Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
1d237f885015bacd32483f7d4135d1df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d237f885015bacd32483f7d4135d1df.exe
Resource
win10v2004-20231215-en
General
-
Target
1d237f885015bacd32483f7d4135d1df.exe
-
Size
488KB
-
MD5
1d237f885015bacd32483f7d4135d1df
-
SHA1
1f01e2174ee2b300cf5c74d7df0bfaee11a57f78
-
SHA256
def3b7ba5b2651941218d77272bcb2fde5d6e91ea64507fee316d4085a18b244
-
SHA512
8447ae5500a602f7e763c81469e9f4e540c226565ad6a970d10675a75dd02c3ef3a02bce7be3c9b6f8c3bdd9318178bba2c8a62298c9b9bf7f23c0e309ff32d7
-
SSDEEP
12288:xHVPzjc6qD9ShYAk9FML7ke0fOlW6z11z1gx:xxch9r9hmlW6rz1
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 1d237f885015bacd32483f7d4135d1df.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 1d237f885015bacd32483f7d4135d1df.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" YOAUskwI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1d237f885015bacd32483f7d4135d1df.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation SUYEQUII.exe -
Executes dropped EXE 3 IoCs
pid Process 3172 LwcwYwAE.exe 3808 SUYEQUII.exe 1368 iScIcQEU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fWoMcwUE.exe = "C:\\ProgramData\\YaQIEIsQ\\fWoMcwUE.exe" 1d237f885015bacd32483f7d4135d1df.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LwcwYwAE.exe = "C:\\Users\\Admin\\sgYEEgYo\\LwcwYwAE.exe" 1d237f885015bacd32483f7d4135d1df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SUYEQUII.exe = "C:\\ProgramData\\OgEEwIEA\\SUYEQUII.exe" 1d237f885015bacd32483f7d4135d1df.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LwcwYwAE.exe = "C:\\Users\\Admin\\sgYEEgYo\\LwcwYwAE.exe" LwcwYwAE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SUYEQUII.exe = "C:\\ProgramData\\OgEEwIEA\\SUYEQUII.exe" SUYEQUII.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SUYEQUII.exe = "C:\\ProgramData\\OgEEwIEA\\SUYEQUII.exe" iScIcQEU.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DaEEcIgQ.exe = "C:\\Users\\Admin\\QmYsooEI\\DaEEcIgQ.exe" 1d237f885015bacd32483f7d4135d1df.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1d237f885015bacd32483f7d4135d1df.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1d237f885015bacd32483f7d4135d1df.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\sgYEEgYo iScIcQEU.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\sgYEEgYo\LwcwYwAE iScIcQEU.exe File created C:\Windows\SysWOW64\shell32.dll.exe SUYEQUII.exe File opened for modification C:\Windows\SysWOW64\sheRevokeOpen.png SUYEQUII.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2092 436 WerFault.exe 246 3640 2324 WerFault.exe 250 3184 3212 WerFault.exe 248 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 3956 reg.exe 2272 reg.exe 3300 reg.exe 5384 reg.exe 5708 reg.exe 3224 reg.exe 4492 reg.exe 3536 reg.exe 4868 reg.exe 924 reg.exe 4376 reg.exe 496 reg.exe 3448 reg.exe 3680 reg.exe 3092 reg.exe 1404 reg.exe 912 reg.exe 3184 reg.exe 4816 reg.exe 2548 reg.exe 2596 reg.exe 972 reg.exe 3080 reg.exe 5400 reg.exe 1604 reg.exe 4904 reg.exe 2132 reg.exe 4596 reg.exe 4820 reg.exe 3580 reg.exe 2260 reg.exe 756 reg.exe 4376 reg.exe 5972 reg.exe 3956 reg.exe 1152 reg.exe 1828 reg.exe 2188 reg.exe 4180 reg.exe 4860 reg.exe 3224 reg.exe 5392 reg.exe 2284 reg.exe 1764 reg.exe 4472 reg.exe 1876 reg.exe 2104 reg.exe 2576 reg.exe 876 reg.exe 2180 reg.exe 220 reg.exe 392 reg.exe 4312 reg.exe 4544 reg.exe 496 reg.exe 4352 reg.exe 2440 reg.exe 5092 reg.exe 3476 reg.exe 4740 reg.exe 1176 reg.exe 4012 reg.exe 2276 reg.exe 4396 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4976 1d237f885015bacd32483f7d4135d1df.exe 4976 1d237f885015bacd32483f7d4135d1df.exe 4976 1d237f885015bacd32483f7d4135d1df.exe 4976 1d237f885015bacd32483f7d4135d1df.exe 3536 1d237f885015bacd32483f7d4135d1df.exe 3536 1d237f885015bacd32483f7d4135d1df.exe 3536 1d237f885015bacd32483f7d4135d1df.exe 3536 1d237f885015bacd32483f7d4135d1df.exe 3588 1d237f885015bacd32483f7d4135d1df.exe 3588 1d237f885015bacd32483f7d4135d1df.exe 3588 1d237f885015bacd32483f7d4135d1df.exe 3588 1d237f885015bacd32483f7d4135d1df.exe 5100 1d237f885015bacd32483f7d4135d1df.exe 5100 1d237f885015bacd32483f7d4135d1df.exe 5100 1d237f885015bacd32483f7d4135d1df.exe 5100 1d237f885015bacd32483f7d4135d1df.exe 924 1d237f885015bacd32483f7d4135d1df.exe 924 1d237f885015bacd32483f7d4135d1df.exe 924 1d237f885015bacd32483f7d4135d1df.exe 924 1d237f885015bacd32483f7d4135d1df.exe 2832 1d237f885015bacd32483f7d4135d1df.exe 2832 1d237f885015bacd32483f7d4135d1df.exe 2832 1d237f885015bacd32483f7d4135d1df.exe 2832 1d237f885015bacd32483f7d4135d1df.exe 3748 1d237f885015bacd32483f7d4135d1df.exe 3748 1d237f885015bacd32483f7d4135d1df.exe 3748 1d237f885015bacd32483f7d4135d1df.exe 3748 1d237f885015bacd32483f7d4135d1df.exe 4536 1d237f885015bacd32483f7d4135d1df.exe 4536 1d237f885015bacd32483f7d4135d1df.exe 4536 1d237f885015bacd32483f7d4135d1df.exe 4536 1d237f885015bacd32483f7d4135d1df.exe 1308 svchost.exe 1308 svchost.exe 1308 svchost.exe 1308 svchost.exe 4492 1d237f885015bacd32483f7d4135d1df.exe 4492 1d237f885015bacd32483f7d4135d1df.exe 4492 1d237f885015bacd32483f7d4135d1df.exe 4492 1d237f885015bacd32483f7d4135d1df.exe 4664 1d237f885015bacd32483f7d4135d1df.exe 4664 1d237f885015bacd32483f7d4135d1df.exe 4664 1d237f885015bacd32483f7d4135d1df.exe 4664 1d237f885015bacd32483f7d4135d1df.exe 4852 1d237f885015bacd32483f7d4135d1df.exe 4852 1d237f885015bacd32483f7d4135d1df.exe 4852 1d237f885015bacd32483f7d4135d1df.exe 4852 1d237f885015bacd32483f7d4135d1df.exe 1932 1d237f885015bacd32483f7d4135d1df.exe 1932 1d237f885015bacd32483f7d4135d1df.exe 1932 1d237f885015bacd32483f7d4135d1df.exe 1932 1d237f885015bacd32483f7d4135d1df.exe 3316 1d237f885015bacd32483f7d4135d1df.exe 3316 1d237f885015bacd32483f7d4135d1df.exe 3316 1d237f885015bacd32483f7d4135d1df.exe 3316 1d237f885015bacd32483f7d4135d1df.exe 840 1d237f885015bacd32483f7d4135d1df.exe 840 1d237f885015bacd32483f7d4135d1df.exe 840 1d237f885015bacd32483f7d4135d1df.exe 840 1d237f885015bacd32483f7d4135d1df.exe 4892 1d237f885015bacd32483f7d4135d1df.exe 4892 1d237f885015bacd32483f7d4135d1df.exe 4892 1d237f885015bacd32483f7d4135d1df.exe 4892 1d237f885015bacd32483f7d4135d1df.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3808 SUYEQUII.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe 3808 SUYEQUII.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4976 wrote to memory of 3172 4976 1d237f885015bacd32483f7d4135d1df.exe 89 PID 4976 wrote to memory of 3172 4976 1d237f885015bacd32483f7d4135d1df.exe 89 PID 4976 wrote to memory of 3172 4976 1d237f885015bacd32483f7d4135d1df.exe 89 PID 4976 wrote to memory of 3808 4976 1d237f885015bacd32483f7d4135d1df.exe 90 PID 4976 wrote to memory of 3808 4976 1d237f885015bacd32483f7d4135d1df.exe 90 PID 4976 wrote to memory of 3808 4976 1d237f885015bacd32483f7d4135d1df.exe 90 PID 4976 wrote to memory of 3624 4976 1d237f885015bacd32483f7d4135d1df.exe 93 PID 4976 wrote to memory of 3624 4976 1d237f885015bacd32483f7d4135d1df.exe 93 PID 4976 wrote to memory of 3624 4976 1d237f885015bacd32483f7d4135d1df.exe 93 PID 3624 wrote to memory of 3536 3624 cmd.exe 100 PID 3624 wrote to memory of 3536 3624 cmd.exe 100 PID 3624 wrote to memory of 3536 3624 cmd.exe 100 PID 4976 wrote to memory of 4860 4976 1d237f885015bacd32483f7d4135d1df.exe 101 PID 4976 wrote to memory of 4860 4976 1d237f885015bacd32483f7d4135d1df.exe 101 PID 4976 wrote to memory of 4860 4976 1d237f885015bacd32483f7d4135d1df.exe 101 PID 4976 wrote to memory of 3092 4976 1d237f885015bacd32483f7d4135d1df.exe 99 PID 4976 wrote to memory of 3092 4976 1d237f885015bacd32483f7d4135d1df.exe 99 PID 4976 wrote to memory of 3092 4976 1d237f885015bacd32483f7d4135d1df.exe 99 PID 4976 wrote to memory of 1020 4976 1d237f885015bacd32483f7d4135d1df.exe 146 PID 4976 wrote to memory of 1020 4976 1d237f885015bacd32483f7d4135d1df.exe 146 PID 4976 wrote to memory of 1020 4976 1d237f885015bacd32483f7d4135d1df.exe 146 PID 3536 wrote to memory of 5008 3536 1d237f885015bacd32483f7d4135d1df.exe 102 PID 3536 wrote to memory of 5008 3536 1d237f885015bacd32483f7d4135d1df.exe 102 PID 3536 wrote to memory of 5008 3536 1d237f885015bacd32483f7d4135d1df.exe 102 PID 3536 wrote to memory of 4968 3536 1d237f885015bacd32483f7d4135d1df.exe 109 PID 3536 wrote to memory of 4968 3536 1d237f885015bacd32483f7d4135d1df.exe 109 PID 3536 wrote to memory of 4968 3536 1d237f885015bacd32483f7d4135d1df.exe 109 PID 3536 wrote to memory of 1188 3536 1d237f885015bacd32483f7d4135d1df.exe 108 PID 3536 wrote to memory of 1188 3536 1d237f885015bacd32483f7d4135d1df.exe 108 PID 3536 wrote to memory of 1188 3536 1d237f885015bacd32483f7d4135d1df.exe 108 PID 3536 wrote to memory of 556 3536 1d237f885015bacd32483f7d4135d1df.exe 107 PID 3536 wrote to memory of 556 3536 1d237f885015bacd32483f7d4135d1df.exe 107 PID 3536 wrote to memory of 556 3536 1d237f885015bacd32483f7d4135d1df.exe 107 PID 5008 wrote to memory of 3588 5008 cmd.exe 106 PID 5008 wrote to memory of 3588 5008 cmd.exe 106 PID 5008 wrote to memory of 3588 5008 cmd.exe 106 PID 3536 wrote to memory of 396 3536 1d237f885015bacd32483f7d4135d1df.exe 104 PID 3536 wrote to memory of 396 3536 1d237f885015bacd32483f7d4135d1df.exe 104 PID 3536 wrote to memory of 396 3536 1d237f885015bacd32483f7d4135d1df.exe 104 PID 396 wrote to memory of 3780 396 cmd.exe 113 PID 396 wrote to memory of 3780 396 cmd.exe 113 PID 396 wrote to memory of 3780 396 cmd.exe 113 PID 3588 wrote to memory of 3056 3588 1d237f885015bacd32483f7d4135d1df.exe 169 PID 3588 wrote to memory of 3056 3588 1d237f885015bacd32483f7d4135d1df.exe 169 PID 3588 wrote to memory of 3056 3588 1d237f885015bacd32483f7d4135d1df.exe 169 PID 3056 wrote to memory of 5100 3056 Conhost.exe 116 PID 3056 wrote to memory of 5100 3056 Conhost.exe 116 PID 3056 wrote to memory of 5100 3056 Conhost.exe 116 PID 3588 wrote to memory of 3316 3588 1d237f885015bacd32483f7d4135d1df.exe 188 PID 3588 wrote to memory of 3316 3588 1d237f885015bacd32483f7d4135d1df.exe 188 PID 3588 wrote to memory of 3316 3588 1d237f885015bacd32483f7d4135d1df.exe 188 PID 3588 wrote to memory of 3160 3588 1d237f885015bacd32483f7d4135d1df.exe 124 PID 3588 wrote to memory of 3160 3588 1d237f885015bacd32483f7d4135d1df.exe 124 PID 3588 wrote to memory of 3160 3588 1d237f885015bacd32483f7d4135d1df.exe 124 PID 3588 wrote to memory of 3048 3588 1d237f885015bacd32483f7d4135d1df.exe 123 PID 3588 wrote to memory of 3048 3588 1d237f885015bacd32483f7d4135d1df.exe 123 PID 3588 wrote to memory of 3048 3588 1d237f885015bacd32483f7d4135d1df.exe 123 PID 3588 wrote to memory of 4848 3588 1d237f885015bacd32483f7d4135d1df.exe 122 PID 3588 wrote to memory of 4848 3588 1d237f885015bacd32483f7d4135d1df.exe 122 PID 3588 wrote to memory of 4848 3588 1d237f885015bacd32483f7d4135d1df.exe 122 PID 5100 wrote to memory of 848 5100 1d237f885015bacd32483f7d4135d1df.exe 126 PID 5100 wrote to memory of 848 5100 1d237f885015bacd32483f7d4135d1df.exe 126 PID 5100 wrote to memory of 848 5100 1d237f885015bacd32483f7d4135d1df.exe 126 PID 5100 wrote to memory of 3264 5100 1d237f885015bacd32483f7d4135d1df.exe 131 -
System policy modification 1 TTPs 16 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 1d237f885015bacd32483f7d4135d1df.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1d237f885015bacd32483f7d4135d1df.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exe"C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\sgYEEgYo\LwcwYwAE.exe"C:\Users\Admin\sgYEEgYo\LwcwYwAE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3172
-
-
C:\ProgramData\OgEEwIEA\SUYEQUII.exe"C:\ProgramData\OgEEwIEA\SUYEQUII.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"2⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"4⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"6⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"8⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df9⤵
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"10⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"12⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"14⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"16⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df17⤵PID:1308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"18⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"20⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"22⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"24⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"26⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df27⤵
- Adds Run key to start application
PID:4472 -
C:\Users\Admin\QmYsooEI\DaEEcIgQ.exe"C:\Users\Admin\QmYsooEI\DaEEcIgQ.exe"28⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 27229⤵
- Program crash
PID:2092
-
-
-
C:\ProgramData\YaQIEIsQ\fWoMcwUE.exe"C:\ProgramData\YaQIEIsQ\fWoMcwUE.exe"28⤵PID:3212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 37229⤵
- Program crash
PID:3184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"28⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"30⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df31⤵
- Suspicious behavior: EnumeratesProcesses
PID:840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"32⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"34⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df35⤵PID:1616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"36⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df37⤵PID:1804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"38⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df39⤵PID:4760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"40⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df41⤵PID:4860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"42⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df43⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"44⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df45⤵PID:2548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"46⤵PID:1064
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵
- Modifies visibility of file extensions in Explorer
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df47⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"48⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df49⤵PID:5084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"50⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df51⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"52⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df53⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"54⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df55⤵PID:1336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"56⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df57⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"58⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df59⤵PID:3028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"60⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df61⤵PID:2472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"62⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df63⤵PID:3920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"64⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df65⤵PID:5060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"66⤵
- Checks whether UAC is enabled
- System policy modification
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df67⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"68⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df69⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"70⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df71⤵PID:2148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"72⤵PID:4420
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df73⤵PID:2332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"74⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df75⤵PID:2512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"76⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df77⤵PID:3384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"78⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df79⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"80⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df81⤵PID:3424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"82⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df83⤵PID:2512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"84⤵PID:2336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df85⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"86⤵PID:4420
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df87⤵PID:3112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"88⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df89⤵PID:4444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"90⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df91⤵PID:3576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"92⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df93⤵PID:4876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"94⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df95⤵PID:5056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"96⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df97⤵
- Modifies visibility of file extensions in Explorer
PID:1008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"98⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df99⤵PID:1064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"100⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df101⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"102⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df103⤵PID:1348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"104⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df105⤵PID:4688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"106⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df107⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"108⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df109⤵PID:2888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"110⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df111⤵PID:4416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"112⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df113⤵PID:1880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"114⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df115⤵PID:232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"116⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df117⤵PID:2180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"118⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df119⤵PID:1052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"120⤵
- Checks whether UAC is enabled
- System policy modification
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df.exeC:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df121⤵PID:3756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1d237f885015bacd32483f7d4135d1df"122⤵PID:4808
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-