Overview
overview
9Static
static
3CoutX-Setup.exe
windows10-2004-x64
7CoutX-Setup.exe
windows10-1703-x64
7$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows10-1703-x64
3$PLUGINSDI...nu.dll
windows10-1703-x64
3$PLUGINSDI...nu.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3CoutX.exe
windows10-2004-x64
6CoutX.exe
windows10-1703-x64
6MSVCP140.dll
windows10-2004-x64
1MSVCP140.dll
windows10-1703-x64
1VCRUNTIME140.dll
windows7-x64
1VCRUNTIME140.dll
windows10-1703-x64
1VCRUNTIME140_1.dll
windows11-21h2-x64
1VCRUNTIME140_1.dll
windows10-1703-x64
1tools/CoutX.bat
windows10-1703-x64
9tools/CoutX.bat
windows10-1703-x64
9tools/MinSudo.exe
windows10-2004-x64
1tools/MinSudo.exe
windows10-1703-x64
1tools/SetT...on.exe
windows10-1703-x64
1tools/SetT...on.exe
windows10-1703-x64
1tools/nvid...or.exe
windows10-2004-x64
1tools/nvid...or.exe
windows10-1703-x64
1Analysis
-
max time kernel
138s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
29-06-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
CoutX-Setup.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
CoutX-Setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
CoutX.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
CoutX.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
MSVCP140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
MSVCP140.dll
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
VCRUNTIME140.dll
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
VCRUNTIME140.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
VCRUNTIME140_1.dll
Resource
win11-20240611-en
Behavioral task
behavioral16
Sample
VCRUNTIME140_1.dll
Resource
win10-20240611-en
Behavioral task
behavioral17
Sample
tools/CoutX.bat
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
tools/CoutX.bat
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
tools/MinSudo.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
tools/MinSudo.exe
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
tools/SetTimerResolution.exe
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
tools/SetTimerResolution.exe
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
tools/nvidiaProfileInspector/nvidiaProfileInspector.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
tools/nvidiaProfileInspector/nvidiaProfileInspector.exe
Resource
win10-20240404-en
General
-
Target
tools/CoutX.bat
-
Size
61KB
-
MD5
9d9de233b39212edd52f376bdabc2b9c
-
SHA1
0f0ae692ec22867fbf4ee600efa7a9169f52ea28
-
SHA256
f783d2390ba2b2755c6b2467630d1d2703920cb4d42d34fb789fac9789e7bd18
-
SHA512
71c5e21745cc30f9cc6720cc9049415a8c8495487f7a9d26717ef6b56b49028f7d80ae1f175762e1ed3382fb6df6ae43f843d7cd1d164dbb7a4a25b677205293
-
SSDEEP
768:xGLTOwOkZ6DWMpLcKwtNh60aLIKoPw5PuE3MfFzL2IuGQIGQObWszHPjHv7gBOBF:YacKwXsIKoCuEFC0WszHPbv72+
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 6 IoCs
pid Process 1028 bcdedit.exe 920 bcdedit.exe 2740 bcdedit.exe 2352 bcdedit.exe 4652 bcdedit.exe 5092 bcdedit.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe\AuditLevel = "8" reg.exe -
Boot or Logon Autostart Execution: LSASS Driver 1 TTPs 1 IoCs
Adversaries may modify or add LSASS drivers to obtain persistence on compromised systems.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\RunAsPPL = "1" reg.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Power Settings 1 TTPs 30 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1212 powercfg.exe 2016 powercfg.exe 4248 powercfg.exe 1192 reg.exe 816 powercfg.exe 164 powercfg.exe 4112 powercfg.exe 4816 powercfg.exe 920 powercfg.exe 2788 powercfg.exe 3068 powercfg.exe 4300 powercfg.exe 1588 powercfg.exe 4880 powercfg.exe 1224 powercfg.exe 788 powercfg.exe 5064 powercfg.exe 4272 powercfg.exe 684 powercfg.exe 2536 powercfg.exe 1808 powercfg.exe 2208 powercfg.exe 3240 powercfg.exe 4140 powercfg.exe 3192 powercfg.exe 2744 powercfg.exe 1560 powercfg.exe 3584 powercfg.exe 824 powercfg.exe 4432 powercfg.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DISM\dism.log Dism.exe File created C:\Windows\rescache\_merged\2717123927\1590785016.pri explorer.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri SearchUI.exe File created C:\Windows\rescache\_merged\4032412167\4002656488.pri explorer.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 1 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 872 powershell.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1688 sc.exe 3068 sc.exe 4652 sc.exe 1688 sc.exe 4784 sc.exe 1772 sc.exe 3288 sc.exe 2408 sc.exe 516 sc.exe 3588 sc.exe 2124 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 1212 reg.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 39 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Checks SCSI registry key(s) 3 TTPs 26 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1896 ipconfig.exe -
Kills process with taskkill 4 IoCs
pid Process 372 taskkill.exe 2912 taskkill.exe 4824 taskkill.exe 1128 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\GPU SearchUI.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\System\GameConfigStore\Children reg.exe Key deleted \REGISTRY\USER\.DEFAULT\System\GameConfigStore\Parents reg.exe Key deleted \REGISTRY\USER\.DEFAULT\System\GameConfigStore reg.exe -
Modifies registry class 33 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ms-msdt\shell reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ms-msdt reg.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ms-msdt\shell\open\command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133567065728993929" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ms-msdt\shell\open reg.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe -
Modifies registry key 1 TTPs 29 IoCs
pid Process 2016 reg.exe 2788 reg.exe 1572 reg.exe 3040 reg.exe 4612 reg.exe 3384 reg.exe 3120 reg.exe 3600 reg.exe 1892 reg.exe 4200 reg.exe 3148 reg.exe 1400 reg.exe 780 reg.exe 780 reg.exe 392 reg.exe 4612 reg.exe 404 reg.exe 2428 reg.exe 224 reg.exe 2724 reg.exe 1560 reg.exe 3080 reg.exe 1264 reg.exe 3040 reg.exe 2716 reg.exe 4064 reg.exe 3100 reg.exe 3176 reg.exe 4420 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 872 powershell.exe 872 powershell.exe 872 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4628 WMIC.exe Token: SeSecurityPrivilege 4628 WMIC.exe Token: SeTakeOwnershipPrivilege 4628 WMIC.exe Token: SeLoadDriverPrivilege 4628 WMIC.exe Token: SeSystemProfilePrivilege 4628 WMIC.exe Token: SeSystemtimePrivilege 4628 WMIC.exe Token: SeProfSingleProcessPrivilege 4628 WMIC.exe Token: SeIncBasePriorityPrivilege 4628 WMIC.exe Token: SeCreatePagefilePrivilege 4628 WMIC.exe Token: SeBackupPrivilege 4628 WMIC.exe Token: SeRestorePrivilege 4628 WMIC.exe Token: SeShutdownPrivilege 4628 WMIC.exe Token: SeDebugPrivilege 4628 WMIC.exe Token: SeSystemEnvironmentPrivilege 4628 WMIC.exe Token: SeRemoteShutdownPrivilege 4628 WMIC.exe Token: SeUndockPrivilege 4628 WMIC.exe Token: SeManageVolumePrivilege 4628 WMIC.exe Token: 33 4628 WMIC.exe Token: 34 4628 WMIC.exe Token: 35 4628 WMIC.exe Token: 36 4628 WMIC.exe Token: SeIncreaseQuotaPrivilege 4628 WMIC.exe Token: SeSecurityPrivilege 4628 WMIC.exe Token: SeTakeOwnershipPrivilege 4628 WMIC.exe Token: SeLoadDriverPrivilege 4628 WMIC.exe Token: SeSystemProfilePrivilege 4628 WMIC.exe Token: SeSystemtimePrivilege 4628 WMIC.exe Token: SeProfSingleProcessPrivilege 4628 WMIC.exe Token: SeIncBasePriorityPrivilege 4628 WMIC.exe Token: SeCreatePagefilePrivilege 4628 WMIC.exe Token: SeBackupPrivilege 4628 WMIC.exe Token: SeRestorePrivilege 4628 WMIC.exe Token: SeShutdownPrivilege 4628 WMIC.exe Token: SeDebugPrivilege 4628 WMIC.exe Token: SeSystemEnvironmentPrivilege 4628 WMIC.exe Token: SeRemoteShutdownPrivilege 4628 WMIC.exe Token: SeUndockPrivilege 4628 WMIC.exe Token: SeManageVolumePrivilege 4628 WMIC.exe Token: 33 4628 WMIC.exe Token: 34 4628 WMIC.exe Token: 35 4628 WMIC.exe Token: 36 4628 WMIC.exe Token: SeIncreaseQuotaPrivilege 2456 WMIC.exe Token: SeSecurityPrivilege 2456 WMIC.exe Token: SeTakeOwnershipPrivilege 2456 WMIC.exe Token: SeLoadDriverPrivilege 2456 WMIC.exe Token: SeSystemProfilePrivilege 2456 WMIC.exe Token: SeSystemtimePrivilege 2456 WMIC.exe Token: SeProfSingleProcessPrivilege 2456 WMIC.exe Token: SeIncBasePriorityPrivilege 2456 WMIC.exe Token: SeCreatePagefilePrivilege 2456 WMIC.exe Token: SeBackupPrivilege 2456 WMIC.exe Token: SeRestorePrivilege 2456 WMIC.exe Token: SeShutdownPrivilege 2456 WMIC.exe Token: SeDebugPrivilege 2456 WMIC.exe Token: SeSystemEnvironmentPrivilege 2456 WMIC.exe Token: SeRemoteShutdownPrivilege 2456 WMIC.exe Token: SeUndockPrivilege 2456 WMIC.exe Token: SeManageVolumePrivilege 2456 WMIC.exe Token: 33 2456 WMIC.exe Token: 34 2456 WMIC.exe Token: 35 2456 WMIC.exe Token: 36 2456 WMIC.exe Token: SeIncreaseQuotaPrivilege 2456 WMIC.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe 3128 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4156 SearchUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 3692 4268 cmd.exe 73 PID 4268 wrote to memory of 3692 4268 cmd.exe 73 PID 4268 wrote to memory of 5084 4268 cmd.exe 74 PID 4268 wrote to memory of 5084 4268 cmd.exe 74 PID 5084 wrote to memory of 4628 5084 cmd.exe 75 PID 5084 wrote to memory of 4628 5084 cmd.exe 75 PID 4268 wrote to memory of 1452 4268 cmd.exe 77 PID 4268 wrote to memory of 1452 4268 cmd.exe 77 PID 4268 wrote to memory of 3596 4268 cmd.exe 78 PID 4268 wrote to memory of 3596 4268 cmd.exe 78 PID 4268 wrote to memory of 3020 4268 cmd.exe 79 PID 4268 wrote to memory of 3020 4268 cmd.exe 79 PID 4268 wrote to memory of 2980 4268 cmd.exe 80 PID 4268 wrote to memory of 2980 4268 cmd.exe 80 PID 4268 wrote to memory of 824 4268 cmd.exe 81 PID 4268 wrote to memory of 824 4268 cmd.exe 81 PID 4268 wrote to memory of 4624 4268 cmd.exe 82 PID 4268 wrote to memory of 4624 4268 cmd.exe 82 PID 4268 wrote to memory of 4156 4268 cmd.exe 83 PID 4268 wrote to memory of 4156 4268 cmd.exe 83 PID 4268 wrote to memory of 192 4268 cmd.exe 84 PID 4268 wrote to memory of 192 4268 cmd.exe 84 PID 4268 wrote to memory of 212 4268 cmd.exe 85 PID 4268 wrote to memory of 212 4268 cmd.exe 85 PID 4268 wrote to memory of 752 4268 cmd.exe 86 PID 4268 wrote to memory of 752 4268 cmd.exe 86 PID 4268 wrote to memory of 32 4268 cmd.exe 87 PID 4268 wrote to memory of 32 4268 cmd.exe 87 PID 4268 wrote to memory of 616 4268 cmd.exe 88 PID 4268 wrote to memory of 616 4268 cmd.exe 88 PID 4268 wrote to memory of 3176 4268 cmd.exe 89 PID 4268 wrote to memory of 3176 4268 cmd.exe 89 PID 4268 wrote to memory of 4616 4268 cmd.exe 90 PID 4268 wrote to memory of 4616 4268 cmd.exe 90 PID 4268 wrote to memory of 4600 4268 cmd.exe 91 PID 4268 wrote to memory of 4600 4268 cmd.exe 91 PID 4268 wrote to memory of 4020 4268 cmd.exe 92 PID 4268 wrote to memory of 4020 4268 cmd.exe 92 PID 4268 wrote to memory of 4732 4268 cmd.exe 93 PID 4268 wrote to memory of 4732 4268 cmd.exe 93 PID 4268 wrote to memory of 3600 4268 cmd.exe 94 PID 4268 wrote to memory of 3600 4268 cmd.exe 94 PID 4268 wrote to memory of 780 4268 cmd.exe 95 PID 4268 wrote to memory of 780 4268 cmd.exe 95 PID 4268 wrote to memory of 1892 4268 cmd.exe 96 PID 4268 wrote to memory of 1892 4268 cmd.exe 96 PID 4268 wrote to memory of 3080 4268 cmd.exe 97 PID 4268 wrote to memory of 3080 4268 cmd.exe 97 PID 4268 wrote to memory of 4420 4268 cmd.exe 98 PID 4268 wrote to memory of 4420 4268 cmd.exe 98 PID 4268 wrote to memory of 2716 4268 cmd.exe 99 PID 4268 wrote to memory of 2716 4268 cmd.exe 99 PID 4268 wrote to memory of 1264 4268 cmd.exe 100 PID 4268 wrote to memory of 1264 4268 cmd.exe 100 PID 4268 wrote to memory of 224 4268 cmd.exe 101 PID 4268 wrote to memory of 224 4268 cmd.exe 101 PID 4268 wrote to memory of 3120 4268 cmd.exe 102 PID 4268 wrote to memory of 3120 4268 cmd.exe 102 PID 4268 wrote to memory of 2016 4268 cmd.exe 103 PID 4268 wrote to memory of 2016 4268 cmd.exe 103 PID 4268 wrote to memory of 4064 4268 cmd.exe 104 PID 4268 wrote to memory of 4064 4268 cmd.exe 104 PID 4268 wrote to memory of 3040 4268 cmd.exe 105 PID 4268 wrote to memory of 3040 4268 cmd.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\tools\CoutX.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\system32\Dism.exedism2⤵
- Drops file in Windows directory
PID:3692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_VideoController get VideoProcessor /value2⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_VideoController get VideoProcessor /value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo SeaBIOS VBE(C) 2011 "2⤵PID:1452
-
-
C:\Windows\system32\find.exefind /I "GeForce"2⤵PID:3596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo SeaBIOS VBE(C) 2011 "2⤵PID:3020
-
-
C:\Windows\system32\find.exefind /I "NVIDIA"2⤵PID:2980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo SeaBIOS VBE(C) 2011 "2⤵PID:824
-
-
C:\Windows\system32\find.exefind /I "RTX"2⤵PID:4624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo SeaBIOS VBE(C) 2011 "2⤵PID:4156
-
-
C:\Windows\system32\find.exefind /I "GTX"2⤵PID:192
-
-
C:\Windows\system32\reg.exeReg add "HKLM\SYSTEM\CurrentControlSet\Control\CrashControl" /v "DisplayParameters" /t REG_DWORD /d "1" /f2⤵PID:212
-
-
C:\Windows\system32\reg.exeReg delete "HKLM\System\CurrentControlSet\Control\Session Manager\Environment" /v "__COMPAT_LAYER" /f2⤵PID:752
-
-
C:\Windows\system32\reg.exeReg delete "HKCU\System\GameConfigStore" /v "GameDVR_FSEBehavior" /f2⤵PID:32
-
-
C:\Windows\system32\reg.exeReg delete "HKCU\System\GameConfigStore" /v "GameDVR_DSEBehavior" /f2⤵PID:616
-
-
C:\Windows\system32\reg.exeReg delete "HKLM\System\GameConfigStore" /f2⤵PID:3176
-
-
C:\Windows\system32\reg.exeReg delete "HKU\.Default\System\GameConfigStore" /f2⤵
- Modifies data under HKEY_USERS
PID:4616
-
-
C:\Windows\system32\reg.exeReg delete "HKU\S-1-5-19\System\GameConfigStore" /f2⤵PID:4600
-
-
C:\Windows\system32\reg.exeReg delete "HKU\S-1-5-20\System\GameConfigStore" /f2⤵PID:4020
-
-
C:\Windows\system32\reg.exeReg delete "HKCU\Software\Classes\System\GameConfigStore" /f2⤵PID:4732
-
-
C:\Windows\system32\reg.exeReg add HKCU\System\GameConfigStore /v GameDVR_Enabled /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:3600
-
-
C:\Windows\system32\reg.exeReg add HKCU\Software\Policies\Microsoft\Windows\GameDVR /v AllowGameDVR /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:780
-
-
C:\Windows\system32\reg.exeReg add HKLM\Software\Microsoft\PolicyManager\default\ApplicationManagement\AllowGameDVR /v value /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:1892
-
-
C:\Windows\system32\reg.exeReg add HKCU\Software\Microsoft\Windows\CurrentVersion\GameDVR /v AppCaptureEnabled /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:3080
-
-
C:\Windows\system32\reg.exeReg add HKCU\Software\Microsoft\Windows\CurrentVersion\GameDVR /v AudioCaptureEnabled /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:4420
-
-
C:\Windows\system32\reg.exeReg add HKCU\Software\Microsoft\Windows\CurrentVersion\GameDVR /v CursorCaptureEnabled /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:2716
-
-
C:\Windows\system32\reg.exeReg add HKCU\Software\Microsoft\Windows\CurrentVersion\GameDVR /v MicrophoneCaptureEnabled /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:1264
-
-
C:\Windows\system32\reg.exeReg add HKCU\Software\Microsoft\Windows\CurrentVersion\GameDVR /v HistoricalCaptureEnabled /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:224
-
-
C:\Windows\system32\reg.exeReg add HKCU\Software\Microsoft\GameBar /v UseNexusForGameBarEnabled /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:3120
-
-
C:\Windows\system32\reg.exeReg add HKCU\Software\Microsoft\GameBar /v GamepadDoublePressIntervalMs /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:2016
-
-
C:\Windows\system32\reg.exeReg add HKCU\Software\Microsoft\GameBar /v ShowStartupPanel /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:4064
-
-
C:\Windows\system32\reg.exeReg add HKCU\Software\Microsoft\GameBar /v GamePanelStartupTipIndex /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:3040
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Gaming.GameBar.PresenceServer.Internal.PresenceWriter" /v "ActivationType" /t REG_DWORD /d "0" /f2⤵PID:2288
-
-
C:\Windows\system32\reg.exeReg add HKCU\System\GameConfigStore /v GameDVR_FSEBehaviorMode /t REG_DWORD /d 2 /f2⤵
- Modifies registry key
PID:4612
-
-
C:\Windows\system32\reg.exeReg add HKCU\System\GameConfigStore /v GameDVR_EFSEFeatureFlags /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:4200
-
-
C:\Windows\system32\reg.exeReg add HKCU\System\GameConfigStore /v GameDVR_DXGIHonorFSEWindowsCompatible /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:2724
-
-
C:\Windows\system32\reg.exeReg add HKCU\System\GameConfigStore /v GameDVR_HonorUserFSEBehaviorMode /t REG_DWORD /d 1 /f2⤵
- Modifies registry key
PID:3100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Reg query "HKCU\Software\Microsoft\DirectX\UserGpuPreferences" /v "DirectXUserGlobalSettings" 2>nul | Find "REG_SZ"2⤵PID:2608
-
C:\Windows\system32\reg.exeReg query "HKCU\Software\Microsoft\DirectX\UserGpuPreferences" /v "DirectXUserGlobalSettings"3⤵PID:4604
-
-
C:\Windows\system32\find.exeFind "REG_SZ"3⤵PID:3580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "2⤵PID:5112
-
-
C:\Windows\system32\find.exeFind /I "VRROptimizeEnable"2⤵PID:424
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\DirectX\UserGpuPreferences" /v "DirectXUserGlobalSettings" /t REG_SZ /d "VRROptimizeEnable=1;" /f2⤵PID:3760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Reg query "HKCU\Software\Microsoft\DirectX\UserGpuPreferences" /v "DirectXUserGlobalSettings" 2>nul | Find "REG_SZ"2⤵PID:1004
-
C:\Windows\system32\reg.exeReg query "HKCU\Software\Microsoft\DirectX\UserGpuPreferences" /v "DirectXUserGlobalSettings"3⤵PID:1284
-
-
C:\Windows\system32\find.exeFind "REG_SZ"3⤵PID:4188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo VRROptimizeEnable=1; "2⤵PID:1488
-
-
C:\Windows\system32\find.exeFind /I "SwapEffectUpgradeEnable"2⤵PID:2912
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\DirectX\UserGpuPreferences" /v "DirectXUserGlobalSettings" /t REG_SZ /d "VRROptimizeEnable=1;SwapEffectUpgradeEnable=1;" /f2⤵PID:3036
-
-
C:\Windows\system32\reg.exeReg add HKCU\Software\Microsoft\DirectX\GraphicsSettings /v SwapEffectUpgradeCache /t REG_DWORD /d 1 /f2⤵
- Modifies registry key
PID:3148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Reg query "HKLM\System\CurrentControlSet\Control\Class" /v "VgaCompatible" /s 2>nul | findstr "HKEY"2⤵PID:2696
-
C:\Windows\system32\reg.exeReg query "HKLM\System\CurrentControlSet\Control\Class" /v "VgaCompatible" /s3⤵PID:1952
-
-
C:\Windows\system32\findstr.exefindstr "HKEY"3⤵PID:512
-
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\GraphicsDrivers" /v "HwSchMode" /t REG_DWORD /d "2" /f2⤵PID:3052
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet001\Control\GraphicsDrivers" /v "HwSchMode" /t REG_DWORD /d "2" /f2⤵PID:4204
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet002\Control\GraphicsDrivers" /v "HwSchMode" /t REG_DWORD /d "2" /f2⤵PID:4928
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects" /v "VisualFXSetting" /t REG_DWORD /d "3" /f2⤵PID:2540
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Control Panel\Desktop" /f /v "UserPreferencesMask" /t REG_BINARY /d "9012078012000000"2⤵PID:3532
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Control Panel\Desktop" /v "DragFullWindows" /t REG_SZ /d "1" /f2⤵PID:4208
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Control Panel\Desktop" /v "FontSmoothing" /t REG_SZ /d "2" /f2⤵PID:2256
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Control Panel\Desktop\WindowMetrics" /v "MinAnimate" /t REG_SZ /d "0" /f2⤵PID:3440
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\DWM" /v "EnableAeroPeek" /t REG_DWORD /d "0" /f2⤵PID:4276
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\DWM" /v "AlwaysHibernateThumbnails" /t REG_DWORD /d "0" /f2⤵PID:4812
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\DWM" /v "ListviewShadow" /t REG_DWORD /d "0" /f2⤵PID:2644
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "IconsOnly" /t REG_DWORD /d "0" /f2⤵PID:4572
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ListviewAlphaSelect" /t REG_DWORD /d "0" /f2⤵PID:4236
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "TaskbarAnimations" /t REG_DWORD /d "0" /f2⤵PID:1372
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ListviewShadow" /t REG_DWORD /d "0" /f2⤵PID:1788
-
-
C:\Windows\system32\reg.exeReg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DelayedDesktopSwitchTimeout" /t REG_DWORD /d "0" /f2⤵PID:1832
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Serialize" /v "StartupDelayInMSec" /t REG_SZ /d "0" /f2⤵PID:4308
-
-
C:\Windows\system32\reg.exeReg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "RunStartupScriptSync" /t REG_DWORD /d "0" /f2⤵PID:2080
-
-
C:\Windows\system32\bcdedit.exebcdedit /set bootuxdisabled on2⤵
- Modifies boot configuration data using bcdedit
PID:1028
-
-
C:\Windows\system32\bcdedit.exebcdedit /set bootmenupolicy standard2⤵
- Modifies boot configuration data using bcdedit
PID:920
-
-
C:\Windows\system32\bcdedit.exebcdedit /set quietboot yes2⤵
- Modifies boot configuration data using bcdedit
PID:2740
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Control Panel\Desktop" /v "WaitToKillAppTimeout" /t REG_SZ /d "2000" /f2⤵PID:1668
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control" /v "WaitToKillServiceTimeout" /t REG_SZ /d "2000" /f2⤵PID:1168
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Control Panel\Desktop" /v "AutoEndTasks" /t REG_SZ /d "1" /f2⤵PID:2548
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Control Panel\Desktop" /v "HungAppTimeout" /t REG_SZ /d "1000" /f2⤵PID:4796
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Control Panel\Desktop" /v "MenuShowDelay" /t REG_SZ /d "20" /f2⤵PID:948
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\Setup\LabConfig" /v "BypassTPMCheck" /t REG_DWORD /d "1" /f2⤵PID:1740
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\Setup\LabConfig" /v "BypassRAMCheck" /t REG_DWORD /d "1" /f2⤵PID:4952
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\Setup\LabConfig" /v "BypassSecureBootCheck" /t REG_DWORD /d "1" /f2⤵PID:5076
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\Setup\MoSetup" /v "AllowUpgradesWithUnsupportedTPMOrCPU" /t REG_DWORD /d "1" /f2⤵PID:2788
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate" /v "BranchReadinessLevel" /t REG_DWORD /d 2 /f2⤵PID:1768
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\AppCompat" /v "DisableInventory" /t REG_DWORD /d "1" /f2⤵PID:4332
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\Windows Error Reporting" /v "Disabled" /t REG_DWORD /d "1" /f2⤵PID:2452
-
-
C:\Windows\system32\sc.exesc config WerSvc start=disabled2⤵
- Launches sc.exe
PID:1688
-
-
C:\Windows\system32\sc.exesc config WecSvc start=disabled2⤵
- Launches sc.exe
PID:3068
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\AppCompat" /v "AITEnable" /t REG_DWORD /d "0" /f2⤵PID:2536
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Internet Explorer\SQM" /v "DisableCustomerImprovementProgram" /t REG_DWORD /d 0 /f2⤵PID:4232
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\SQMClient\Windows" /v "CEIPEnable" /t REG_DWORD /d "0" /f2⤵PID:4136
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\AppV\CEIP" /v "CEIPEnable" /t REG_DWORD /d "0" /f2⤵PID:2352
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Messenger\Client" /v "CEIP" /t REG_DWORD /d "2" /f2⤵PID:872
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\MSDeploy\3" /v "EnableTelemetry" /t REG_DWORD /d "1" /f2⤵PID:2916
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d "0" /f2⤵PID:4696
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d "0" /f2⤵PID:4104
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /v "MaxTelemetryAllowed" /t REG_DWORD /d "0" /f2⤵PID:2268
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /v "DisableTelemetryOptInChangeNotification" /t REG_DWORD /d "1" /f2⤵PID:1396
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /v "DisableTelemetryOptInSettingsUx" /t REG_DWORD /d "1" /f2⤵PID:3596
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /v "AllowCommercialDataPipeline" /t REG_DWORD /d 0 /f2⤵PID:3020
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /v "AllowDeviceNameInTelemetry" /t REG_DWORD /d 0 /f2⤵PID:3584
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /v "DisableEnterpriseAuthProxy" /t REG_DWORD /d 1 /f2⤵PID:824
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /v "AllowDesktopAnalyticsProcessing" /t REG_DWORD /d 0 /f2⤵PID:96
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /v "MicrosoftEdgeDataOptIn" /t REG_DWORD /d 0 /f2⤵PID:164
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack" /v "ShowedToastAtLevel" /t REG_DWORD /d "1" /f2⤵PID:2196
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack" /v "DiagTrackAuthorization" /t REG_DWORD /d "775" /f2⤵PID:4880
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack" /v "DiagTrackStatus" /t REG_DWORD /d "2" /f2⤵PID:3264
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack" /v "UploadPermissionReceived" /t REG_DWORD /d "1" /f2⤵PID:4112
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack\TraceManager" /v "MiniTraceSlotContentPermitted" /t REG_DWORD /d "1" /f2⤵PID:4776
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack\TraceManager" /v "MiniTraceSlotEnabled" /t REG_DWORD /d "0" /f2⤵PID:2756
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Privacy" /v "TailoredExperiencesWithDiagnosticDataEnabled" /t REG_DWORD /d "0" /f2⤵PID:980
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Policies\Microsoft\Windows\CloudContent" /v "disabletailoredexperiencesWithDiagnosticData" /t REG_DWORD /d "1" /f2⤵PID:3808
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /v "DisableDiagnosticDataViewer" /T REG_DWORD /d "1" /f2⤵PID:3108
-
-
C:\Windows\system32\sc.exesc config DiagTrack start=disabled2⤵
- Launches sc.exe
PID:3288
-
-
C:\Windows\system32\sc.exesc config DiagSvc start=disabled2⤵
- Launches sc.exe
PID:2408
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Input\TIPC" /v Enabled /t REG_DWORD /d 0 /f2⤵PID:3792
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\InputPersonalization" /v "RestrictImplicitTextCollection" /t REG_DWORD /d "1" /f2⤵PID:2972
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\InputPersonalization" /v "RestrictImplicitInkCollection" /t REG_DWORD /d "1" /f2⤵PID:2460
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\TabletPC" /v "PreventHandwritingDataSharing" /t REG_DWORD /d "1" /f2⤵PID:2444
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\HandwritingErrorReports" /v "PreventHandwritingErrorReports" /t REG_DWORD /d "1" /f2⤵PID:4192
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Personalization\Settings" /v AcceptedPrivacyPolicy /t REG_DWORD /d "0" /f2⤵PID:1400
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\TextInput" /v "AllowLinguisticDataCollection" /t REG_DWORD /d "0" /f2⤵PID:4820
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\InputPersonalization\TrainedDataStore" /v "HarvestContacts" /t REG_DWORD /d "0" /f2⤵PID:4032
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\InputPersonalization\TrainedDataStore" /v "InsightsEnabled" /t REG_DWORD /d "0" /f2⤵PID:2648
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\AdvertisingInfo" /v "DisabledByGroupPolicy" /t REG_DWORD /d "1" /f2⤵PID:2332
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /v "Enabled" /t REG_DWORD /d "0" /f2⤵PID:2308
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Power\EnergyEstimation\TaggedEnergy" /v "DisableTaggedEnergyLogging" /t REG_DWORD /d "1" /f2⤵PID:704
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Power\EnergyEstimation\TaggedEnergy" /v "TelemetryMaxApplication" /t REG_DWORD /d "0" /f2⤵PID:2564
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Power\EnergyEstimation\TaggedEnergy" /v "TelemetryMaxTagPerApplication" /t REG_DWORD /d "0" /f2⤵PID:3384
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SilentInstalledAppsEnabled" /t REG_DWORD /d "0" /f2⤵PID:4740
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\Maps" /v "AutoDownloadAndUpdateMapData" /t REG_DWORD /d "0" /f2⤵PID:404
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\Maps" /v "AllowUntriggeredNetworkTrafficOnSettingsPage" /t REG_DWORD /d "0" /f2⤵PID:2188
-
-
C:\Windows\system32\sc.exesc config MapsBroker start=disabled2⤵
- Launches sc.exe
PID:516
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" /v "CortanaEnabled" /t REG_DWORD /d "0" /f2⤵PID:5116
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" /v "CortanaConsent" /t REG_DWORD /d "0" /f2⤵PID:868
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" /v "AllowCortana" /t REG_DWORD /d "0" /f2⤵PID:4216
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Biometrics" /v "Enabled" /t REG_DWORD /d "0" /f2⤵PID:4656
-
-
C:\Windows\system32\sc.exesc config WbioSrvc start=disabled2⤵
- Launches sc.exe
PID:3588
-
-
C:\Windows\system32\setx.exesetx DOTNET_CLI_TELEMETRY_OPTOUT 12⤵PID:1004
-
-
C:\Windows\system32\setx.exesetx POWERSHELL_TELEMETRY_OPTOUT 12⤵PID:1488
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Diagnostics\Performance" /v "DisableDiagnosticTracing" /t REG_DWORD /d "1" /f2⤵PID:1872
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet001\Control\Diagnostics\Performance" /v "DisableDiagnosticTracing" /t REG_DWORD /d "1" /f2⤵PID:4680
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet002\Control\Diagnostics\Performance" /v "DisableDiagnosticTracing" /t REG_DWORD /d "1" /f2⤵PID:3064
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows NT\CurrentVersion\Software Protection Platform" /v "NoGenTicket" /t REG_DWORD /d "1" /f2⤵PID:1952
-
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "\Microsoft\Windows\Feedback\Siuf\DmClient" /disable2⤵PID:1840
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Services\LanmanServer\Parameters" /v "SMB1" /t REG_DWORD /d "0" /f2⤵PID:4540
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Services\LanmanServer\Parameters" /v "SMB2" /t REG_DWORD /d "0" /f2⤵PID:1128
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "RestrictAnonymous" /t REG_DWORD /d "1" /f2⤵PID:4908
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "RestrictAnonymousSAM" /t REG_DWORD /d "1" /f2⤵PID:1604
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Services\NetBT\Parameters\Interfaces" /v "NetbiosOptions" /t REG_DWORD /d "2" /f2⤵PID:68
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet001\Services\NetBT\Parameters\Interfaces" /v "NetbiosOptions" /t REG_DWORD /d "2" /f2⤵PID:356
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet002\Services\NetBT\Parameters\Interfaces" /v "NetbiosOptions" /t REG_DWORD /d "2" /f2⤵PID:1712
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Services\NetBT\Parameters" /v "NodeType" /t REG_DWORD /d "2" /f2⤵PID:2192
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet001\Services\NetBT\Parameters" /v "NodeType" /t REG_DWORD /d "2" /f2⤵PID:4956
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet002\Services\NetBT\Parameters" /v "NodeType" /t REG_DWORD /d "2" /f2⤵PID:4644
-
-
C:\Windows\system32\sc.exesc stop LanmanWorkstation2⤵
- Launches sc.exe
PID:4652
-
-
C:\Windows\system32\sc.exesc config LanmanWorkstation start=disabled2⤵
- Launches sc.exe
PID:2124
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Services\LanManServer\Parameters" /v "RestrictNullSessAccess" /t REG_DWORD /d "1" /f2⤵PID:1564
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Services\LanManServer\Parameters" /v "DisableCompression" /t REG_DWORD /d "1" /f2⤵PID:2992
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe" /v "AuditLevel" /t REG_DWORD /d "8" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:2128
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\CredentialsDelegation" /v "AllowProtectedCreds" /t REG_DWORD /d "1" /f2⤵PID:4592
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "DisableRestrictedAdminOutboundCreds" /t REG_DWORD /d "1" /f2⤵PID:4816
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "DisableRestrictedAdmin" /t REG_DWORD /d "0" /f2⤵PID:1040
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "RunAsPPL" /t REG_DWORD /d "1" /f2⤵
- Boot or Logon Autostart Execution: LSASS Driver
- Access Token Manipulation: Create Process with Token
PID:1212
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\SecurityProviders\WDigest" /v "Negotiate" /t REG_DWORD /d "0" /f2⤵PID:1268
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\SecurityProviders\WDigest" /v "UseLogonCredential" /t REG_DWORD /d "0" /f2⤵PID:3928
-
-
C:\Windows\system32\net.exenet user defaultuser0 /delete2⤵PID:1172
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user defaultuser0 /delete3⤵PID:4428
-
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Remote Assistance" /v "fAllowFullControl" /t REG_DWORD /d "0" /f2⤵PID:4344
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Remote Assistance" /v "fAllowToGetHelp" /t REG_DWORD /d "0" /f2⤵PID:4708
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\.NetFramework\v4.0.30319" /v "SchUseStrongCrypto" /t REG_DWORD /d "1" /f2⤵PID:4316
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\WOW6432Node\Microsoft\.NETFramework\v4.0.30319" /v "SchUseStrongCrypto" /t REG_DWORD /d "1" /f2⤵PID:3456
-
-
C:\Windows\system32\reg.exeReg delete HKEY_CLASSES_ROOT\ms-msdt /f2⤵
- Modifies registry class
PID:4376
-
-
C:\Windows\system32\reg.exeReg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion" /v "InstallationType"2⤵PID:2120
-
-
C:\Windows\system32\find.exefind /I "Server Core"2⤵PID:5076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic os get TotalVisibleMemorySize /format:value2⤵PID:4448
-
C:\Windows\System32\Wbem\WMIC.exewmic os get TotalVisibleMemorySize /format:value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control" /v "SvcHostSplitThresholdInKB" /t REG_DWORD /d "4193772" /f2⤵PID:1652
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet001\Control" /v "SvcHostSplitThresholdInKB" /t REG_DWORD /d "4193772" /f2⤵PID:3744
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet002\Control" /v "SvcHostSplitThresholdInKB" /t REG_DWORD /d "4193772" /f2⤵PID:2536
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Session Manager\Memory Management" /v "IOPageLockLimit" /t REG_DWORD /d "4193772" /f2⤵PID:4232
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Session Manager" /v "HeapDeCommitFreeBlockThreshold" /t REG_DWORD /d "262144" /f2⤵PID:4136
-
-
C:\Windows\system32\bcdedit.exebcdedit /set pae ForceEnable2⤵
- Modifies boot configuration data using bcdedit
PID:2352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -NonInteractive -ExecutionPolicy Unrestricted -Command $ErrorActionPreference = 'SilentlyContinue';Disable-NetAdapterPowerManagement -Name "*";Set-NetOffloadGlobalSetting -PacketCoalescingFilter Disabled -Chimney Disabled;Set-NetTCPSetting -SettingName "Internet" -MemoryPressureProtection Disabled2⤵
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh interface ip show interface | findstr /I "connected"2⤵PID:5004
-
C:\Windows\system32\netsh.exenetsh interface ip show interface3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1564
-
-
C:\Windows\system32\findstr.exefindstr /I "connected"3⤵PID:2296
-
-
-
C:\Windows\system32\netsh.exenetsh interface ipv6 set interface 1 weakhostreceive=enabled weakhostsend=enabled2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4272
-
-
C:\Windows\system32\netsh.exenetsh interface ipv4 set interface 1 weakhostreceive=enabled weakhostsend=enabled2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1028
-
-
C:\Windows\system32\netsh.exenetsh interface ipv6 set interface 2 weakhostreceive=enabled weakhostsend=enabled2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3928
-
-
C:\Windows\system32\netsh.exenetsh interface ipv4 set interface 2 weakhostreceive=enabled weakhostsend=enabled2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3240
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings" /v "DownloadMode" /t REG_DWORD /d "0" /f2⤵PID:4324
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global ecncapability=enabled2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh int tcp show supplemental | findstr /I "template"2⤵PID:4124
-
C:\Windows\system32\netsh.exenetsh int tcp show supplemental3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2788
-
-
C:\Windows\system32\findstr.exefindstr /I "template"3⤵PID:5076
-
-
-
C:\Windows\system32\netsh.exenetsh int tcp set supplemental internet CongestionProvider=bbr22⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1768
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\MSMQ\Parameters" /v "TCPNoDelay" /t REG_DWORD /d "1" /f2⤵PID:3396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards" /f "ServiceName" /s |findstr /i /l "ServiceName"2⤵PID:924
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards" /f "ServiceName" /s3⤵PID:4916
-
-
C:\Windows\system32\findstr.exefindstr /i /l "ServiceName"3⤵PID:2028
-
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{43BFA3A2-555C-47A1-A0B5-442C8020DD48}" /v "TCPNoDelay" /t REG_DWORD /d "1" /f2⤵PID:2272
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{43BFA3A2-555C-47A1-A0B5-442C8020DD48}" /v "TcpAckFrequency" /t REG_DWORD /d "1" /f2⤵PID:4696
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{43BFA3A2-555C-47A1-A0B5-442C8020DD48}" /v "TcpDelAckTicks" /t REG_DWORD /d "0" /f2⤵PID:5064
-
-
C:\Windows\system32\netsh.exenetsh winsock set autotuning on2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic cpu get numberOfCores /format:value2⤵PID:824
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get numberOfCores /format:value3⤵PID:96
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion\NetworkCards" /k /v /f "Description" /s /e | findstr /ri "REG_SZ"2⤵PID:4140
-
C:\Windows\system32\reg.exeReg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion\NetworkCards" /k /v /f "Description" /s /e3⤵PID:1692
-
-
C:\Windows\system32\findstr.exefindstr /ri "REG_SZ"3⤵PID:820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Reg query "HKLM\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}" /s /f "RTL8139C+ Fast Ethernet NIC" /d | findstr /C:"HKEY"2⤵PID:5096
-
C:\Windows\system32\reg.exeReg query "HKLM\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}" /s /f "RTL8139C+ Fast Ethernet NIC" /d3⤵PID:3176
-
-
C:\Windows\system32\findstr.exefindstr /C:"HKEY"3⤵PID:1696
-
-
-
C:\Windows\system32\reg.exeReg export "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" "C:\Backup\(Default) RTL8139C+ Fast Ethernet NIC.reg" /y2⤵PID:4600
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*WakeOnMagicPacket" /t REG_SZ /d "0" /f2⤵PID:3792
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*WakeOnPattern" /t REG_SZ /d "0" /f2⤵PID:2972
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "WakeOnLink" /t REG_SZ /d "0" /f2⤵PID:2460
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "S5WakeOnLan" /t REG_SZ /d "0" /f2⤵PID:1572
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "WolShutdownLinkSpeed" /t REG_SZ /d "2" /f2⤵PID:4192
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*ModernStandbyWoLMagicPacket " /t REG_SZ /d "0" /f2⤵PID:1400
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*DeviceSleepOnDisconnect" /t REG_SZ /d "0" /f2⤵PID:4820
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*NicAutoPowerSaver" /t REG_SZ /d "0" /f2⤵PID:4032
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*FlowControl" /t REG_SZ /d "0" /f2⤵PID:2648
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*EEE" /t REG_SZ /d "0" /f2⤵PID:2332
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "EnablePME" /t REG_SZ /d "0" /f2⤵PID:2308
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "EEELinkAdvertisement" /t REG_SZ /d "0" /f2⤵PID:704
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "ReduceSpeedOnPowerDown" /t REG_SZ /d "0" /f2⤵PID:4200
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "PowerSavingMode" /t REG_SZ /d "0" /f2⤵PID:1580
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "EnableGreenEthernet" /t REG_SZ /d "0" /f2⤵PID:5080
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "ULPMode" /t REG_SZ /d "0" /f2⤵PID:2056
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "GigaLite" /t REG_SZ /d "0" /f2⤵PID:380
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "EnableSavePowerNow" /t REG_SZ /d "0" /f2⤵PID:2580
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "EnablePowerManagement" /t REG_SZ /d "0" /f2⤵PID:5116
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "EnableDynamicPowerGating" /t REG_SZ /d "0" /f2⤵PID:868
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "EnableConnectedPowerGating" /t REG_SZ /d "0" /f2⤵PID:4216
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "AutoPowerSaveModeEnabled" /t REG_SZ /d "0" /f2⤵PID:4656
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "AutoDisableGigabit" /t REG_SZ /d "0" /f2⤵PID:3288
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "AdvancedEEE" /t REG_SZ /d "0" /f2⤵PID:3124
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "PowerDownPll" /t REG_SZ /d "0" /f2⤵PID:2676
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "S5NicKeepOverrideMacAddrV2" /t REG_SZ /d "0" /f2⤵PID:1464
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "MIMOPowerSaveMode" /t REG_SZ /d "3" /f2⤵PID:3424
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "AlternateSemaphoreDelay" /t REG_SZ /d "0" /f2⤵PID:588
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*interruptmoderation" /t REG_SZ /d "0" /f2⤵PID:364
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "JumboPacket" /t REG_SZ /d "0" /f2⤵PID:592
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "ITR" /t REG_SZ /d "125" /f2⤵PID:3052
-
-
C:\Windows\system32\reg.exeReg delete "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "ReceiveBuffers" /f2⤵PID:4204
-
-
C:\Windows\system32\reg.exeReg delete "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "TransmitBuffers" /f2⤵PID:2988
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "ThroughputBoosterEnabled" /t REG_SZ /d "1" /f2⤵PID:2540
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "PnPCapabilities" /t REG_DWORD /d "24" /f2⤵PID:68
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "LsoV1IPv4" /t REG_SZ /d "1" /f2⤵PID:1104
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "LsoV2IPv4" /t REG_SZ /d "1" /f2⤵PID:2256
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "LsoV2IPv6" /t REG_SZ /d "1" /f2⤵PID:2024
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "TCPUDPChecksumOffloadIPv4" /t REG_SZ /d "3" /f2⤵PID:4956
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "TCPUDPChecksumOffloadIPv6" /t REG_SZ /d "3" /f2⤵PID:4644
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "UDPChecksumOffloadIPv4" /t REG_SZ /d "3" /f2⤵PID:4572
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "UDPChecksumOffloadIPv6" /t REG_SZ /d "3" /f2⤵PID:4104
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "TCPChecksumOffloadIPv4" /t REG_SZ /d "3" /f2⤵PID:2916
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "TCPChecksumOffloadIPv6" /t REG_SZ /d "3" /f2⤵PID:5084
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "IPChecksumOffloadIPv4" /t REG_SZ /d "3" /f2⤵PID:3596
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "IPsecOffloadV1IPv4" /t REG_SZ /d "3" /f2⤵PID:4628
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "IPsecOffloadV2" /t REG_SZ /d "3" /f2⤵PID:4276
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*IPsecOffloadV2IPv4" /t REG_SZ /d "3" /f2⤵PID:2992
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*PMARPOffload" /t REG_SZ /d "1" /f2⤵PID:1832
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*PMNSOffload" /t REG_SZ /d "1" /f2⤵PID:1788
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*PMWiFiRekeyOffload" /t REG_SZ /d "1" /f2⤵PID:5004
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "RSS" /t REG_SZ /d "1" /f2⤵PID:4256
-
-
C:\Windows\system32\reg.exeReg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*NumRssQueues" /t REG_SZ /d "2" /f2⤵PID:3728
-
-
C:\Windows\system32\reg.exeReg delete "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*RssBaseProcNumber" /f2⤵PID:2740
-
-
C:\Windows\system32\reg.exeReg delete "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v "*RssMaxProcNumber" /f2⤵PID:1060
-
-
C:\Windows\system32\netsh.exenetsh int tcp set global rss=enabled2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1668
-
-
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport udp start=1025 num=645112⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1540
-
-
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645112⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4316
-
-
C:\Windows\system32\netsh.exeNetsh int ip set global taskoffload=enabled2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:684
-
-
C:\Windows\system32\reg.exeReg add HKLM\System\CurrentControlSet\Services\TCPIP\Parameters /v DisableTaskOffload /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:1560
-
-
C:\Windows\system32\reg.exeReg add HKLM\System\CurrentControlSet\Services\Ipsec /v EnabledOffload /t REG_DWORD /d 1 /f2⤵
- Modifies registry key
PID:2788
-
-
C:\Windows\system32\sc.exesc query MMCSS2⤵
- Launches sc.exe
PID:1688
-
-
C:\Windows\system32\find.exefind "STOPPED"2⤵PID:3684
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Latency Sensitive" /t REG_SZ /d "True" /f2⤵PID:3396
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Scheduling Category" /t REG_SZ /d "High" /f2⤵PID:3088
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "SFIO Priority" /t REG_SZ /d "High" /f2⤵PID:504
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Priority" /t REG_DWORD /d "8" /f2⤵PID:2352
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\GraphicsDrivers" /v "IOMMUFlags" /t REG_DWORD /d 0 /f2⤵PID:1140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_VideoController get PNPDeviceID | find "PCI\VEN_"2⤵PID:2656
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_VideoController get PNPDeviceID3⤵PID:5064
-
-
C:\Windows\system32\find.exefind "PCI\VEN_"3⤵PID:1588
-
-
-
C:\Windows\system32\reg.exereg query "HKLM\System\CurrentControlSet\Enum\PCI\VEN_1234&DEV_1111&SUBSYS_11001AF4&REV_02\3&11583659&0&08\Device Parameters\Interrupt Management\MessageSignaledInterruptProperties" /v "MSISupported"2⤵PID:192
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\BackgroundAccessApplications" /v "GlobalUserDisabled" /t REG_DWORD /d "1" /f2⤵PID:204
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\AppPrivacy" /v "LetAppsRunInBackground" /t REG_DWORD /d "2" /f2⤵PID:32
-
-
C:\Windows\system32\reg.exeReg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" /v "BackgroundAppGlobalToggle" /t REG_DWORD /d "0" /f2⤵PID:616
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Power" /v "HibernateEnabled" /t REG_DWORD /d "0" /f2⤵PID:820
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet001\Control\Power" /v "HibernateEnabled" /t REG_DWORD /d "0" /f2⤵PID:4556
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet002\Control\Power" /v "HibernateEnabled" /t REG_DWORD /d "0" /f2⤵PID:2756
-
-
C:\Windows\system32\powercfg.exepowercfg /h off2⤵
- Power Settings
PID:4112
-
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "\microsoft\windows\power efficiency diagnostics\analyzesystem" /disable2⤵PID:2408
-
-
C:\Windows\system32\wevtutil.exewevtutil set-log "Microsoft-Windows-SleepStudy/Diagnostic" /e:False2⤵PID:4408
-
-
C:\Windows\system32\wevtutil.exewevtutil set-log "Microsoft-Windows-Kernel-Processor-Power/Diagnostic" /e:False2⤵PID:408
-
-
C:\Windows\system32\wevtutil.exewevtutil set-log "Microsoft-Windows-UserModePowerService/Diagnostic" /e:False2⤵PID:2684
-
-
C:\Windows\system32\reg.exeReg query "HKLM\SYSTEM\CurrentControlSet\Control\PriorityControl" /v "Win32PrioritySeparation"2⤵PID:1804
-
-
C:\Windows\system32\find.exefind "0x18"2⤵PID:2716
-
-
C:\Windows\system32\reg.exeReg query "HKLM\SYSTEM\CurrentControlSet\Control\PriorityControl" /v "Win32PrioritySeparation"2⤵PID:1700
-
-
C:\Windows\system32\find.exefind "0x26"2⤵PID:224
-
-
C:\Windows\system32\fsutil.exefsutil behavior set memoryusage 22⤵PID:3640
-
-
C:\Windows\system32\fsutil.exefsutil behavior set mftzone 22⤵PID:5072
-
-
C:\Windows\system32\fsutil.exefsutil behavior set disabledeletenotify 02⤵PID:3040
-
-
C:\Windows\system32\fsutil.exefsutil behavior set encryptpagingfile 02⤵PID:2288
-
-
C:\Windows\system32\fsutil.exefsutil behavior set disable8dot3 12⤵PID:4612
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\FileSystem" /v "NtfsDisable8dot3NameCreation" /t REG_DWORD /d "1" /f2⤵PID:2564
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet001\Control\FileSystem" /v "NtfsDisable8dot3NameCreation" /t REG_DWORD /d "1" /f2⤵PID:3384
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet002\Control\FileSystem" /v "NtfsDisable8dot3NameCreation" /t REG_DWORD /d "1" /f2⤵PID:4904
-
-
C:\Windows\system32\fsutil.exefsutil behavior set disablecompression 12⤵PID:404
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk where "DriveType='3' and DeviceID='C:'" get DeviceID2⤵PID:2188
-
-
C:\Windows\system32\find.exefind "C:"2⤵PID:2056
-
-
C:\Windows\system32\fsutil.exefsutil behavior set disableLastAccess 02⤵PID:3092
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\FileSystem" /v "NtfsDisableLastAccessUpdate" /t REG_DWORD /d "2147483648" /f2⤵PID:3892
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet001\Control\FileSystem" /v "NtfsDisableLastAccessUpdate" /t REG_DWORD /d "2147483648" /f2⤵PID:2936
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet002\Control\FileSystem" /v "NtfsDisableLastAccessUpdate" /t REG_DWORD /d "2147483648" /f2⤵PID:3444
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Services\NvTelemetryContainer" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3112
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet001\Services\NvTelemetryContainer" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4672
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet002\Services\NvTelemetryContainer" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3036
-
-
C:\Windows\system32\sc.exesc stop NvTelemetyContainer2⤵
- Launches sc.exe
PID:4784
-
-
C:\Windows\system32\sc.exesc config NvTelemetyContainer start=disabled2⤵
- Launches sc.exe
PID:1772
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\NVIDIA Corporation\NvControlPanel2\Client" /v "OptInOrOutPreference" /t REG_DWORD /d 0 /f2⤵PID:3064
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Services\nvlddmkm\Global\Startup" /v "SendTelemetryData" /t REG_DWORD /d "0" /f2⤵PID:2696
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\NVIDIA Corporation\Global\FTS" /v "EnableRID44231" /t REG_DWORD /d 0 /f2⤵PID:4992
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\NVIDIA Corporation\Global\FTS" /v "EnableRID64640" /t REG_DWORD /d 0 /f2⤵PID:4540
-
-
C:\Windows\system32\reg.exeReg add "HKLM\Software\NVIDIA Corporation\Global\FTS" /v "EnableRID66610" /t REG_DWORD /d 0 /f2⤵PID:1128
-
-
C:\Windows\system32\reg.exeReg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "NvBackend" /f2⤵PID:4664
-
-
C:\Windows\system32\schtasks.exeschtasks /change /disable /tn "NvTmRep_CrashReport1_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"2⤵PID:1604
-
-
C:\Windows\system32\schtasks.exeschtasks /change /disable /tn "NvTmRep_CrashReport2_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"2⤵PID:4208
-
-
C:\Windows\system32\schtasks.exeschtasks /change /disable /tn "NvTmRep_CrashReport3_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"2⤵PID:356
-
-
C:\Windows\system32\schtasks.exeschtasks /change /disable /tn "NvTmRep_CrashReport4_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"2⤵PID:4836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Reg query "HKLM\System\CurrentControlSet\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}" /t REG_SZ /s /e /f "NVIDIA" | findstr "HKEY"2⤵PID:2192
-
C:\Windows\system32\reg.exeReg query "HKLM\System\CurrentControlSet\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}" /t REG_SZ /s /e /f "NVIDIA"3⤵PID:2024
-
-
C:\Windows\system32\findstr.exefindstr "HKEY"3⤵PID:4812
-
-
-
C:\Windows\system32\bcdedit.exebcdedit /deletevalue useplatformclock2⤵
- Modifies boot configuration data using bcdedit
PID:4652
-
-
C:\Windows\system32\bcdedit.exebcdedit /set useplatformtick yes2⤵
- Modifies boot configuration data using bcdedit
PID:5092
-
-
C:\Windows\system32\reg.exeReg.exe add "HKCU\Control Panel\PowerCfg\GlobalPowerPolicy" /v "Policies" /t REG_BINARY /d "01000000020000000100000000000000020000000000000000000000000000002c0100003232030304000000040000000000000000000000840300002c01000000000000840300000001646464640000" /f2⤵
- Power Settings
PID:1192
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\System\Services\NetBT\Parameters" /v "CsEnabled" /t REG_DWORD /d "0" /f2⤵PID:1396
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet001\System\Services\NetBT\Parameters" /v "CsEnabled" /t REG_DWORD /d "0" /f2⤵PID:3132
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet002\System\Services\NetBT\Parameters" /v "CsEnabled" /t REG_DWORD /d "0" /f2⤵PID:3636
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\System\Services\NetBT\Parameters" /v "PlatformAoAcOverride" /t REG_DWORD /d "0" /f2⤵PID:4592
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet001\System\Services\NetBT\Parameters" /v "PlatformAoAcOverride" /t REG_DWORD /d "0" /f2⤵PID:484
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet002\System\Services\NetBT\Parameters" /v "PlatformAoAcOverride" /t REG_DWORD /d "0" /f2⤵PID:2128
-
-
C:\Windows\system32\powercfg.exepowercfg /duplicatescheme e9a42b02-d5df-448d-aa00-03f14749eb61 bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb2⤵
- Power Settings
PID:4432
-
-
C:\Windows\system32\powercfg.exepowercfg /setactive bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb2⤵
- Power Settings
PID:1224
-
-
C:\Windows\system32\powercfg.exepowercfg /delete eeeeeeee-eeee-eeee-eeee-eeeeeeeeeeee2⤵
- Power Settings
PID:4816
-
-
C:\Windows\system32\powercfg.exepowercfg /duplicatescheme e9a42b02-d5df-448d-aa00-03f14749eb61 eeeeeeee-eeee-eeee-eeee-eeeeeeeeeeee2⤵
- Power Settings
PID:4272
-
-
C:\Windows\system32\powercfg.exepowercfg /setactive eeeeeeee-eeee-eeee-eeee-eeeeeeeeeeee2⤵
- Power Settings
PID:920
-
-
C:\Windows\system32\powercfg.exepowercfg /delete bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb2⤵
- Power Settings
PID:1212
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current sub_processor THROTTLING 02⤵
- Power Settings
PID:2016
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current sub_none DEVICEIDLE 02⤵
- Power Settings
PID:2744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo AMD64 Family 6 Model 13 Stepping 2, AuthenticAMD "2⤵PID:1172
-
-
C:\Windows\system32\find.exefind /I "Intel"2⤵PID:4796
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\CurrentControlSet\Control\Power\PowerSettings\48df9d60-4f68-11dc-8314-0800200c9a66\07029cd8-4664-4698-95d8-43b2e9666596" /v "ACSettingIndex" /t REG_DWORD /d "0" /f2⤵PID:1776
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet001\Control\Power\PowerSettings\48df9d60-4f68-11dc-8314-0800200c9a66\07029cd8-4664-4698-95d8-43b2e9666596" /v "ACSettingIndex" /t REG_DWORD /d "0" /f2⤵PID:352
-
-
C:\Windows\system32\reg.exeReg add "HKLM\System\ControlSet002\Control\Power\PowerSettings\48df9d60-4f68-11dc-8314-0800200c9a66\07029cd8-4664-4698-95d8-43b2e9666596" /v "ACSettingIndex" /t REG_DWORD /d "0" /f2⤵PID:4328
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current sub_processor PERFAUTONOMOUS 12⤵
- Power Settings
PID:3240
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current sub_processor PERFAUTONOMOUSWINDOW 10002⤵
- Power Settings
PID:4248
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current sub_processor PERFEPP 02⤵
- Power Settings
PID:684
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current sub_processor PERFBOOSTMODE 12⤵
- Power Settings
PID:1560
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current sub_processor PERFBOOSTPOL 1002⤵
- Power Settings
PID:2788
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current SUB_SLEEP AWAYMODE 02⤵
- Power Settings
PID:3068
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current SUB_SLEEP ALLOWSTANDBY 02⤵
- Power Settings
PID:816
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current SUB_SLEEP HYBRIDSLEEP 02⤵
- Power Settings
PID:2536
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current SUB_SLEEP UNATTENDSLEEP 02⤵
- Power Settings
PID:788
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current SUB_IR DEEPSLEEP 02⤵
- Power Settings
PID:1808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo AMD64 Family 6 Model 13 Stepping 2, AuthenticAMD "2⤵PID:924
-
-
C:\Windows\system32\find.exefind /I "Intel"2⤵PID:504
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current SUB_INTSTEER UNPARKTIME 02⤵
- Power Settings
PID:4300
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current SUB_INTSTEER PERPROCLOAD 100002⤵
- Power Settings
PID:2208
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current sub_processor PROCTHROTTLEMIN 1002⤵
- Power Settings
PID:3584
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current sub_processor SHORTSCHEDPOLICY 22⤵
- Power Settings
PID:5064
-
-
C:\Windows\system32\powercfg.exepowercfg -setacvalueindex scheme_current sub_processor SCHEDPOLICY 22⤵
- Power Settings
PID:1588
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 02⤵
- Power Settings
PID:164
-
-
C:\Windows\system32\powercfg.exepowercfg /change monitor-timeout-ac 02⤵
- Power Settings
PID:824
-
-
C:\Windows\system32\powercfg.exepowercfg /change hibernate-timeout-ac 02⤵
- Power Settings
PID:4880
-
-
C:\Windows\system32\powercfg.exepowercfg -setactive scheme_current2⤵
- Power Settings
PID:3192
-
-
C:\Windows\system32\powercfg.exepowercfg -changename scheme_current "CoutX Ultimate Performance" "For CoutX Optimizer 2.1.1 (dsc.gg/CoutX) By UnLovedCookie"2⤵
- Power Settings
PID:4140
-
-
C:\Windows\system32\reg.exeReg query HKCU\Software\CoutX /v DisableDeviceThrottling2⤵
- Modifies registry key
PID:3176
-
-
C:\Windows\system32\find.exefind "0x1"2⤵PID:4556
-
-
C:\Windows\system32\reg.exeReg query HKCU\Software\CoutX /v DisableDeviceThrottlingRan2⤵
- Modifies registry key
PID:780
-
-
C:\Windows\system32\find.exefind "0x1"2⤵PID:4112
-
-
C:\Windows\system32\reg.exeReg query HKCU\Software\CoutX /v DisableMitigations2⤵
- Modifies registry key
PID:392
-
-
C:\Windows\system32\find.exefind "0x1"2⤵PID:4408
-
-
C:\Windows\system32\reg.exeReg query HKCU\Software\CoutX /v DisableMitigationsgRan2⤵
- Modifies registry key
PID:2428
-
-
C:\Windows\system32\find.exefind "0x1"2⤵PID:2684
-
-
C:\Windows\system32\reg.exeReg query HKCU\Software\CoutX /v DisableGPUThrottling2⤵
- Modifies registry key
PID:1572
-
-
C:\Windows\system32\find.exefind "0x1"2⤵PID:2716
-
-
C:\Windows\system32\reg.exeReg query HKCU\Software\CoutX /v DisableGPUThrottlingRan2⤵
- Modifies registry key
PID:1400
-
-
C:\Windows\system32\find.exefind "0x1"2⤵PID:224
-
-
C:\Windows\system32\reg.exeReg query HKCU\Software\CoutX /v DisableCPUThrottling2⤵
- Modifies registry key
PID:3040
-
-
C:\Windows\system32\find.exefind "0x1"2⤵PID:2332
-
-
C:\Windows\system32\reg.exeReg query HKCU\Software\CoutX /v DisableCPUThrottlingRan2⤵
- Modifies registry key
PID:4612
-
-
C:\Windows\system32\find.exefind "0x1"2⤵PID:2948
-
-
C:\Windows\system32\reg.exeReg query HKCU\Software\CoutX /v ExTweaks2⤵
- Modifies registry key
PID:3384
-
-
C:\Windows\system32\find.exefind "0x1"2⤵PID:4604
-
-
C:\Windows\system32\reg.exeReg query HKCU\Software\CoutX /v ExTweaksRan2⤵
- Modifies registry key
PID:404
-
-
C:\Windows\system32\find.exefind "0x1"2⤵PID:2580
-
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns2⤵
- Gathers network information
PID:1896
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe2⤵
- Kills process with taskkill
PID:372
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3128
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im regedit.exe2⤵
- Kills process with taskkill
PID:2912
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im MinSudo.exe2⤵
- Kills process with taskkill
PID:4824
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im fsutil.exe2⤵
- Kills process with taskkill
PID:1128
-
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4156
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1LSASS Driver
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
2Active Setup
1LSASS Driver
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD597053ab490ed4ac48a439547c1189b04
SHA126c659515d83dc7066ebd3df011cd05e8c15b1fa
SHA2560278b6fc608071ef38e89e0307af3e703f45a7e5243c15f4587389e5a1fd98b2
SHA5129995fd3c1b4b8e3024e8c23738f4b2dc23781a139074786e59ae340bbd54090b4faa2bd169032bdd70a487cef7f063398e874022369f70f487883f8a2212c6c2
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
226KB
MD5d818e043d65062f26d19ee879682892b
SHA11ef65d3e6e1f852b51c803eeefbca69bbc540545
SHA256124b02e77b7aa0be5389a3347d23de024457d2a14ba091f8d9dbf6240b590445
SHA512a93a06505e0396224de789098e11e783fc4efb35ccafce8e607ceb7c250aa7bf1e233a514f0cd452b55c8aea8edec659470b4ce295bb91580d0f43a68fccc60c