Analysis
-
max time kernel
126s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe
Resource
win7-20241010-en
General
-
Target
b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe
-
Size
4.9MB
-
MD5
a450c06717644483e3437db615ea4114
-
SHA1
93ece99062cee7344d7059986cc4727c92dbfca9
-
SHA256
b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a
-
SHA512
cb7d295f30fa69e98f52ac240e76ed9e776142a898a15c0a8911a693ccdcea441281a79c2b7f0e1e6567cc0bb73a9a6320c359a4a775b943fc84b78df6e42a24
-
SSDEEP
49152:Dl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8+:e
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
Colibri family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4736 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3464 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3268 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1552 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4644 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5048 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4188 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3976 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3252 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4128 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 808 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4344 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3732 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3516 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4704 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3664 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2652 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1872 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3304 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3520 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 512 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4712 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1216 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3324 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4160 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4876 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3328 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 572 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4816 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 116 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4084 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1168 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2360 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1072 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2748 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1068 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5092 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3928 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2472 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 432 4016 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4124 4016 schtasks.exe 83 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
resource yara_rule behavioral2/memory/1436-2-0x000000001C100000-0x000000001C22E000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4244 powershell.exe 572 powershell.exe 1792 powershell.exe 3324 powershell.exe 4924 powershell.exe 3188 powershell.exe 3328 powershell.exe 2964 powershell.exe 4160 powershell.exe 4876 powershell.exe 3388 powershell.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation winlogon.exe -
Executes dropped EXE 64 IoCs
pid Process 452 tmpA347.tmp.exe 3408 tmpA347.tmp.exe 4360 tmpA347.tmp.exe 4544 winlogon.exe 452 tmpD755.tmp.exe 2708 tmpD755.tmp.exe 556 tmpD755.tmp.exe 3408 tmpD755.tmp.exe 3712 winlogon.exe 4684 tmpA3C.tmp.exe 4060 tmpA3C.tmp.exe 1848 winlogon.exe 1540 winlogon.exe 3148 tmp5752.tmp.exe 4056 tmp5752.tmp.exe 1708 winlogon.exe 4808 tmp750C.tmp.exe 4712 tmp750C.tmp.exe 3340 winlogon.exe 4504 tmp9110.tmp.exe 3252 tmp9110.tmp.exe 2036 winlogon.exe 3204 tmpC1D4.tmp.exe 692 tmpC1D4.tmp.exe 964 winlogon.exe 4728 tmpDF4F.tmp.exe 3196 tmpDF4F.tmp.exe 3640 winlogon.exe 4384 tmpFAC6.tmp.exe 4360 tmpFAC6.tmp.exe 2232 tmpFAC6.tmp.exe 2280 tmpFAC6.tmp.exe 4492 tmpFAC6.tmp.exe 2964 tmpFAC6.tmp.exe 572 tmpFAC6.tmp.exe 4964 tmpFAC6.tmp.exe 2892 tmpFAC6.tmp.exe 1016 tmpFAC6.tmp.exe 2380 tmpFAC6.tmp.exe 4220 tmpFAC6.tmp.exe 4616 tmpFAC6.tmp.exe 3292 tmpFAC6.tmp.exe 2724 tmpFAC6.tmp.exe 704 tmpFAC6.tmp.exe 1196 tmpFAC6.tmp.exe 2036 tmpFAC6.tmp.exe 3520 tmpFAC6.tmp.exe 1072 tmpFAC6.tmp.exe 3624 tmpFAC6.tmp.exe 2612 tmpFAC6.tmp.exe 1424 tmpFAC6.tmp.exe 2604 tmpFAC6.tmp.exe 772 tmpFAC6.tmp.exe 4192 tmpFAC6.tmp.exe 2508 tmpFAC6.tmp.exe 5068 tmpFAC6.tmp.exe 4884 tmpFAC6.tmp.exe 5112 tmpFAC6.tmp.exe 3020 tmpFAC6.tmp.exe 2324 tmpFAC6.tmp.exe 3436 tmpFAC6.tmp.exe 1980 tmpFAC6.tmp.exe 3568 tmpFAC6.tmp.exe 2276 tmpFAC6.tmp.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 3408 set thread context of 4360 3408 tmpA347.tmp.exe 141 PID 556 set thread context of 3408 556 tmpD755.tmp.exe 180 PID 4684 set thread context of 4060 4684 tmpA3C.tmp.exe 190 PID 3148 set thread context of 4056 3148 tmp5752.tmp.exe 207 PID 4808 set thread context of 4712 4808 tmp750C.tmp.exe 218 PID 4504 set thread context of 3252 4504 tmp9110.tmp.exe 227 PID 3204 set thread context of 692 3204 tmpC1D4.tmp.exe 237 PID 4728 set thread context of 3196 4728 tmpDF4F.tmp.exe 247 PID 1172 set thread context of 752 1172 tmp3212.tmp.exe 1384 PID 432 set thread context of 1092 432 Process not Found 1794 PID 2472 set thread context of 2536 2472 Process not Found 1851 -
Drops file in Program Files directory 36 IoCs
description ioc Process File created C:\Program Files\Windows Photo Viewer\OfficeClickToRun.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\TextInputHost.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\5940a34987c991 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\smss.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\e6c9b481da804f b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\unsecapp.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\RCXC4AA.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\9e8d7a4ca61bd9 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\69ddcba757bf72 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\dllhost.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\RCXB9F7.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\smss.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\dllhost.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\RCXACA2.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files (x86)\MSBuild\RuntimeBroker.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\unsecapp.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\RuntimeBroker.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\OfficeClickToRun.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files\Windows Photo Viewer\OfficeClickToRun.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files (x86)\MSBuild\RCXB0CB.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files (x86)\Windows Multimedia Platform\ea1d8f6d871115 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\RCXC091.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\OfficeClickToRun.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files\Windows Photo Viewer\RCXC2A5.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\RuntimeBroker.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files (x86)\Windows Multimedia Platform\22eafd247d37c3 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\29c1c3cc0f7685 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files\Windows Photo Viewer\e6c9b481da804f b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\RCXAEB7.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\RCXB2DF.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\RCXB561.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files (x86)\MSBuild\RuntimeBroker.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files (x86)\MSBuild\9e8d7a4ca61bd9 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Program Files (x86)\Windows Multimedia Platform\TextInputHost.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe -
Drops file in Windows directory 20 IoCs
description ioc Process File created C:\Windows\TAPI\cc11b995f2a76d b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Windows\PolicyDefinitions\de-DE\taskhostw.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Windows\Provisioning\Packages\csrss.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Windows\Prefetch\dllhost.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Windows\Prefetch\5940a34987c991 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Windows\PolicyDefinitions\de-DE\taskhostw.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Windows\PolicyDefinitions\de-DE\RCXA5D9.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Windows\TAPI\RCXBC78.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Windows\PolicyDefinitions\de-DE\ea9f0e6c9e2dcd b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Windows\Provisioning\Packages\csrss.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Windows\Prefetch\dllhost.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Windows\TAPI\winlogon.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Windows\fr-FR\RuntimeBroker.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Windows\TAPI\winlogon.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Windows\Prefetch\RCXA3C5.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Windows\fr-FR\RCXA1A0.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Windows\Provisioning\Packages\RCXBE7D.tmp b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File opened for modification C:\Windows\fr-FR\RuntimeBroker.exe b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Windows\fr-FR\9e8d7a4ca61bd9 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe File created C:\Windows\Provisioning\Packages\886983d96e3d3e b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpFAC6.tmp.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings Process not Found Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings Process not Found Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings winlogon.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2492 schtasks.exe 3928 schtasks.exe 3464 schtasks.exe 3252 schtasks.exe 808 schtasks.exe 3520 schtasks.exe 512 schtasks.exe 3324 schtasks.exe 2044 schtasks.exe 1216 schtasks.exe 116 schtasks.exe 976 schtasks.exe 2472 schtasks.exe 4712 schtasks.exe 4816 schtasks.exe 4188 schtasks.exe 4128 schtasks.exe 4344 schtasks.exe 3732 schtasks.exe 3664 schtasks.exe 1872 schtasks.exe 4124 schtasks.exe 3976 schtasks.exe 2928 schtasks.exe 5048 schtasks.exe 2124 schtasks.exe 3516 schtasks.exe 3304 schtasks.exe 572 schtasks.exe 2180 schtasks.exe 1072 schtasks.exe 5092 schtasks.exe 4704 schtasks.exe 2068 schtasks.exe 2652 schtasks.exe 4160 schtasks.exe 1732 schtasks.exe 4084 schtasks.exe 2360 schtasks.exe 2656 schtasks.exe 4736 schtasks.exe 3268 schtasks.exe 1708 schtasks.exe 4876 schtasks.exe 3328 schtasks.exe 1168 schtasks.exe 432 schtasks.exe 1552 schtasks.exe 4644 schtasks.exe 2748 schtasks.exe 1068 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 4160 powershell.exe 4160 powershell.exe 4924 powershell.exe 4924 powershell.exe 3388 powershell.exe 3388 powershell.exe 3188 powershell.exe 3188 powershell.exe 3328 powershell.exe 3328 powershell.exe 1792 powershell.exe 1792 powershell.exe 572 powershell.exe 572 powershell.exe 2964 powershell.exe 2964 powershell.exe 4876 powershell.exe 4876 powershell.exe 4244 powershell.exe 4244 powershell.exe 4244 powershell.exe 3324 powershell.exe 3324 powershell.exe 1792 powershell.exe 3388 powershell.exe 3328 powershell.exe 3188 powershell.exe 4924 powershell.exe 4876 powershell.exe 4160 powershell.exe 572 powershell.exe 2964 powershell.exe 3324 powershell.exe 4544 winlogon.exe 4544 winlogon.exe 3712 winlogon.exe 1848 winlogon.exe 1540 winlogon.exe 1708 winlogon.exe 3340 winlogon.exe 2036 winlogon.exe 964 winlogon.exe 3640 winlogon.exe 2052 winlogon.exe 2872 winlogon.exe 1016 winlogon.exe 2492 Process not Found 1596 Process not Found -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe Token: SeDebugPrivilege 4924 powershell.exe Token: SeDebugPrivilege 4160 powershell.exe Token: SeDebugPrivilege 3388 powershell.exe Token: SeDebugPrivilege 3188 powershell.exe Token: SeDebugPrivilege 3328 powershell.exe Token: SeDebugPrivilege 1792 powershell.exe Token: SeDebugPrivilege 572 powershell.exe Token: SeDebugPrivilege 2964 powershell.exe Token: SeDebugPrivilege 4876 powershell.exe Token: SeDebugPrivilege 4244 powershell.exe Token: SeDebugPrivilege 3324 powershell.exe Token: SeDebugPrivilege 4544 winlogon.exe Token: SeDebugPrivilege 3712 winlogon.exe Token: SeDebugPrivilege 1848 winlogon.exe Token: SeDebugPrivilege 1540 winlogon.exe Token: SeDebugPrivilege 1708 winlogon.exe Token: SeDebugPrivilege 3340 winlogon.exe Token: SeDebugPrivilege 2036 winlogon.exe Token: SeDebugPrivilege 964 winlogon.exe Token: SeDebugPrivilege 3640 winlogon.exe Token: SeDebugPrivilege 2052 winlogon.exe Token: SeDebugPrivilege 2872 winlogon.exe Token: SeDebugPrivilege 1016 winlogon.exe Token: SeDebugPrivilege 2492 Process not Found Token: SeDebugPrivilege 1596 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1436 wrote to memory of 452 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 137 PID 1436 wrote to memory of 452 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 137 PID 1436 wrote to memory of 452 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 137 PID 452 wrote to memory of 3408 452 tmpA347.tmp.exe 140 PID 452 wrote to memory of 3408 452 tmpA347.tmp.exe 140 PID 452 wrote to memory of 3408 452 tmpA347.tmp.exe 140 PID 3408 wrote to memory of 4360 3408 tmpA347.tmp.exe 141 PID 3408 wrote to memory of 4360 3408 tmpA347.tmp.exe 141 PID 3408 wrote to memory of 4360 3408 tmpA347.tmp.exe 141 PID 3408 wrote to memory of 4360 3408 tmpA347.tmp.exe 141 PID 3408 wrote to memory of 4360 3408 tmpA347.tmp.exe 141 PID 3408 wrote to memory of 4360 3408 tmpA347.tmp.exe 141 PID 3408 wrote to memory of 4360 3408 tmpA347.tmp.exe 141 PID 1436 wrote to memory of 3324 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 149 PID 1436 wrote to memory of 3324 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 149 PID 1436 wrote to memory of 2964 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 150 PID 1436 wrote to memory of 2964 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 150 PID 1436 wrote to memory of 4160 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 151 PID 1436 wrote to memory of 4160 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 151 PID 1436 wrote to memory of 4924 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 152 PID 1436 wrote to memory of 4924 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 152 PID 1436 wrote to memory of 3188 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 153 PID 1436 wrote to memory of 3188 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 153 PID 1436 wrote to memory of 4876 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 154 PID 1436 wrote to memory of 4876 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 154 PID 1436 wrote to memory of 3388 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 155 PID 1436 wrote to memory of 3388 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 155 PID 1436 wrote to memory of 3328 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 156 PID 1436 wrote to memory of 3328 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 156 PID 1436 wrote to memory of 4244 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 157 PID 1436 wrote to memory of 4244 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 157 PID 1436 wrote to memory of 572 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 158 PID 1436 wrote to memory of 572 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 158 PID 1436 wrote to memory of 1792 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 159 PID 1436 wrote to memory of 1792 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 159 PID 1436 wrote to memory of 4544 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 171 PID 1436 wrote to memory of 4544 1436 b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe 171 PID 4544 wrote to memory of 5012 4544 winlogon.exe 173 PID 4544 wrote to memory of 5012 4544 winlogon.exe 173 PID 4544 wrote to memory of 4648 4544 winlogon.exe 174 PID 4544 wrote to memory of 4648 4544 winlogon.exe 174 PID 4544 wrote to memory of 452 4544 winlogon.exe 176 PID 4544 wrote to memory of 452 4544 winlogon.exe 176 PID 4544 wrote to memory of 452 4544 winlogon.exe 176 PID 452 wrote to memory of 2708 452 tmpD755.tmp.exe 178 PID 452 wrote to memory of 2708 452 tmpD755.tmp.exe 178 PID 452 wrote to memory of 2708 452 tmpD755.tmp.exe 178 PID 2708 wrote to memory of 556 2708 tmpD755.tmp.exe 179 PID 2708 wrote to memory of 556 2708 tmpD755.tmp.exe 179 PID 2708 wrote to memory of 556 2708 tmpD755.tmp.exe 179 PID 556 wrote to memory of 3408 556 tmpD755.tmp.exe 180 PID 556 wrote to memory of 3408 556 tmpD755.tmp.exe 180 PID 556 wrote to memory of 3408 556 tmpD755.tmp.exe 180 PID 556 wrote to memory of 3408 556 tmpD755.tmp.exe 180 PID 556 wrote to memory of 3408 556 tmpD755.tmp.exe 180 PID 556 wrote to memory of 3408 556 tmpD755.tmp.exe 180 PID 556 wrote to memory of 3408 556 tmpD755.tmp.exe 180 PID 5012 wrote to memory of 3712 5012 WScript.exe 183 PID 5012 wrote to memory of 3712 5012 WScript.exe 183 PID 3712 wrote to memory of 4876 3712 winlogon.exe 185 PID 3712 wrote to memory of 4876 3712 winlogon.exe 185 PID 3712 wrote to memory of 2012 3712 winlogon.exe 186 PID 3712 wrote to memory of 2012 3712 winlogon.exe 186 PID 3712 wrote to memory of 4684 3712 winlogon.exe 188 -
System policy modification 1 TTPs 45 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe"C:\Users\Admin\AppData\Local\Temp\b8a3b35b685e72c1be24942f0520a286d5e65873aafb0f959ba551dae50ff94a.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\tmpA347.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA347.tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\tmpA347.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA347.tmp.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\tmpA347.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA347.tmp.exe"4⤵
- Executes dropped EXE
PID:4360
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Windows\TAPI\winlogon.exe"C:\Windows\TAPI\winlogon.exe"2⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4544 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6488b8db-9ffd-46f8-865a-6b4825c2ad9e.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\TAPI\winlogon.exeC:\Windows\TAPI\winlogon.exe4⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3712 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\26ec4c42-5633-4faa-bf52-c823856a6b57.vbs"5⤵PID:4876
-
C:\Windows\TAPI\winlogon.exeC:\Windows\TAPI\winlogon.exe6⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1848 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\834fa860-25fd-435c-8359-a0f38f3b7833.vbs"7⤵PID:3924
-
C:\Windows\TAPI\winlogon.exeC:\Windows\TAPI\winlogon.exe8⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1540 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1665a344-aac3-45e3-b25b-01061b654711.vbs"9⤵PID:2992
-
C:\Windows\TAPI\winlogon.exeC:\Windows\TAPI\winlogon.exe10⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1708 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7056cf11-3b2b-46b4-bc84-36ac6fb0ee8f.vbs"11⤵PID:3896
-
C:\Windows\TAPI\winlogon.exeC:\Windows\TAPI\winlogon.exe12⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3340 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fefe03a6-0a83-47a4-b6b3-4d7926b9282a.vbs"13⤵PID:5000
-
C:\Windows\TAPI\winlogon.exeC:\Windows\TAPI\winlogon.exe14⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2036 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8543059a-5786-4304-9db3-480213d440dd.vbs"15⤵PID:4676
-
C:\Windows\TAPI\winlogon.exeC:\Windows\TAPI\winlogon.exe16⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:964 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\08cbe216-6e74-4f9d-b5d0-e59be31e0512.vbs"17⤵PID:1596
-
C:\Windows\TAPI\winlogon.exeC:\Windows\TAPI\winlogon.exe18⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3640 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b1d267ca-0623-46c2-aa9a-3d57a147e684.vbs"19⤵PID:2132
-
C:\Windows\TAPI\winlogon.exeC:\Windows\TAPI\winlogon.exe20⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2052 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\43cb8a5c-48ac-490b-8175-939196443ead.vbs"21⤵PID:2604
-
C:\Windows\TAPI\winlogon.exeC:\Windows\TAPI\winlogon.exe22⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2872 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9b899b70-6f29-4c36-a073-14099d0bbe42.vbs"23⤵PID:2672
-
C:\Windows\TAPI\winlogon.exeC:\Windows\TAPI\winlogon.exe24⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1016 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dff336d1-2489-42ea-938a-688278901fa7.vbs"25⤵PID:2532
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2771020c-b9b3-4691-8c01-107041cf76e1.vbs"25⤵PID:4736
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\484235bd-4801-4169-80ec-9af59d90754a.vbs"23⤵PID:4860
-
-
C:\Users\Admin\AppData\Local\Temp\tmp3212.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3212.tmp.exe"23⤵
- Suspicious use of SetThreadContext
PID:1172 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV124⤵PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\tmp3212.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3212.tmp.exe"24⤵PID:752
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9f9417fc-4e42-4759-9102-8b128bcb223e.vbs"21⤵PID:4884
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f826d6e9-6eef-4dd8-a9aa-928742b76f10.vbs"19⤵PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"19⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"20⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"21⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"22⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"24⤵
- Executes dropped EXE
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"25⤵
- Executes dropped EXE
PID:572 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"26⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"27⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"28⤵
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"29⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"30⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"31⤵
- Executes dropped EXE
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"32⤵
- Executes dropped EXE
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"33⤵
- Executes dropped EXE
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"34⤵
- Executes dropped EXE
PID:704 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"35⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"36⤵
- Executes dropped EXE
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"37⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"38⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"39⤵
- Executes dropped EXE
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"40⤵
- Executes dropped EXE
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"41⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"42⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"43⤵
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"44⤵
- Executes dropped EXE
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"45⤵
- Executes dropped EXE
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"46⤵
- Executes dropped EXE
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"47⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"48⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"49⤵
- Executes dropped EXE
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"50⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"51⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"52⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"53⤵
- Executes dropped EXE
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"54⤵
- Executes dropped EXE
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"55⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"56⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"57⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"58⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"59⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"60⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"61⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"62⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"63⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"64⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"65⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"66⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"67⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"68⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"69⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"70⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"71⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"72⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"73⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"74⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"75⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"76⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"77⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"78⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"79⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"80⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"81⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"82⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"83⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"84⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"85⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"86⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"87⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"88⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"89⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"90⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"91⤵
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"92⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"93⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"94⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"95⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"96⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"97⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"98⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"99⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"100⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"101⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"102⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"103⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"104⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"105⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"106⤵
- System Location Discovery: System Language Discovery
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"107⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"108⤵
- System Location Discovery: System Language Discovery
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"109⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"110⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"111⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"112⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"113⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"114⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"115⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"116⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"117⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"118⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"119⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"120⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"121⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpFAC6.tmp.exe"122⤵PID:1552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-