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e4d99b4c2398c9exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e4d99b4c2398c9exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e4d99b4c2398c9exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e4d99b4c2398c9exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e4d99b4c2398c9exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e4d99b4c2398c9exeexeexeex.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\MMksoswg\yswcMwss.exe"C:\Users\Admin\MMksoswg\yswcMwss.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4256 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "USERNAME eq Admin" /F /IM IAkMsQQE.exe3⤵
- Kills process with taskkill
PID:4832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"6⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"8⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"10⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"12⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex13⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"14⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"16⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex17⤵PID:1712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"18⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"20⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"22⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"24⤵
- Modifies visibility of file extensions in Explorer
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"26⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex27⤵PID:4444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"28⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex29⤵PID:3876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"30⤵PID:3776
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵PID:4184
-
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"32⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex33⤵PID:4860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"34⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex35⤵PID:1444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"36⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex37⤵PID:2828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"38⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex39⤵PID:1864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"40⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex41⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"42⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex43⤵PID:5084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"44⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex45⤵PID:2616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"46⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex47⤵PID:1864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"48⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex49⤵PID:4588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"50⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex51⤵PID:2728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"52⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex53⤵PID:1172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"54⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex55⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"56⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex57⤵PID:1012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"58⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex59⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"60⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex61⤵PID:3396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"62⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex63⤵PID:3136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"64⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex65⤵PID:1012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"66⤵PID:4056
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex67⤵PID:4132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"68⤵PID:4516
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex69⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"70⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex71⤵PID:2124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"72⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex73⤵PID:2336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"74⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex75⤵PID:5032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"76⤵PID:4304
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵
- UAC bypass
PID:524
-
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex77⤵PID:2492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"78⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex79⤵PID:552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"80⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex81⤵PID:3584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"82⤵PID:4056
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵
- Modifies visibility of file extensions in Explorer
PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex83⤵PID:3404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"84⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex85⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"86⤵PID:5076
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:4588
-
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex87⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"88⤵PID:4528
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex89⤵PID:2364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"90⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex91⤵PID:1988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"92⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex93⤵PID:2772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"94⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex95⤵
- Modifies visibility of file extensions in Explorer
PID:524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"96⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex97⤵PID:4528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"98⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex99⤵PID:2652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"100⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1324 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex101⤵PID:4464
-
C:\Users\Admin\MMksoswg\yswcMwss.exe"C:\Users\Admin\MMksoswg\yswcMwss.exe"102⤵PID:1436
-
-
C:\ProgramData\QAUgkMsg\IAkMsQQE.exe"C:\ProgramData\QAUgkMsg\IAkMsQQE.exe"102⤵PID:2508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"102⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex103⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"104⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex105⤵PID:3552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"106⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex107⤵PID:4988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"108⤵PID:1016
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵
- UAC bypass
PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex109⤵PID:3156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"110⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex111⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"112⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex113⤵PID:2648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"114⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex115⤵PID:2916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"116⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex117⤵PID:1220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"118⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex119⤵PID:4992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"120⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex121⤵PID:4240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e4d99b4c2398c9exeexeexeex"122⤵PID:3392
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-