Analysis
-
max time kernel
189s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
65a02a8e633a935bf53a4d3347eebaa1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
65a02a8e633a935bf53a4d3347eebaa1.exe
Resource
win10v2004-20231215-en
General
-
Target
65a02a8e633a935bf53a4d3347eebaa1.exe
-
Size
480KB
-
MD5
65a02a8e633a935bf53a4d3347eebaa1
-
SHA1
2d2f41067c56f0b87ef5d8cac3d56dfdb402289d
-
SHA256
ff8387f2e24afe36297ed7def690218288cd778e44890e28021fa4beb5d56e22
-
SHA512
2ebc702c5df681bcd521076b98eac58730bb7e44717340e21973bbd8844f5dc92198f9c0fffafb9e8b9b6859517b296bef8ebd9e435aec58194006360fafada5
-
SSDEEP
6144:IiMV3aQrQGx82Pq+Zd47f0vB/OJIeVtYmKXjNk8jsFiwMZ6o7zIbTc+X:INa9U8JtiOJFhYy8oF/Xk+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 65a02a8e633a935bf53a4d3347eebaa1.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 65a02a8e633a935bf53a4d3347eebaa1.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 1188 OgQAkEAk.exe 2064 NcIYsYIA.exe 4320 tKcswkgA.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NcIYsYIA.exe = "C:\\ProgramData\\smMYcQgs\\NcIYsYIA.exe" NcIYsYIA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NcIYsYIA.exe = "C:\\ProgramData\\smMYcQgs\\NcIYsYIA.exe" tKcswkgA.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wGEAoAIY.exe = "C:\\Users\\Admin\\iYIUAgIA\\wGEAoAIY.exe" 65a02a8e633a935bf53a4d3347eebaa1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OgoEccIk.exe = "C:\\ProgramData\\fcYEoEUs\\OgoEccIk.exe" 65a02a8e633a935bf53a4d3347eebaa1.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OgQAkEAk.exe = "C:\\Users\\Admin\\DyMEscIA\\OgQAkEAk.exe" 65a02a8e633a935bf53a4d3347eebaa1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NcIYsYIA.exe = "C:\\ProgramData\\smMYcQgs\\NcIYsYIA.exe" 65a02a8e633a935bf53a4d3347eebaa1.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OgQAkEAk.exe = "C:\\Users\\Admin\\DyMEscIA\\OgQAkEAk.exe" OgQAkEAk.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\DyMEscIA tKcswkgA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\DyMEscIA\OgQAkEAk tKcswkgA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1860 2376 WerFault.exe 973 2084 4480 WerFault.exe 972 3720 3448 WerFault.exe 975 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 4888 reg.exe 4372 reg.exe 3504 reg.exe 1860 reg.exe 4120 reg.exe 2796 reg.exe 4876 reg.exe 3844 reg.exe 912 reg.exe 3288 reg.exe 4392 reg.exe 4036 reg.exe 4984 reg.exe 3964 reg.exe 324 reg.exe 4696 reg.exe 4696 reg.exe 4348 reg.exe 824 reg.exe 2804 reg.exe 1724 reg.exe 772 reg.exe 5028 reg.exe 1640 reg.exe 1468 reg.exe 4348 reg.exe 5080 reg.exe 3768 reg.exe 456 reg.exe 3368 reg.exe 884 reg.exe 2344 reg.exe 1456 reg.exe 4524 reg.exe 2148 reg.exe 2504 reg.exe 2352 reg.exe 4856 reg.exe 644 reg.exe 408 reg.exe 4836 reg.exe 1424 reg.exe 4452 reg.exe 1860 reg.exe 2740 reg.exe 2200 reg.exe 2592 reg.exe 3096 reg.exe 3740 reg.exe 1328 reg.exe 1788 reg.exe 4368 reg.exe 324 reg.exe 1316 reg.exe 4444 reg.exe 4392 reg.exe 4620 reg.exe 4004 reg.exe 688 reg.exe 1424 reg.exe 2720 reg.exe 2660 reg.exe 680 reg.exe 1124 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 440 65a02a8e633a935bf53a4d3347eebaa1.exe 440 65a02a8e633a935bf53a4d3347eebaa1.exe 440 65a02a8e633a935bf53a4d3347eebaa1.exe 440 65a02a8e633a935bf53a4d3347eebaa1.exe 1456 65a02a8e633a935bf53a4d3347eebaa1.exe 1456 65a02a8e633a935bf53a4d3347eebaa1.exe 1456 65a02a8e633a935bf53a4d3347eebaa1.exe 1456 65a02a8e633a935bf53a4d3347eebaa1.exe 3396 65a02a8e633a935bf53a4d3347eebaa1.exe 3396 65a02a8e633a935bf53a4d3347eebaa1.exe 3396 65a02a8e633a935bf53a4d3347eebaa1.exe 3396 65a02a8e633a935bf53a4d3347eebaa1.exe 964 65a02a8e633a935bf53a4d3347eebaa1.exe 964 65a02a8e633a935bf53a4d3347eebaa1.exe 964 65a02a8e633a935bf53a4d3347eebaa1.exe 964 65a02a8e633a935bf53a4d3347eebaa1.exe 3472 65a02a8e633a935bf53a4d3347eebaa1.exe 3472 65a02a8e633a935bf53a4d3347eebaa1.exe 3472 65a02a8e633a935bf53a4d3347eebaa1.exe 3472 65a02a8e633a935bf53a4d3347eebaa1.exe 4780 reg.exe 4780 reg.exe 4780 reg.exe 4780 reg.exe 912 65a02a8e633a935bf53a4d3347eebaa1.exe 912 65a02a8e633a935bf53a4d3347eebaa1.exe 912 65a02a8e633a935bf53a4d3347eebaa1.exe 912 65a02a8e633a935bf53a4d3347eebaa1.exe 756 cscript.exe 756 cscript.exe 756 cscript.exe 756 cscript.exe 3988 65a02a8e633a935bf53a4d3347eebaa1.exe 3988 65a02a8e633a935bf53a4d3347eebaa1.exe 3988 65a02a8e633a935bf53a4d3347eebaa1.exe 3988 65a02a8e633a935bf53a4d3347eebaa1.exe 3616 65a02a8e633a935bf53a4d3347eebaa1.exe 3616 65a02a8e633a935bf53a4d3347eebaa1.exe 3616 65a02a8e633a935bf53a4d3347eebaa1.exe 3616 65a02a8e633a935bf53a4d3347eebaa1.exe 4596 65a02a8e633a935bf53a4d3347eebaa1.exe 4596 65a02a8e633a935bf53a4d3347eebaa1.exe 4596 65a02a8e633a935bf53a4d3347eebaa1.exe 4596 65a02a8e633a935bf53a4d3347eebaa1.exe 2584 cscript.exe 2584 cscript.exe 2584 cscript.exe 2584 cscript.exe 2560 Conhost.exe 2560 Conhost.exe 2560 Conhost.exe 2560 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1188 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 93 PID 1636 wrote to memory of 1188 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 93 PID 1636 wrote to memory of 1188 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 93 PID 1636 wrote to memory of 2064 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 94 PID 1636 wrote to memory of 2064 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 94 PID 1636 wrote to memory of 2064 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 94 PID 1636 wrote to memory of 3648 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 96 PID 1636 wrote to memory of 3648 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 96 PID 1636 wrote to memory of 3648 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 96 PID 1636 wrote to memory of 1316 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 97 PID 1636 wrote to memory of 1316 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 97 PID 1636 wrote to memory of 1316 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 97 PID 3648 wrote to memory of 4800 3648 cmd.exe 100 PID 3648 wrote to memory of 4800 3648 cmd.exe 100 PID 3648 wrote to memory of 4800 3648 cmd.exe 100 PID 1636 wrote to memory of 2452 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 99 PID 1636 wrote to memory of 2452 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 99 PID 1636 wrote to memory of 2452 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 99 PID 1636 wrote to memory of 4392 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 104 PID 1636 wrote to memory of 4392 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 104 PID 1636 wrote to memory of 4392 1636 65a02a8e633a935bf53a4d3347eebaa1.exe 104 PID 4800 wrote to memory of 4508 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 105 PID 4800 wrote to memory of 4508 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 105 PID 4800 wrote to memory of 4508 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 105 PID 4800 wrote to memory of 2352 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 107 PID 4800 wrote to memory of 2352 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 107 PID 4800 wrote to memory of 2352 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 107 PID 4800 wrote to memory of 416 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 108 PID 4800 wrote to memory of 416 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 108 PID 4800 wrote to memory of 416 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 108 PID 4800 wrote to memory of 3368 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 109 PID 4800 wrote to memory of 3368 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 109 PID 4800 wrote to memory of 3368 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 109 PID 4800 wrote to memory of 4968 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 110 PID 4800 wrote to memory of 4968 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 110 PID 4800 wrote to memory of 4968 4800 65a02a8e633a935bf53a4d3347eebaa1.exe 110 PID 4508 wrote to memory of 3292 4508 cmd.exe 115 PID 4508 wrote to memory of 3292 4508 cmd.exe 115 PID 4508 wrote to memory of 3292 4508 cmd.exe 115 PID 4968 wrote to memory of 756 4968 cmd.exe 116 PID 4968 wrote to memory of 756 4968 cmd.exe 116 PID 4968 wrote to memory of 756 4968 cmd.exe 116 PID 3292 wrote to memory of 368 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 140 PID 3292 wrote to memory of 368 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 140 PID 3292 wrote to memory of 368 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 140 PID 368 wrote to memory of 440 368 cmd.exe 118 PID 368 wrote to memory of 440 368 cmd.exe 118 PID 368 wrote to memory of 440 368 cmd.exe 118 PID 3292 wrote to memory of 2148 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 139 PID 3292 wrote to memory of 2148 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 139 PID 3292 wrote to memory of 2148 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 139 PID 3292 wrote to memory of 4700 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 119 PID 3292 wrote to memory of 4700 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 119 PID 3292 wrote to memory of 4700 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 119 PID 3292 wrote to memory of 4924 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 126 PID 3292 wrote to memory of 4924 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 126 PID 3292 wrote to memory of 4924 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 126 PID 3292 wrote to memory of 3208 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 125 PID 3292 wrote to memory of 3208 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 125 PID 3292 wrote to memory of 3208 3292 65a02a8e633a935bf53a4d3347eebaa1.exe 125 PID 3208 wrote to memory of 4972 3208 cmd.exe 122 PID 3208 wrote to memory of 4972 3208 cmd.exe 122 PID 3208 wrote to memory of 4972 3208 cmd.exe 122 PID 440 wrote to memory of 4240 440 65a02a8e633a935bf53a4d3347eebaa1.exe 138 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe"C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\DyMEscIA\OgQAkEAk.exe"C:\Users\Admin\DyMEscIA\OgQAkEAk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1188
-
-
C:\ProgramData\smMYcQgs\NcIYsYIA.exe"C:\ProgramData\smMYcQgs\NcIYsYIA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"2⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"4⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa15⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:4700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\igYUQwsw.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""6⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jucQAUoA.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""7⤵PID:2976
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- UAC bypass
PID:1860
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f7⤵
- UAC bypass
- Modifies registry key
PID:4836
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 27⤵PID:884
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:2448
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 17⤵
- Modifies visibility of file extensions in Explorer
PID:112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"7⤵PID:3192
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
PID:4924
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies registry key
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ymAEMUUk.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""7⤵PID:4264
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f7⤵
- UAC bypass
- Modifies registry key
PID:3740
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 27⤵PID:2976
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs8⤵PID:3948
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 17⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"7⤵PID:4952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"6⤵
- Suspicious use of WriteProcessMemory
PID:368
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:2352
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:416
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:3368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vIwoQYUs.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:756
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:1316
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:2452
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:4392
-
-
C:\ProgramData\FCIoIsoY\tKcswkgA.exeC:\ProgramData\FCIoIsoY\tKcswkgA.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4320
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gEUoAMYc.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""2⤵PID:1180
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:4644
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:2796
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:3448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"2⤵PID:4240
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4972
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"2⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UAEEokQs.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""2⤵PID:4872
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:2108
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:4512
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:4696
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:4484
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"1⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa12⤵
- Suspicious behavior: EnumeratesProcesses
PID:964 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:2804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DgMoYgcY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""3⤵PID:4384
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:2604
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
PID:4812
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa14⤵PID:1620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"3⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa14⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"5⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa16⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"7⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa18⤵
- Suspicious behavior: EnumeratesProcesses
PID:912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"9⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa110⤵PID:756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"11⤵PID:3444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cmsMkgMk.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""11⤵PID:3816
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs12⤵PID:2112
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵PID:408
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f11⤵
- UAC bypass
PID:632
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 211⤵PID:2560
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 111⤵
- Modifies visibility of file extensions in Explorer
PID:2488
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PAwQAQUc.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""9⤵PID:2076
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs10⤵PID:4236
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f9⤵PID:2588
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 29⤵PID:4548
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 19⤵
- Modifies registry key
PID:3844
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lcMMYUIg.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""7⤵PID:1640
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs8⤵PID:1624
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f7⤵
- UAC bypass
- Modifies registry key
PID:772
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 27⤵
- Modifies registry key
PID:4876
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 17⤵
- Modifies registry key
PID:1124
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4348 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs6⤵PID:1124
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵
- UAC bypass
PID:4304
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵PID:4712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YuwYcMUY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""5⤵PID:3720
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs6⤵PID:2448
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Modifies visibility of file extensions in Explorer
PID:964
-
-
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oYcMMQgY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""1⤵PID:2316
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:4268
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:1076
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2592
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"2⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"4⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"6⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa17⤵PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iAIkIMoo.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""6⤵PID:3892
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵
- Suspicious behavior: EnumeratesProcesses
PID:756
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- Modifies registry key
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa17⤵PID:3356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"8⤵
- Modifies visibility of file extensions in Explorer
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa19⤵PID:2592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"10⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa111⤵PID:3444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"12⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa113⤵PID:3720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"14⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa115⤵PID:2696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"16⤵PID:4592
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV117⤵PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa117⤵PID:2236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"18⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa119⤵PID:3272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"20⤵PID:4672
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV121⤵PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa121⤵PID:400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"22⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa123⤵PID:688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"24⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa125⤵PID:4856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"26⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa127⤵PID:1952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"28⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa129⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"30⤵
- Modifies visibility of file extensions in Explorer
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa131⤵PID:2860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"32⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa133⤵PID:2300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"34⤵PID:1868
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵
- Modifies visibility of file extensions in Explorer
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa135⤵
- Modifies visibility of file extensions in Explorer
PID:3776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"36⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa137⤵PID:3156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"38⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa139⤵PID:2464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"40⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa141⤵PID:3616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"42⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa143⤵
- Modifies visibility of file extensions in Explorer
PID:744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"44⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa145⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"46⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa147⤵PID:4700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"48⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa149⤵PID:4220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"50⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa151⤵PID:2444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"52⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa153⤵PID:3948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"54⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa155⤵PID:4436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"56⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa157⤵PID:4220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"58⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa159⤵PID:3604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"60⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa161⤵PID:1868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"62⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa163⤵PID:4700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"64⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa165⤵PID:1424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"66⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa167⤵PID:1200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"68⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa169⤵PID:4392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"70⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa171⤵PID:3292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"72⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa173⤵PID:2408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"74⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa175⤵PID:2152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"76⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa177⤵PID:2352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"78⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa179⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"80⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa181⤵PID:2592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"82⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa183⤵PID:4496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"84⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa185⤵PID:3236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"86⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa187⤵PID:4868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"88⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa189⤵PID:3880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"90⤵PID:4640
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa191⤵PID:4412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"92⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa193⤵
- Adds Run key to start application
PID:1828 -
C:\Users\Admin\iYIUAgIA\wGEAoAIY.exe"C:\Users\Admin\iYIUAgIA\wGEAoAIY.exe"94⤵PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 37295⤵
- Program crash
PID:2084
-
-
-
C:\ProgramData\fcYEoEUs\OgoEccIk.exe"C:\ProgramData\fcYEoEUs\OgoEccIk.exe"94⤵PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 26495⤵
- Program crash
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"94⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa195⤵PID:4880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"96⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa197⤵PID:3184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"98⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa199⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"100⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1101⤵PID:2448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"102⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1103⤵PID:2108
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1102⤵
- Modifies visibility of file extensions in Explorer
PID:4676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CQYgEYEs.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""102⤵PID:4396
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs103⤵PID:2640
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f102⤵
- UAC bypass
- Modifies registry key
PID:1724
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2102⤵PID:1316
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1100⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4856
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2100⤵PID:3068
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f100⤵
- UAC bypass
PID:2588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PAwYUUEQ.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""100⤵PID:3996
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs101⤵PID:184
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 198⤵PID:2304
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 298⤵PID:844
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f98⤵
- UAC bypass
PID:2576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\legwQswo.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""98⤵PID:4704
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs99⤵PID:720
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 196⤵
- Modifies visibility of file extensions in Explorer
PID:2452
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f96⤵
- UAC bypass
- Modifies registry key
PID:3288
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 296⤵
- Modifies registry key
PID:2720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hogsoUgY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""96⤵PID:2400
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs97⤵PID:1320
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 194⤵
- Modifies visibility of file extensions in Explorer
PID:4936
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 294⤵PID:1624
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f94⤵
- UAC bypass
- Modifies registry key
PID:2352
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lwQIEwwk.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""92⤵PID:4404
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs93⤵PID:3724
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f92⤵
- UAC bypass
PID:2352
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 292⤵PID:2072
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 192⤵PID:4672
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mQocgsMM.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""90⤵PID:3068
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs91⤵PID:2200
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f90⤵
- UAC bypass
PID:2504
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 290⤵PID:400
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 190⤵
- Modifies visibility of file extensions in Explorer
PID:4080
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 188⤵
- Modifies visibility of file extensions in Explorer
PID:2376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wQgIQwos.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""88⤵PID:1612
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs89⤵PID:1600
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f88⤵
- UAC bypass
- Modifies registry key
PID:324
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 288⤵
- Modifies registry key
PID:3504 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵
- UAC bypass
PID:1604
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 186⤵
- Modifies visibility of file extensions in Explorer
PID:1452
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 286⤵
- Modifies registry key
PID:456
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f86⤵
- UAC bypass
- Modifies registry key
PID:1424 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵
- Modifies visibility of file extensions in Explorer
PID:688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PaUkAgQo.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""86⤵PID:520
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs87⤵PID:920
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
- Modifies visibility of file extensions in Explorer
PID:2860
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵
- Modifies registry key
PID:1860
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵
- UAC bypass
PID:2148
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rUEcIEkE.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""84⤵PID:4124
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs85⤵PID:4788
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
- Modifies visibility of file extensions in Explorer
PID:4036
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵PID:220
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵PID:2236
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:4392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UssAcgsI.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""82⤵PID:4572
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵
- UAC bypass
PID:3208
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵PID:4596
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵PID:3688
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
- Modifies visibility of file extensions in Explorer
PID:4884
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵
- UAC bypass
PID:964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dEwgQokY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""80⤵PID:2076
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:4420
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵PID:3888
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵PID:2084
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵
- UAC bypass
PID:5080
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
- UAC bypass
PID:3156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sOgcEQAk.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""78⤵PID:1896
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵PID:2452
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
- Modifies visibility of file extensions in Explorer
PID:3160
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵
- UAC bypass
- Modifies registry key
PID:4120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tQkIUgYM.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""76⤵PID:2476
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs77⤵PID:3420
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵PID:1600
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵
- Modifies visibility of file extensions in Explorer
PID:4592
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AKUQAMkY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""74⤵PID:2916
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵PID:2660
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵PID:1604
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵PID:2592
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
- Modifies registry key
PID:688 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:3272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OiMMgswA.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""72⤵PID:4980
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵PID:4420
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵
- UAC bypass
PID:4848
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵PID:3236
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵
- Modifies visibility of file extensions in Explorer
PID:4488
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵PID:1504
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵
- UAC bypass
PID:2976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AycocMkU.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""70⤵PID:1336
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵PID:3640
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
- Modifies visibility of file extensions in Explorer
PID:4696
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵PID:2412
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵PID:3208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HagscMoo.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""68⤵PID:2784
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵PID:4304
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FcQAEcMU.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""66⤵PID:4788
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵PID:3888
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵
- UAC bypass
PID:1456
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵
- Modifies registry key
PID:2804
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵
- Modifies visibility of file extensions in Explorer
PID:2344
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵
- Modifies registry key
PID:2200
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵PID:4996
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵PID:5080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ROMgkIEM.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""64⤵PID:1824
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵PID:3272
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
- Modifies visibility of file extensions in Explorer
PID:440
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵PID:4176
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵
- UAC bypass
PID:2316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tAEgIYQw.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""62⤵PID:4940
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵PID:2668
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵
- Modifies visibility of file extensions in Explorer
PID:4428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oGAUUckk.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""60⤵PID:1504
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵PID:920
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
- UAC bypass
PID:2984
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵PID:3004
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵
- Modifies visibility of file extensions in Explorer
PID:3992
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
- UAC bypass
PID:4588
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IScckEkg.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""58⤵PID:2412
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵PID:2452
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
- Modifies visibility of file extensions in Explorer
PID:3844
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵PID:3292
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
- UAC bypass
PID:2504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WywoscEs.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""56⤵PID:3484
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs57⤵PID:4712
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4524
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵PID:2744
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵
- UAC bypass
PID:3988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RawUsQgA.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""54⤵PID:4868
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵PID:4412
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
- UAC bypass
- Modifies registry key
PID:4372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HgswAEIE.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""52⤵PID:5108
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵PID:2252
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵PID:628
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵
- Modifies visibility of file extensions in Explorer
PID:2968
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EiUMoEks.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""50⤵PID:2664
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵PID:1824
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- UAC bypass
PID:1836
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵PID:848
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵
- Modifies visibility of file extensions in Explorer
PID:4328
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PSIoYUkU.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""48⤵PID:3192
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵PID:2488
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
- UAC bypass
PID:2888
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵PID:824
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵
- Modifies registry key
PID:4348
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4620
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵PID:4344
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵
- UAC bypass
- Modifies registry key
PID:1456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qiccMYgU.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""46⤵PID:4936
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵PID:1864
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LCMMkwQY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""44⤵PID:4812
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵PID:2112
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
- UAC bypass
- Modifies registry key
PID:4696
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵PID:1652
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
- Modifies visibility of file extensions in Explorer
PID:772
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- UAC bypass
PID:916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DaAogMoE.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""42⤵PID:1336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:2072
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵PID:3400
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵PID:1320
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aasMwYAY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""40⤵PID:5088
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵PID:1280
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- UAC bypass
PID:2888
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
- Modifies registry key
PID:4004
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies visibility of file extensions in Explorer
PID:3740
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵PID:4384
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3768
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
- UAC bypass
PID:1824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cGMEAEgI.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""38⤵PID:3188
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵PID:5108
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵PID:1160
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4452
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵PID:4336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:4508
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵
- Modifies registry key
PID:324 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵
- UAC bypass
PID:4368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rWcwMook.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""36⤵PID:2904
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:4696
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵PID:744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PwYwUAMI.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""34⤵PID:3948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵PID:3272
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:3404
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵PID:4220
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵
- Modifies visibility of file extensions in Explorer
PID:5028
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Modifies registry key
PID:1424
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵PID:2916
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵PID:3284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JsIYIwMc.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""32⤵PID:2684
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:4624
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies visibility of file extensions in Explorer
PID:5080
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- UAC bypass
PID:2316
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵PID:1484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gwUsEUwY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""30⤵PID:4872
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵PID:1448
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:4588
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies visibility of file extensions in Explorer
PID:5032
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:2072
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- UAC bypass
PID:4712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IQwIcgwY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""28⤵PID:2892
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:4692
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MCgwIMco.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""26⤵PID:4980
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:3272
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵PID:4484
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵PID:3948
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies registry key
PID:4888
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies visibility of file extensions in Explorer
PID:2636 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV125⤵PID:2408
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- UAC bypass
PID:4264
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵PID:2660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aCQwgUkM.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""24⤵PID:1160
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:2300
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1468 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV123⤵PID:4548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\geEIsUwg.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""22⤵PID:1680
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:3504
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
- Modifies registry key
PID:2740
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵PID:4372
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iAwAoQog.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""20⤵PID:1448
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:4524
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵PID:3292
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:4708
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵PID:4296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cSYIcYYQ.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""18⤵PID:2892
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV119⤵
- UAC bypass
PID:324
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:4348
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵PID:1392
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵PID:3948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV119⤵
- UAC bypass
PID:3260
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies visibility of file extensions in Explorer
PID:2976 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV117⤵PID:2444
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
PID:2660
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵PID:1424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vsQYsgEk.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""16⤵PID:488
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:644
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
- Modifies visibility of file extensions in Explorer
PID:4548
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
PID:1864 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵PID:3892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BAoMgEww.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""14⤵PID:4228
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵PID:2148
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- Modifies registry key
PID:912
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
PID:3268
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:3288
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
- Modifies registry key
PID:2344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FwQQUUIE.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""12⤵PID:456
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:3888
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵PID:5032
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:4412
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:3296
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:3484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cEYYwEQg.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""10⤵PID:540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:3004
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:3260
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
PID:4876
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SmEAAEwY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""8⤵PID:1392
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵PID:2444
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 19⤵
- Modifies visibility of file extensions in Explorer
PID:1460
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:2976
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies registry key
PID:5028
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- UAC bypass
PID:2588
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵PID:4548
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TUUAYIEc.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""4⤵PID:4396
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:2420
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:1788
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:3964
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4368
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QcAkoMos.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""2⤵PID:2088
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:3236
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:5080
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:644
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa11⤵PID:2560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"2⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa13⤵PID:3272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eogsYIgE.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""4⤵PID:1468
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LGMYQkYA.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""2⤵PID:1476
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:1860
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3180
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"1⤵PID:4412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hKIgIUcc.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""1⤵PID:4968
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:2660
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:3740
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵
- Modifies registry key
PID:408
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:5096
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa12⤵PID:2628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ImcwsUss.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""3⤵PID:440
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2076
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:4948
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:680
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:2300
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
PID:1896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"3⤵PID:2860
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa11⤵PID:2444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"2⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa13⤵PID:1160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"4⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa15⤵PID:4512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rqYoMAok.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""6⤵PID:2056
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
- Modifies registry key
PID:680
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:4392
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qWAoYogg.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""4⤵PID:2480
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵PID:1640
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:3364
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:216
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2168
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zOsAYMMI.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""2⤵PID:1608
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:1180
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:824
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4436
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3100
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3552
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4924
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"1⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa12⤵PID:4620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"3⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa14⤵PID:3880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"5⤵PID:4512
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa16⤵PID:220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"7⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa18⤵PID:4264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"9⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa110⤵PID:3424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\woUYYscI.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""9⤵PID:3604
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f9⤵PID:4368
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 29⤵PID:2408
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 19⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4984
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mssgMQAY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""7⤵PID:4188
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f7⤵
- UAC bypass
PID:4800
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 27⤵
- Modifies registry key
PID:884
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 17⤵PID:3776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"6⤵PID:4592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eGEgsccA.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""5⤵PID:1292
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵
- UAC bypass
PID:3196
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵PID:3472
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵
- Modifies registry key
PID:4392
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jgAIgsAA.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""3⤵PID:1688
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:2664
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:3260
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵
- Modifies registry key
PID:1328
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
PID:2968
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3484
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WOAkIosQ.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""1⤵PID:3004
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:324
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:2784
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:4436
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa11⤵PID:3208
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:5040
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4432
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3272
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:1640
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:2152
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:1392
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"1⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa12⤵PID:3480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tgYkskYY.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""3⤵PID:4692
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:2112
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:3964
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1"3⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3096
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2168
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1280
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LYcAQYco.bat" "C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exe""1⤵PID:4348
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:404
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:456
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:1468
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:644
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2784
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4392
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa1.exeC:\Users\Admin\AppData\Local\Temp\65a02a8e633a935bf53a4d3347eebaa11⤵PID:2148
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1604
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1200
-
-
C:\ProgramData\ZsYAYIMk\hAskMgcs.exeC:\ProgramData\ZsYAYIMk\hAskMgcs.exe1⤵PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 2602⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4480 -ip 44801⤵PID:4384
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
430KB
MD5b5f78fae2579f724118327500f3ae40b
SHA1f6c7d462102dc46c567bd4ff0fc3c27fedb276c4
SHA256d3417c69fea2fd05d63c953fda37e0087012d9c43fa655426c7815a79835f203
SHA512f173c73b8a7461684bf8b1e52dcba12c4646aa26323bce8f393b552fa769a90a63e04aea976911b2a87d1034c04a2c9b4fc44d6708154fdb06e10b5c1293d02b
-
Filesize
436KB
MD5df0c6899e033e86f71f299e5fc58a9aa
SHA144ee027b3fe4a24cb47b17a51ebf9bd3eae2854c
SHA2567134b7c7bebfad8a9ff0ef8e1a188cfcf407d13346fa0d422f2f20e28bd7f676
SHA5127d0e1643013de3c6aa09c4101e98f849a09e772103553be6013aeabdc6da2916c739a380eed3c884c435dd39e1a18069c788e489ba845a0ea1c59da317291f49
-
Filesize
286KB
MD5d67be0fe5785cc3be4ac10fcdd6111a8
SHA1075964310b57cf6cd3d0aca7831aaa373f6afb9d
SHA2569ab0f5eca23188f404aa0b82c6c20d6b6b04c213c999a1d3e6b4605c0ce864b8
SHA5120b41301895bf5aa6f089776df3a8e10f7645185d3c3caa49a04d412d50c076cca553023fa182b8aead562993e745af3d2ca2dc8dbede37a516440f525082dc92
-
Filesize
24KB
MD5e0494587ab304d264ebd8f3bde154e1f
SHA1e28743d178be539b2deac13b14180004051f2bcd
SHA2566630491e258221f7fa46e79e76622b96b5cd945f9432c15d6ad5250b1e5cb2a0
SHA5127baa0e47c44882bc7ff6c07ca33c2af67d0280107bc6801435d88fe842cd4b95d03c7fdc66fb83ddfa04576a52f6ec758f5f182b922c5fac7d6f03cbe75b979c
-
Filesize
48KB
MD501756f45662d7cff811ff986e2fd4e66
SHA1fd67e79512c5386dda615835a40dfe5f286437bc
SHA2561732b081443d1e292dd1a4477ecd8be81fa350cf3b3ce6dd222567b7585a8895
SHA512c78311075d33ff2a253dcb86911355ed76ab349fc2f83bc6ab042dcea56d5d092af8abb2598372cd988210549376d023f6c34e92cb8816f4736d91dad606c2e1
-
Filesize
478KB
MD50405d6831ebd995f78262898478e2368
SHA14d68fde5d55102632afce58553124a26b25dde2d
SHA256a911c4a25699c6f080bc7df62a6a9f49c82b95ad029df88227613cfab650ffb6
SHA512128f1c0482668d3b54b93c49cd04f378d930afee366f53277f1e7b32df0d593e4fb1249c09636e123edc0521563e9a76d23d5165f24b46ae704ba54af5762184
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
2.2MB
MD595981d1853bcec5c8eaf8541d773191e
SHA1098c354eaf1f51ead2c388f3af54dc740370847c
SHA25604d41ff398cd10bbb49f7fb4d6ab8c9f6a06e54fd33c9a0ff482ebb4a9f671bf
SHA5121d49e04c53fe2eb55a23bf2adefcec049dd390fc88a551600dc1909e46e7d7e1de8dbff972fc71a030a7f232b6c6d765f2fa23a630b9fc46099ee258481a30cd
-
Filesize
561KB
MD566efb90ef51dc371592c72ca2ac9982b
SHA1baa38ee05e264bcbc9f753843b863e31a5f39ec8
SHA2565338eae96bdacb0c7ddb894eb91483514c74f1597c3ce05a00bfdc3868e58ec6
SHA51200b9a7385ffd3ee5ea27a8675f0989c7eb9e892491fc994de42d36720a285ae595e26cefdfd9f4feb0c0879847a1fe02e81671a8bc5a04917f7f9a2b226a69c5
-
Filesize
891KB
MD5319e209cb664b4ecb6e17cfc4d7ec2c5
SHA1cdda56b45d653404169b1b6b772f0cb6ae9e33f8
SHA256d4573b3e884985cbba65fd691403b0e81644c57336b0601351ad779bd469bfe7
SHA5128ca0bc854114b5ff78f8c7898ab063d32b03d2f774355c4d34661284377643084c475c6f477776a6e7b7e0c439698c2b1cec43e16c45704a581ca53d3fbcffb6
-
Filesize
460KB
MD57cc9b4c64d9f2d8346cfc02842ee84e8
SHA19efd5088f8dbba64ff4852fd7f7cdf40cd93b8b8
SHA256692be0c1bfd887a648a85ad73f8d7ab48c690412907955967c7de92600c0b0b5
SHA51289085e6a4bfa1f65bdbf050c3d7f9542f2c447210a32cbd6ae89dfbf20bdfd110623f1bd6ce55edd614f02f13c8cdde1d942f8a14678a447a9eec02a0741457f
-
Filesize
4KB
MD5ee421bd295eb1a0d8c54f8586ccb18fa
SHA1bc06850f3112289fce374241f7e9aff0a70ecb2f
SHA25657e72b9591e318a17feb74efa1262e9222814ad872437094734295700f669563
SHA512dfd36dff3742f39858e4a3e781e756f6d8480caa33b715ad1a8293f6ef436cdc84c3d26428230cdac8651c1ee7947b0e5bb3ac1e32c0b7bbb2bfed81375b5897
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
434KB
MD584c764d0dcd2fa7974d9d05001dba141
SHA1af2b15a3113c355a9d051cd001f0f183310d90bc
SHA2561a51e1b8167e9dd603b1b83eba2b5339635c814cbeed2624747b4e03728c6c7d
SHA51223267562c15c2c90d16b68b8027c5083492db4fb8ce8ec1ee2cabc87706da938ab406e6526de728cb63466166398fe55895baffd1dae4a93e62738dac35fd28a