Analysis
-
max time kernel
149s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 02:30
Static task
static1
Behavioral task
behavioral1
Sample
TWEAK NVDIA.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
TWEAK NVDIA.exe
Resource
win10v2004-20250129-en
General
-
Target
TWEAK NVDIA.exe
-
Size
11.4MB
-
MD5
3507038edf6b4f164c5149f39cff11b0
-
SHA1
720cae8b2c67d7526837f1fd3a44cbcf80ae6dd5
-
SHA256
916f1b6644b58d164c74b9d5ac14798f1c27958149effdbd85b95709b0d2ad6d
-
SHA512
c420055bfe38ae687e897ea8e5fba7cf2821ccae21819eb6ce92901b940539c107a2c8ee5c987ce07ebc060b3a008752ea5946a01cc56e45a8937da4c6be73ef
-
SSDEEP
196608:EG9LuhOZDB08T3uPqG4d1/1wKEIs52FykwcAFRrj5H8o99skweFOGXdaAPj:Lk2DPTX/Ts5JPfrN9s5eFOGoyj
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" reg.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
pid Process 2616 powershell.exe 2084 powershell.exe 980 powershell.exe 2308 powershell.exe 804 powershell.exe 1748 powershell.exe 2208 powershell.exe 1392 powershell.exe 1624 powershell.exe 2084 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 2808 Update.exe 1640 Update.exe 1188 Process not Found -
Loads dropped DLL 4 IoCs
pid Process 1180 TWEAK NVDIA.exe 2808 Update.exe 1640 Update.exe 1188 Process not Found -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Power Settings 1 TTPs 1 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1352 powercfg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
resource yara_rule behavioral1/files/0x000500000001c780-63.dat upx behavioral1/memory/1640-65-0x000007FEF5D60000-0x000007FEF6348000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 1 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 2616 powershell.exe -
Launches sc.exe 64 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2256 sc.exe 2528 sc.exe 952 sc.exe 2872 sc.exe 2980 sc.exe 980 sc.exe 548 sc.exe 1384 sc.exe 2008 sc.exe 2180 sc.exe 2444 sc.exe 2160 sc.exe 2352 sc.exe 2900 sc.exe 556 sc.exe 2844 sc.exe 1796 sc.exe 776 sc.exe 832 sc.exe 2800 sc.exe 1272 sc.exe 1576 sc.exe 2700 sc.exe 2028 sc.exe 1052 sc.exe 1804 sc.exe 1224 sc.exe 1524 sc.exe 1256 sc.exe 2420 sc.exe 1152 sc.exe 2320 sc.exe 2680 sc.exe 2716 sc.exe 2072 sc.exe 2284 sc.exe 2340 sc.exe 824 sc.exe 1996 sc.exe 2332 sc.exe 2232 sc.exe 2800 sc.exe 2564 sc.exe 2404 sc.exe 1008 sc.exe 1100 sc.exe 2776 sc.exe 1644 sc.exe 1848 sc.exe 1752 sc.exe 1224 sc.exe 1336 sc.exe 1352 sc.exe 2448 sc.exe 2016 sc.exe 2760 sc.exe 2672 sc.exe 1540 sc.exe 2260 sc.exe 1624 sc.exe 2876 sc.exe 1580 sc.exe 2488 sc.exe 2348 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000d00000001946b-10.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Delays execution with timeout.exe 64 IoCs
pid Process 912 timeout.exe 608 timeout.exe 2636 timeout.exe 1796 timeout.exe 2384 timeout.exe 2884 timeout.exe 2776 timeout.exe 1944 timeout.exe 448 timeout.exe 2392 timeout.exe 2528 timeout.exe 1648 timeout.exe 2180 timeout.exe 2384 timeout.exe 1628 timeout.exe 2676 timeout.exe 2188 timeout.exe 2992 timeout.exe 536 timeout.exe 2072 timeout.exe 2800 timeout.exe 2816 timeout.exe 2568 timeout.exe 1324 timeout.exe 1548 timeout.exe 2068 timeout.exe 928 timeout.exe 1752 timeout.exe 2256 timeout.exe 2424 timeout.exe 2624 timeout.exe 2432 timeout.exe 736 timeout.exe 1484 timeout.exe 1512 timeout.exe 1548 timeout.exe 3004 timeout.exe 2716 timeout.exe 1688 timeout.exe 2640 timeout.exe 2724 timeout.exe 1984 timeout.exe 1384 timeout.exe 484 timeout.exe 596 timeout.exe 1088 timeout.exe 1960 timeout.exe 1492 timeout.exe 2276 timeout.exe 2764 timeout.exe 2712 timeout.exe 1260 timeout.exe 2380 timeout.exe 2980 timeout.exe 684 timeout.exe 2704 timeout.exe 2424 timeout.exe 2416 timeout.exe 2000 timeout.exe 1436 timeout.exe 2360 timeout.exe 2928 timeout.exe 2128 timeout.exe 1788 timeout.exe -
Disables Windows logging functionality 2 TTPs
Changes registry settings to disable Windows Event logging.
-
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\Keyboard reg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\Keyboard\InitialKeyboardIndicators = "80000002" reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1476 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1624 powershell.exe 2084 powershell.exe 804 powershell.exe 1748 powershell.exe 2208 powershell.exe 2616 powershell.exe 2084 powershell.exe 980 powershell.exe 1392 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 2084 powershell.exe Token: SeDebugPrivilege 804 powershell.exe Token: SeDebugPrivilege 1748 powershell.exe Token: SeDebugPrivilege 2208 powershell.exe Token: SeBackupPrivilege 304 vssvc.exe Token: SeRestorePrivilege 304 vssvc.exe Token: SeAuditPrivilege 304 vssvc.exe Token: SeRestorePrivilege 2804 DrvInst.exe Token: SeRestorePrivilege 2804 DrvInst.exe Token: SeRestorePrivilege 2804 DrvInst.exe Token: SeRestorePrivilege 2804 DrvInst.exe Token: SeRestorePrivilege 2804 DrvInst.exe Token: SeRestorePrivilege 2804 DrvInst.exe Token: SeRestorePrivilege 2804 DrvInst.exe Token: SeLoadDriverPrivilege 2804 DrvInst.exe Token: SeLoadDriverPrivilege 2804 DrvInst.exe Token: SeLoadDriverPrivilege 2804 DrvInst.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 2084 powershell.exe Token: SeDebugPrivilege 980 powershell.exe Token: SeShutdownPrivilege 1352 powercfg.exe Token: SeShutdownPrivilege 1352 powercfg.exe Token: SeShutdownPrivilege 1352 powercfg.exe Token: SeShutdownPrivilege 1352 powercfg.exe Token: SeShutdownPrivilege 1352 powercfg.exe Token: SeCreatePagefilePrivilege 1352 powercfg.exe Token: SeDebugPrivilege 1392 powershell.exe Token: SeDebugPrivilege 2308 powershell.exe Token: SeDebugPrivilege 2236 taskmgr.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe Token: 33 2352 mmc.exe Token: SeIncBasePriorityPrivilege 2352 mmc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe 2236 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2352 mmc.exe 2352 mmc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2912 1180 TWEAK NVDIA.exe 30 PID 1180 wrote to memory of 2912 1180 TWEAK NVDIA.exe 30 PID 1180 wrote to memory of 2912 1180 TWEAK NVDIA.exe 30 PID 1180 wrote to memory of 2912 1180 TWEAK NVDIA.exe 30 PID 1180 wrote to memory of 2808 1180 TWEAK NVDIA.exe 32 PID 1180 wrote to memory of 2808 1180 TWEAK NVDIA.exe 32 PID 1180 wrote to memory of 2808 1180 TWEAK NVDIA.exe 32 PID 1180 wrote to memory of 2808 1180 TWEAK NVDIA.exe 32 PID 2808 wrote to memory of 1640 2808 Update.exe 33 PID 2808 wrote to memory of 1640 2808 Update.exe 33 PID 2808 wrote to memory of 1640 2808 Update.exe 33 PID 2912 wrote to memory of 1440 2912 cmd.exe 34 PID 2912 wrote to memory of 1440 2912 cmd.exe 34 PID 2912 wrote to memory of 1440 2912 cmd.exe 34 PID 2912 wrote to memory of 1440 2912 cmd.exe 34 PID 2912 wrote to memory of 1812 2912 cmd.exe 35 PID 2912 wrote to memory of 1812 2912 cmd.exe 35 PID 2912 wrote to memory of 1812 2912 cmd.exe 35 PID 2912 wrote to memory of 1812 2912 cmd.exe 35 PID 1812 wrote to memory of 2480 1812 cmd.exe 36 PID 1812 wrote to memory of 2480 1812 cmd.exe 36 PID 1812 wrote to memory of 2480 1812 cmd.exe 36 PID 1812 wrote to memory of 2480 1812 cmd.exe 36 PID 1812 wrote to memory of 1524 1812 cmd.exe 37 PID 1812 wrote to memory of 1524 1812 cmd.exe 37 PID 1812 wrote to memory of 1524 1812 cmd.exe 37 PID 1812 wrote to memory of 1524 1812 cmd.exe 37 PID 2912 wrote to memory of 1624 2912 cmd.exe 38 PID 2912 wrote to memory of 1624 2912 cmd.exe 38 PID 2912 wrote to memory of 1624 2912 cmd.exe 38 PID 2912 wrote to memory of 1624 2912 cmd.exe 38 PID 2912 wrote to memory of 2084 2912 cmd.exe 39 PID 2912 wrote to memory of 2084 2912 cmd.exe 39 PID 2912 wrote to memory of 2084 2912 cmd.exe 39 PID 2912 wrote to memory of 2084 2912 cmd.exe 39 PID 2912 wrote to memory of 2000 2912 cmd.exe 40 PID 2912 wrote to memory of 2000 2912 cmd.exe 40 PID 2912 wrote to memory of 2000 2912 cmd.exe 40 PID 2912 wrote to memory of 2000 2912 cmd.exe 40 PID 2912 wrote to memory of 2156 2912 cmd.exe 41 PID 2912 wrote to memory of 2156 2912 cmd.exe 41 PID 2912 wrote to memory of 2156 2912 cmd.exe 41 PID 2912 wrote to memory of 2156 2912 cmd.exe 41 PID 2912 wrote to memory of 2360 2912 cmd.exe 42 PID 2912 wrote to memory of 2360 2912 cmd.exe 42 PID 2912 wrote to memory of 2360 2912 cmd.exe 42 PID 2912 wrote to memory of 2360 2912 cmd.exe 42 PID 2912 wrote to memory of 2136 2912 cmd.exe 43 PID 2912 wrote to memory of 2136 2912 cmd.exe 43 PID 2912 wrote to memory of 2136 2912 cmd.exe 43 PID 2912 wrote to memory of 2136 2912 cmd.exe 43 PID 2912 wrote to memory of 2196 2912 cmd.exe 44 PID 2912 wrote to memory of 2196 2912 cmd.exe 44 PID 2912 wrote to memory of 2196 2912 cmd.exe 44 PID 2912 wrote to memory of 2196 2912 cmd.exe 44 PID 2196 wrote to memory of 1492 2196 net.exe 45 PID 2196 wrote to memory of 1492 2196 net.exe 45 PID 2196 wrote to memory of 1492 2196 net.exe 45 PID 2196 wrote to memory of 1492 2196 net.exe 45 PID 2912 wrote to memory of 1944 2912 cmd.exe 46 PID 2912 wrote to memory of 1944 2912 cmd.exe 46 PID 2912 wrote to memory of 1944 2912 cmd.exe 46 PID 2912 wrote to memory of 1944 2912 cmd.exe 46 PID 2912 wrote to memory of 2512 2912 cmd.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TWEAK NVDIA.exe"C:\Users\Admin\AppData\Local\Temp\TWEAK NVDIA.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Oneclick-V7.0.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\fltMC.exefltmc3⤵PID:1440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "CurrentBuild" 2>nul | findstr "REG_SZ"3⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "CurrentBuild"4⤵PID:2480
-
-
C:\Windows\SysWOW64\findstr.exefindstr "REG_SZ"4⤵PID:1524
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Write-Host 'Windows 11 not detected, we recommend running *Win 11 22H2 or 23H2* for the best results' -ForegroundColor White -BackgroundColor Red"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Write-Host 'Although this doesn''t mean you have to use Win 11.' -ForegroundColor White -BackgroundColor Red"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\SysWOW64\sc.exesc qc "TrustedInstaller"3⤵PID:2000
-
-
C:\Windows\SysWOW64\find.exefind "START_TYPE"3⤵PID:2156
-
-
C:\Windows\SysWOW64\find.exefind "DISABLED"3⤵PID:2360
-
-
C:\Windows\SysWOW64\sc.exesc config TrustedInstaller start=auto3⤵PID:2136
-
-
C:\Windows\SysWOW64\net.exenet start TrustedInstaller3⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TrustedInstaller4⤵PID:1492
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1944
-
-
C:\Windows\SysWOW64\sc.exesc query "WinDefend"3⤵PID:2512
-
-
C:\Windows\SysWOW64\find.exefind "STATE"3⤵PID:1088
-
-
C:\Windows\SysWOW64\find.exefind "RUNNING"3⤵PID:952
-
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1620
-
-
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:736
-
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:832
-
-
C:\Windows\SysWOW64\chcp.comchcp 4373⤵PID:2432
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Write-Host 'Recommended!' -ForegroundColor White -BackgroundColor Red"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:804
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f3⤵PID:2372
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f3⤵
- System Location Discovery: System Language Discovery
PID:608
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f3⤵PID:1300
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2276
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Checkpoint-Computer -Description 'OneClick V7.0 Restore Point'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:2764
-
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2672
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2704
-
-
C:\Windows\SysWOW64\chcp.comchcp 4373⤵PID:2724
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableActivityFeed" /t REG_DWORD /d 0 /f3⤵PID:2772
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "PublishUserActivities" /t REG_DWORD /d 0 /f3⤵PID:2420
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "UploadUserActivities" /t REG_DWORD /d 0 /f3⤵PID:1180
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1648
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:2100
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Sensor\Overrides\{BFA794E4-F964-4FDB-90F6-51056BFE4B44}" /v "SensorPermissionState" /t REG_DWORD /d 0 /f3⤵PID:1224
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\lfsvc\Service\Configuration" /v "Status" /t REG_DWORD /d 0 /f3⤵PID:1652
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\Maps" /v "AutoUpdateEnabled" /t REG_DWORD /d 0 /f3⤵PID:1524
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1960
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:1752
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications" /v ToastEnabled /t REG_DWORD /d 0 /f3⤵PID:2776
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Remove-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\StoragePolicy' -Recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2712
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v Flags /t REG_SZ /d 506 /f3⤵PID:2748
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKU\.DEFAULT\Control Panel\Keyboard" /v InitialKeyboardIndicators /t REG_DWORD /d 80000002 /f3⤵
- Modifies data under HKEY_USERS
PID:2876
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "New-Item -Path 'HKCU:\Software\Classes\CLSID\{86ca1aa0-34aa-4e8b-a509-50c905bae2a2}' -Name 'InprocServer32' -Force -Value ''"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2424
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t REG_DWORD /d 0 /f3⤵
- Modifies visibility of file extensions in Explorer
PID:2972
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2072
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t REG_DWORD /d 1 /f3⤵PID:2720
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2416
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v TaskbarDa /t REG_DWORD /d 0 /f3⤵PID:1792
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:448
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v "DragFullWindows" /t REG_SZ /d "0" /f3⤵PID:1132
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v "MenuShowDelay" /t REG_SZ /d "200" /f3⤵PID:3028
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop\WindowMetrics" /v "MinAnimate" /t REG_SZ /d "0" /f3⤵PID:3024
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Keyboard" /v "KeyboardDelay" /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ListviewAlphaSelect" /t REG_DWORD /d 0 /f3⤵PID:3048
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ListviewShadow" /t REG_DWORD /d 0 /f3⤵PID:2380
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "TaskbarAnimations" /t REG_DWORD /d 0 /f3⤵PID:2448
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects" /v "VisualFXSetting" /t REG_DWORD /d 3 /f3⤵PID:324
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\DWM" /v "EnableAeroPeek" /t REG_DWORD /d 0 /f3⤵PID:2444
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "TaskbarMn" /t REG_DWORD /d 0 /f3⤵PID:1780
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "TaskbarDa" /t REG_DWORD /d 0 /f3⤵PID:568
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowTaskViewButton" /t REG_DWORD /d 0 /f3⤵PID:536
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" /v "SearchboxTaskbarMode" /t REG_DWORD /d 0 /f3⤵PID:316
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-ItemProperty -Path 'HKCU:\Control Panel\Desktop' -Name 'UserPreferencesMask' -Type Binary -Value ([byte[]](144,18,3,128,16,0,0,0))"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2180
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\System\GameConfigStore" /v GameDVR_FSEBehavior /t REG_DWORD /d 2 /f3⤵PID:2068
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\System\GameConfigStore" /v GameDVR_Enabled /t REG_DWORD /d 0 /f3⤵PID:1324
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\System\GameConfigStore" /v GameDVR_DXGIHonorFSEWindowsCompatible /t REG_DWORD /d 1 /f3⤵PID:2112
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\System\GameConfigStore" /v GameDVR_HonorUserFSEBehaviorMode /t REG_DWORD /d 1 /f3⤵PID:2232
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\System\GameConfigStore" /v GameDVR_EFSEFeatureFlags /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\GameDVR" /v AllowGameDVR /t REG_DWORD /d 0 /f3⤵PID:2224
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" /v BingSearchEnabled /t REG_DWORD /d 0 /f3⤵PID:2520
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2128
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\GameBar" /v "AllowAutoGameMode" /t REG_DWORD /d 0 /f3⤵PID:2348
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\GameBar" /v "AutoGameModeEnabled" /t REG_DWORD /d 0 /f3⤵PID:2840
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:928
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\GraphicsDrivers" /v "HwSchMode" /t REG_DWORD /d 2 /f3⤵PID:1988
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2000
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Themes\Personalize /v EnableTransparency /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
PID:1476
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2384
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Mouse" /v MouseSpeed /t REG_SZ /d 0 /f3⤵PID:2136
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Mouse" /v MouseThreshold1 /t REG_SZ /d 0 /f3⤵PID:1492
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Mouse" /v MouseThreshold2 /t REG_SZ /d 0 /f3⤵PID:2196
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Control\Session Manager\Power" /v HibernateEnabled /t REG_DWORD /d 0 /f3⤵PID:1360
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FlyoutMenuSettings" /v ShowHibernateOption /t REG_DWORD /d 0 /f3⤵PID:1088
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg.exe /hibernate off3⤵
- Power Settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1512
-
-
C:\Windows\SysWOW64\sc.exesc config HomeGroupListener start=demand3⤵PID:2244
-
-
C:\Windows\SysWOW64\sc.exesc config HomeGroupProvider start=demand3⤵PID:832
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1260
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\PolicyManager\default\WiFi\AllowWiFiHotSpotReporting" /v "Value" /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:948
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\PolicyManager\default\WiFi\AllowAutoConnectToWiFiSenseHotspots" /v "Value" /t REG_DWORD /d 0 /f3⤵PID:916
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:912
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters" /v DisabledComponents /t REG_DWORD /d 1 /f3⤵PID:904
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1628
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters" /v "DisabledComponents" /t REG_DWORD /d 255 /f3⤵PID:1740
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Disable-NetAdapterBinding -Name '*' -ComponentID ms_tcpip6"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1328
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /f /v EnableLUA /t REG_DWORD /d 03⤵
- UAC bypass
PID:2552
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1548
-
-
C:\Windows\SysWOW64\chcp.comchcp 4373⤵PID:2372
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:608
-
-
C:\Windows\SysWOW64\sc.exesc config AJRouter start=disabled3⤵PID:1300
-
-
C:\Windows\SysWOW64\sc.exesc config ALG start=demand3⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Windows\SysWOW64\sc.exesc config AppIDSvc start=demand3⤵PID:1304
-
-
C:\Windows\SysWOW64\sc.exesc config AppMgmt start=demand3⤵PID:1372
-
-
C:\Windows\SysWOW64\sc.exesc config AppReadiness start=demand3⤵
- Launches sc.exe
PID:1256
-
-
C:\Windows\SysWOW64\sc.exesc config AppVClient start=disabled3⤵
- Launches sc.exe
PID:1580
-
-
C:\Windows\SysWOW64\sc.exesc config AppXSvc start=demand3⤵
- Launches sc.exe
PID:1848
-
-
C:\Windows\SysWOW64\sc.exesc config Appinfo start=demand3⤵
- Launches sc.exe
PID:2760
-
-
C:\Windows\SysWOW64\sc.exesc config AssignedAccessManagerSvc start=disabled3⤵PID:2804
-
-
C:\Windows\SysWOW64\sc.exesc config AudioEndpointBuilder start=auto3⤵PID:3032
-
-
C:\Windows\SysWOW64\sc.exesc config AudioSrv start=auto3⤵PID:2916
-
-
C:\Windows\SysWOW64\sc.exesc config Audiosrv start=auto3⤵PID:1332
-
-
C:\Windows\SysWOW64\sc.exesc config AxInstSV start=demand3⤵
- Launches sc.exe
PID:2160
-
-
C:\Windows\SysWOW64\sc.exesc config BDESVC start=demand3⤵PID:2820
-
-
C:\Windows\SysWOW64\sc.exesc config BFE start=auto3⤵PID:2676
-
-
C:\Windows\SysWOW64\sc.exesc config BITS start=delayed-auto3⤵PID:2516
-
-
C:\Windows\SysWOW64\sc.exesc config BTAGService start=demand3⤵
- Launches sc.exe
PID:2700
-
-
C:\Windows\SysWOW64\sc.exesc config BcastDVRUserService_dc2a4 start=demand3⤵PID:2300
-
-
C:\Windows\SysWOW64\sc.exesc config BluetoothUserService_dc2a4 start=demand3⤵
- Launches sc.exe
PID:2028
-
-
C:\Windows\SysWOW64\sc.exesc config BrokerInfrastructure start=auto3⤵PID:1828
-
-
C:\Windows\SysWOW64\sc.exesc config Browser start=demand3⤵PID:1680
-
-
C:\Windows\SysWOW64\sc.exesc config BthAvctpSvc start=auto3⤵PID:2816
-
-
C:\Windows\SysWOW64\sc.exesc config BthHFSrv start=auto3⤵
- Launches sc.exe
PID:2672
-
-
C:\Windows\SysWOW64\sc.exesc config CDPSvc start=demand3⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\sc.exesc config CDPUserSvc_dc2a4 start=auto3⤵PID:2772
-
-
C:\Windows\SysWOW64\sc.exesc config COMSysApp start=demand3⤵PID:2392
-
-
C:\Windows\SysWOW64\sc.exesc config CaptureService_dc2a4 start=demand3⤵PID:1648
-
-
C:\Windows\SysWOW64\sc.exesc config CertPropSvc start=demand3⤵PID:2480
-
-
C:\Windows\SysWOW64\sc.exesc config ClipSVC start=demand3⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\SysWOW64\sc.exesc config ConsentUxUserSvc_dc2a4 start=demand3⤵
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\Windows\SysWOW64\sc.exesc config CoreMessagingRegistrar start=auto3⤵
- Launches sc.exe
PID:1752
-
-
C:\Windows\SysWOW64\sc.exesc config CredentialEnrollmentManagerUserSvc_dc2a4 start=demand3⤵PID:2504
-
-
C:\Windows\SysWOW64\sc.exesc config CryptSvc start=auto3⤵
- Launches sc.exe
PID:2404
-
-
C:\Windows\SysWOW64\sc.exesc config CscService start=demand3⤵PID:2568
-
-
C:\Windows\SysWOW64\sc.exesc config DPS start=auto3⤵PID:1148
-
-
C:\Windows\SysWOW64\sc.exesc config DcomLaunch start=auto3⤵PID:2248
-
-
C:\Windows\SysWOW64\sc.exesc config DcpSvc start=demand3⤵
- Launches sc.exe
PID:2528
-
-
C:\Windows\SysWOW64\sc.exesc config DevQueryBroker start=demand3⤵
- System Location Discovery: System Language Discovery
PID:1708
-
-
C:\Windows\SysWOW64\sc.exesc config DeviceAssociationBrokerSvc_dc2a4 start=demand3⤵PID:2928
-
-
C:\Windows\SysWOW64\sc.exesc config DeviceAssociationService start=demand3⤵PID:2560
-
-
C:\Windows\SysWOW64\sc.exesc config DeviceInstall start=demand3⤵
- Launches sc.exe
PID:1996
-
-
C:\Windows\SysWOW64\sc.exesc config DevicePickerUserSvc_dc2a4 start=demand3⤵PID:548
-
-
C:\Windows\SysWOW64\sc.exesc config DevicesFlowUserSvc_dc2a4 start=demand3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1384
-
-
C:\Windows\SysWOW64\sc.exesc config Dhcp start=auto3⤵PID:1004
-
-
C:\Windows\SysWOW64\sc.exesc config DiagTrack start=disabled3⤵PID:2712
-
-
C:\Windows\SysWOW64\sc.exesc config DialogBlockingService start=disabled3⤵PID:2376
-
-
C:\Windows\SysWOW64\sc.exesc config DispBrokerDesktopSvc start=auto3⤵PID:2692
-
-
C:\Windows\SysWOW64\sc.exesc config DisplayEnhancementService start=demand3⤵PID:1044
-
-
C:\Windows\SysWOW64\sc.exesc config DmEnrollmentSvc start=demand3⤵PID:1480
-
-
C:\Windows\SysWOW64\sc.exesc config Dnscache start=auto3⤵
- Launches sc.exe
PID:1644
-
-
C:\Windows\SysWOW64\sc.exesc config DoSvc start=delayed-auto3⤵PID:1688
-
-
C:\Windows\SysWOW64\sc.exesc config DsSvc start=demand3⤵PID:2640
-
-
C:\Windows\SysWOW64\sc.exesc config DsmSvc start=demand3⤵PID:2740
-
-
C:\Windows\SysWOW64\sc.exesc config DusmSvc start=auto3⤵
- Launches sc.exe
PID:2488
-
-
C:\Windows\SysWOW64\sc.exesc config EFS start=demand3⤵PID:556
-
-
C:\Windows\SysWOW64\sc.exesc config EapHost start=demand3⤵
- Launches sc.exe
PID:2008
-
-
C:\Windows\SysWOW64\sc.exesc config EntAppSvc start=demand3⤵
- Launches sc.exe
PID:2332
-
-
C:\Windows\SysWOW64\sc.exesc config EventLog start=auto3⤵PID:2844
-
-
C:\Windows\SysWOW64\sc.exesc config EventSystem start=auto3⤵
- Launches sc.exe
PID:1796
-
-
C:\Windows\SysWOW64\sc.exesc config FDResPub start=demand3⤵PID:2972
-
-
C:\Windows\SysWOW64\sc.exesc config Fax start=demand3⤵PID:2624
-
-
C:\Windows\SysWOW64\sc.exesc config FontCache start=auto3⤵PID:2416
-
-
C:\Windows\SysWOW64\sc.exesc config FrameServer start=demand3⤵PID:2580
-
-
C:\Windows\SysWOW64\sc.exesc config FrameServerMonitor start=demand3⤵PID:2996
-
-
C:\Windows\SysWOW64\sc.exesc config GraphicsPerfSvc start=demand3⤵PID:3028
-
-
C:\Windows\SysWOW64\sc.exesc config HomeGroupListener start=demand3⤵PID:2960
-
-
C:\Windows\SysWOW64\sc.exesc config HomeGroupProvider start=demand3⤵PID:3048
-
-
C:\Windows\SysWOW64\sc.exesc config HvHost start=demand3⤵PID:320
-
-
C:\Windows\SysWOW64\sc.exesc config IEEtwCollectorService start=demand3⤵
- System Location Discovery: System Language Discovery
PID:324
-
-
C:\Windows\SysWOW64\sc.exesc config IKEEXT start=demand3⤵PID:3016
-
-
C:\Windows\SysWOW64\sc.exesc config InstallService start=demand3⤵PID:568
-
-
C:\Windows\SysWOW64\sc.exesc config InventorySvc start=demand3⤵PID:2544
-
-
C:\Windows\SysWOW64\sc.exesc config IpxlatCfgSvc start=demand3⤵
- Launches sc.exe
PID:776
-
-
C:\Windows\SysWOW64\sc.exesc config KeyIso start=auto3⤵PID:3064
-
-
C:\Windows\SysWOW64\sc.exesc config KtmRm start=demand3⤵PID:2660
-
-
C:\Windows\SysWOW64\sc.exesc config LSM start=auto3⤵PID:1632
-
-
C:\Windows\SysWOW64\sc.exesc config LanmanServer start=auto3⤵PID:1964
-
-
C:\Windows\SysWOW64\sc.exesc config LanmanWorkstation start=auto3⤵PID:684
-
-
C:\Windows\SysWOW64\sc.exesc config LicenseManager start=demand3⤵
- Launches sc.exe
PID:2180
-
-
C:\Windows\SysWOW64\sc.exesc config LxpSvc start=demand3⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\SysWOW64\sc.exesc config MSDTC start=disabled3⤵PID:2112
-
-
C:\Windows\SysWOW64\sc.exesc config MSiSCSI start=demand3⤵
- Launches sc.exe
PID:2352
-
-
C:\Windows\SysWOW64\sc.exesc config MapsBroker start=delayed-auto3⤵
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\SysWOW64\sc.exesc config McpManagementService start=demand3⤵PID:1588
-
-
C:\Windows\SysWOW64\sc.exesc config MessagingService_dc2a4 start=demand3⤵
- Launches sc.exe
PID:2348
-
-
C:\Windows\SysWOW64\sc.exesc config MicrosoftEdgeElevationService start=demand3⤵PID:924
-
-
C:\Windows\SysWOW64\sc.exesc config MixedRealityOpenXRSvc start=demand3⤵PID:1988
-
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start=auto3⤵PID:2156
-
-
C:\Windows\SysWOW64\sc.exesc config MsKeyboardFilter start=demand3⤵PID:1476
-
-
C:\Windows\SysWOW64\sc.exesc config NPSMSvc_dc2a4 start=demand3⤵PID:2456
-
-
C:\Windows\SysWOW64\sc.exesc config NaturalAuthentication start=demand3⤵PID:1492
-
-
C:\Windows\SysWOW64\sc.exesc config NcaSvc start=demand3⤵PID:1676
-
-
C:\Windows\SysWOW64\sc.exesc config NcbService start=demand3⤵PID:1360
-
-
C:\Windows\SysWOW64\sc.exesc config NcdAutoSetup start=demand3⤵
- Launches sc.exe
PID:952
-
-
C:\Windows\SysWOW64\sc.exesc config NetSetupSvc start=demand3⤵PID:1512
-
-
C:\Windows\SysWOW64\sc.exesc config NetTcpPortSharing start=disabled3⤵PID:2244
-
-
C:\Windows\SysWOW64\sc.exesc config Netlogon start=demand3⤵
- Launches sc.exe
PID:832
-
-
C:\Windows\SysWOW64\sc.exesc config Netman start=demand3⤵
- Launches sc.exe
PID:1008
-
-
C:\Windows\SysWOW64\sc.exesc config NgcCtnrSvc start=demand3⤵PID:916
-
-
C:\Windows\SysWOW64\sc.exesc config NgcSvc start=demand3⤵PID:2964
-
-
C:\Windows\SysWOW64\sc.exesc config NlaSvc start=demand3⤵PID:1628
-
-
C:\Windows\SysWOW64\sc.exesc config OneSyncSvc_dc2a4 start=auto3⤵PID:1776
-
-
C:\Windows\SysWOW64\sc.exesc config P9RdrService_dc2a4 start=demand3⤵PID:3036
-
-
C:\Windows\SysWOW64\sc.exesc config PNRPAutoReg start=demand3⤵PID:1856
-
-
C:\Windows\SysWOW64\sc.exesc config PNRPsvc start=demand3⤵PID:1684
-
-
C:\Windows\SysWOW64\sc.exesc config PcaSvc start=demand3⤵
- Launches sc.exe
PID:1540
-
-
C:\Windows\SysWOW64\sc.exesc config PeerDistSvc start=demand3⤵PID:1392
-
-
C:\Windows\SysWOW64\sc.exesc config PenService_dc2a4 start=demand3⤵PID:1328
-
-
C:\Windows\SysWOW64\sc.exesc config PerfHost start=demand3⤵PID:1748
-
-
C:\Windows\SysWOW64\sc.exesc config PhoneSvc start=demand3⤵PID:2372
-
-
C:\Windows\SysWOW64\sc.exesc config PimIndexMaintenanceSvc_dc2a4 start=demand3⤵PID:2204
-
-
C:\Windows\SysWOW64\sc.exesc config PlugPlay start=demand3⤵
- Launches sc.exe
PID:1052
-
-
C:\Windows\SysWOW64\sc.exesc config PolicyAgent start=demand3⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
C:\Windows\SysWOW64\sc.exesc config Power start=auto3⤵PID:1756
-
-
C:\Windows\SysWOW64\sc.exesc config PrintNotify start=demand3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2260
-
-
C:\Windows\SysWOW64\sc.exesc config PrintWorkflowUserSvc_dc2a4 start=demand3⤵PID:2236
-
-
C:\Windows\SysWOW64\sc.exesc config ProfSvc start=auto3⤵PID:2884
-
-
C:\Windows\SysWOW64\sc.exesc config PushToInstall start=demand3⤵PID:2892
-
-
C:\Windows\SysWOW64\sc.exesc config QWAVE start=demand3⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-
C:\Windows\SysWOW64\sc.exesc config RasAuto start=demand3⤵PID:2900
-
-
C:\Windows\SysWOW64\sc.exesc config RasMan start=demand3⤵PID:2688
-
-
C:\Windows\SysWOW64\sc.exesc config RemoteAccess start=disabled3⤵PID:2988
-
-
C:\Windows\SysWOW64\sc.exesc config RemoteRegistry start=disabled3⤵PID:2680
-
-
C:\Windows\SysWOW64\sc.exesc config RetailDemo start=demand3⤵PID:2788
-
-
C:\Windows\SysWOW64\sc.exesc config RmSvc start=demand3⤵
- Launches sc.exe
PID:2800
-
-
C:\Windows\SysWOW64\sc.exesc config RpcEptMapper start=auto3⤵PID:2932
-
-
C:\Windows\SysWOW64\sc.exesc config RpcLocator start=demand3⤵PID:1244
-
-
C:\Windows\SysWOW64\sc.exesc config RpcSs start=auto3⤵PID:2288
-
-
C:\Windows\SysWOW64\sc.exesc config SCPolicySvc start=demand3⤵
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Windows\SysWOW64\sc.exesc config SCardSvr start=demand3⤵PID:396
-
-
C:\Windows\SysWOW64\sc.exesc config SDRSVC start=demand3⤵PID:864
-
-
C:\Windows\SysWOW64\sc.exesc config SEMgrSvc start=demand3⤵PID:2652
-
-
C:\Windows\SysWOW64\sc.exesc config SENS start=auto3⤵PID:2716
-
-
C:\Windows\SysWOW64\sc.exesc config SNMPTRAP start=demand3⤵PID:1992
-
-
C:\Windows\SysWOW64\sc.exesc config SNMPTrap start=demand3⤵
- Launches sc.exe
PID:2420
-
-
C:\Windows\SysWOW64\sc.exesc config SSDPSRV start=demand3⤵
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Windows\SysWOW64\sc.exesc config SamSs start=auto3⤵PID:2100
-
-
C:\Windows\SysWOW64\sc.exesc config ScDeviceEnum start=demand3⤵
- Launches sc.exe
PID:1224
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start=auto3⤵PID:1524
-
-
C:\Windows\SysWOW64\sc.exesc config SecurityHealthService start=demand3⤵PID:1960
-
-
C:\Windows\SysWOW64\sc.exesc config Sense start=demand3⤵PID:2776
-
-
C:\Windows\SysWOW64\sc.exesc config SensorDataService start=demand3⤵PID:2584
-
-
C:\Windows\SysWOW64\sc.exesc config SensorService start=demand3⤵PID:2564
-
-
C:\Windows\SysWOW64\sc.exesc config SensrSvc start=demand3⤵PID:2024
-
-
C:\Windows\SysWOW64\sc.exesc config SessionEnv start=demand3⤵PID:1636
-
-
C:\Windows\SysWOW64\sc.exesc config SgrmBroker start=auto3⤵PID:1984
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start=demand3⤵PID:2696
-
-
C:\Windows\SysWOW64\sc.exesc config SharedRealitySvc start=demand3⤵
- Launches sc.exe
PID:1272
-
-
C:\Windows\SysWOW64\sc.exesc config ShellHWDetection start=auto3⤵
- Launches sc.exe
PID:1624
-
-
C:\Windows\SysWOW64\sc.exesc config SmsRouter start=demand3⤵PID:3008
-
-
C:\Windows\SysWOW64\sc.exesc config Spooler start=auto3⤵PID:2056
-
-
C:\Windows\SysWOW64\sc.exesc config SstpSvc start=demand3⤵PID:1800
-
-
C:\Windows\SysWOW64\sc.exesc config StateRepository start=demand3⤵PID:2616
-
-
C:\Windows\SysWOW64\sc.exesc config StiSvc start=demand3⤵
- Launches sc.exe
PID:1336
-
-
C:\Windows\SysWOW64\sc.exesc config StorSvc start=demand3⤵
- Launches sc.exe
PID:1152
-
-
C:\Windows\SysWOW64\sc.exesc config SysMain start=auto3⤵
- Launches sc.exe
PID:2876
-
-
C:\Windows\SysWOW64\sc.exesc config SystemEventsBroker start=auto3⤵PID:2600
-
-
C:\Windows\SysWOW64\sc.exesc config TabletInputService start=demand3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\sc.exesc config TapiSrv start=demand3⤵PID:2856
-
-
C:\Windows\SysWOW64\sc.exesc config TermService start=auto3⤵PID:2976
-
-
C:\Windows\SysWOW64\sc.exesc config TextInputManagementService start=demand3⤵
- Launches sc.exe
PID:2320
-
-
C:\Windows\SysWOW64\sc.exesc config Themes start=auto3⤵
- System Location Discovery: System Language Discovery
PID:1640
-
-
C:\Windows\SysWOW64\sc.exesc config TieringEngineService start=demand3⤵PID:2828
-
-
C:\Windows\SysWOW64\sc.exesc config TimeBroker start=demand3⤵PID:2532
-
-
C:\Windows\SysWOW64\sc.exesc config TimeBrokerSvc start=demand3⤵PID:1956
-
-
C:\Windows\SysWOW64\sc.exesc config TokenBroker start=demand3⤵PID:2440
-
-
C:\Windows\SysWOW64\sc.exesc config TrkWks start=auto3⤵PID:2080
-
-
C:\Windows\SysWOW64\sc.exesc config TroubleshootingSvc start=demand3⤵PID:1784
-
-
C:\Windows\SysWOW64\sc.exesc config TrustedInstaller start=demand3⤵
- Launches sc.exe
PID:2284
-
-
C:\Windows\SysWOW64\sc.exesc config UI0Detect start=demand3⤵PID:1500
-
-
C:\Windows\SysWOW64\sc.exesc config UdkUserSvc_dc2a4 start=demand3⤵PID:1792
-
-
C:\Windows\SysWOW64\sc.exesc config UevAgentService start=disabled3⤵PID:448
-
-
C:\Windows\SysWOW64\sc.exesc config UmRdpService start=demand3⤵PID:1132
-
-
C:\Windows\SysWOW64\sc.exesc config UnistoreSvc_dc2a4 start=demand3⤵PID:2836
-
-
C:\Windows\SysWOW64\sc.exesc config UserDataSvc_dc2a4 start=demand3⤵
- Launches sc.exe
PID:2980
-
-
C:\Windows\SysWOW64\sc.exesc config UserManager start=auto3⤵
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Windows\SysWOW64\sc.exesc config UsoSvc start=demand3⤵
- Launches sc.exe
PID:2448
-
-
C:\Windows\SysWOW64\sc.exesc config VGAuthService start=auto3⤵
- Launches sc.exe
PID:2444
-
-
C:\Windows\SysWOW64\sc.exesc config VMTools start=auto3⤵PID:1780
-
-
C:\Windows\SysWOW64\sc.exesc config VSS start=demand3⤵
- System Location Discovery: System Language Discovery
PID:536
-
-
C:\Windows\SysWOW64\sc.exesc config VacSvc start=demand3⤵PID:596
-
-
C:\Windows\SysWOW64\sc.exesc config VaultSvc start=auto3⤵PID:868
-
-
C:\Windows\SysWOW64\sc.exesc config W32Time start=demand3⤵PID:1968
-
-
C:\Windows\SysWOW64\sc.exesc config WEPHOSTSVC start=demand3⤵PID:808
-
-
C:\Windows\SysWOW64\sc.exesc config WFDSConMgrSvc start=demand3⤵
- Launches sc.exe
PID:1576
-
-
C:\Windows\SysWOW64\sc.exesc config WMPNetworkSvc start=demand3⤵PID:332
-
-
C:\Windows\SysWOW64\sc.exesc config WManSvc start=demand3⤵
- Launches sc.exe
PID:980
-
-
C:\Windows\SysWOW64\sc.exesc config WPDBusEnum start=demand3⤵
- Launches sc.exe
PID:1100
-
-
C:\Windows\SysWOW64\sc.exesc config WSService start=demand3⤵PID:1324
-
-
C:\Windows\SysWOW64\sc.exesc config WSearch start=delayed-auto3⤵
- Launches sc.exe
PID:2232
-
-
C:\Windows\SysWOW64\sc.exesc config WaaSMedicSvc start=demand3⤵PID:1532
-
-
C:\Windows\SysWOW64\sc.exesc config WalletService start=demand3⤵PID:2520
-
-
C:\Windows\SysWOW64\sc.exesc config WarpJITSvc start=demand3⤵PID:2128
-
-
C:\Windows\SysWOW64\sc.exesc config WbioSrvc start=demand3⤵PID:2840
-
-
C:\Windows\SysWOW64\sc.exesc config Wcmsvc start=auto3⤵PID:928
-
-
C:\Windows\SysWOW64\sc.exesc config WcsPlugInService start=demand3⤵PID:1616
-
-
C:\Windows\SysWOW64\sc.exesc config WdNisSvc start=demand3⤵PID:2000
-
-
C:\Windows\SysWOW64\sc.exesc config WdiServiceHost start=demand3⤵PID:2384
-
-
C:\Windows\SysWOW64\sc.exesc config WdiSystemHost start=demand3⤵PID:2136
-
-
C:\Windows\SysWOW64\sc.exesc config WebClient start=demand3⤵PID:2196
-
-
C:\Windows\SysWOW64\sc.exesc config Wecsvc start=demand3⤵PID:1944
-
-
C:\Windows\SysWOW64\sc.exesc config WerSvc start=demand3⤵PID:1088
-
-
C:\Windows\SysWOW64\sc.exesc config WiaRpc start=demand3⤵
- Launches sc.exe
PID:1352
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start=auto3⤵PID:2220
-
-
C:\Windows\SysWOW64\sc.exesc config WinHttpAutoProxySvc start=demand3⤵PID:2092
-
-
C:\Windows\SysWOW64\sc.exesc config WinRM start=demand3⤵PID:2296
-
-
C:\Windows\SysWOW64\sc.exesc config Winmgmt start=auto3⤵PID:948
-
-
C:\Windows\SysWOW64\sc.exesc config WlanSvc start=auto3⤵PID:912
-
-
C:\Windows\SysWOW64\sc.exesc config WpcMonSvc start=demand3⤵PID:904
-
-
C:\Windows\SysWOW64\sc.exesc config WpnService start=demand3⤵
- Launches sc.exe
PID:2340
-
-
C:\Windows\SysWOW64\sc.exesc config WpnUserService_dc2a4 start=auto3⤵PID:2312
-
-
C:\Windows\SysWOW64\sc.exesc config WwanSvc start=demand3⤵PID:1672
-
-
C:\Windows\SysWOW64\sc.exesc config XblAuthManager start=demand3⤵PID:1560
-
-
C:\Windows\SysWOW64\sc.exesc config XblGameSave start=demand3⤵PID:2012
-
-
C:\Windows\SysWOW64\sc.exesc config XboxGipSvc start=demand3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:824
-
-
C:\Windows\SysWOW64\sc.exesc config XboxNetApiSvc start=demand3⤵PID:2620
-
-
C:\Windows\SysWOW64\sc.exesc config autotimesvc start=demand3⤵PID:1556
-
-
C:\Windows\SysWOW64\sc.exesc config bthserv start=demand3⤵PID:756
-
-
C:\Windows\SysWOW64\sc.exesc config camsvc start=demand3⤵PID:1252
-
-
C:\Windows\SysWOW64\sc.exesc config cbdhsvc_dc2a4 start=demand3⤵PID:2276
-
-
C:\Windows\SysWOW64\sc.exesc config cloudidsvc start=demand3⤵PID:1760
-
-
C:\Windows\SysWOW64\sc.exesc config dcsvc start=demand3⤵PID:2732
-
-
C:\Windows\SysWOW64\sc.exesc config defragsvc start=demand3⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Windows\SysWOW64\sc.exesc config diagnosticshub.standardcollector.service start=demand3⤵PID:2940
-
-
C:\Windows\SysWOW64\sc.exesc config diagsvc start=demand3⤵PID:1580
-
-
C:\Windows\SysWOW64\sc.exesc config dmwappushservice start=demand3⤵PID:1848
-
-
C:\Windows\SysWOW64\sc.exesc config dot3svc start=demand3⤵PID:2212
-
-
C:\Windows\SysWOW64\sc.exesc config edgeupdate start=demand3⤵PID:1292
-
-
C:\Windows\SysWOW64\sc.exesc config edgeupdatem start=demand3⤵
- Launches sc.exe
PID:2900
-
-
C:\Windows\SysWOW64\sc.exesc config embeddedmode start=demand3⤵PID:2688
-
-
C:\Windows\SysWOW64\sc.exesc config fdPHost start=demand3⤵PID:2988
-
-
C:\Windows\SysWOW64\sc.exesc config fhsvc start=demand3⤵
- Launches sc.exe
PID:2680
-
-
C:\Windows\SysWOW64\sc.exesc config gpsvc start=auto3⤵PID:2788
-
-
C:\Windows\SysWOW64\sc.exesc config hidserv start=demand3⤵
- Launches sc.exe
PID:2800
-
-
C:\Windows\SysWOW64\sc.exesc config icssvc start=demand3⤵PID:2932
-
-
C:\Windows\SysWOW64\sc.exesc config iphlpsvc start=auto3⤵PID:1244
-
-
C:\Windows\SysWOW64\sc.exesc config lfsvc start=demand3⤵PID:2288
-
-
C:\Windows\SysWOW64\sc.exesc config lltdsvc start=demand3⤵
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Windows\SysWOW64\sc.exesc config lmhosts start=demand3⤵PID:396
-
-
C:\Windows\SysWOW64\sc.exesc config mpssvc start=auto3⤵PID:864
-
-
C:\Windows\SysWOW64\sc.exesc config msiserver start=demand3⤵PID:2652
-
-
C:\Windows\SysWOW64\sc.exesc config netprofm start=demand3⤵
- Launches sc.exe
PID:2716
-
-
C:\Windows\SysWOW64\sc.exesc config nsi start=auto3⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
C:\Windows\SysWOW64\sc.exesc config p2pimsvc start=demand3⤵
- System Location Discovery: System Language Discovery
PID:2420
-
-
C:\Windows\SysWOW64\sc.exesc config p2psvc start=demand3⤵
- Launches sc.exe
PID:1804
-
-
C:\Windows\SysWOW64\sc.exesc config perceptionsimulation start=demand3⤵PID:2100
-
-
C:\Windows\SysWOW64\sc.exesc config pla start=demand3⤵
- Launches sc.exe
PID:1224
-
-
C:\Windows\SysWOW64\sc.exesc config seclogon start=demand3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1524
-
-
C:\Windows\SysWOW64\sc.exesc config shpamsvc start=disabled3⤵PID:1960
-
-
C:\Windows\SysWOW64\sc.exesc config smphost start=disabled3⤵
- Launches sc.exe
PID:2776
-
-
C:\Windows\SysWOW64\sc.exesc config spectrum start=demand3⤵PID:2584
-
-
C:\Windows\SysWOW64\sc.exesc config sppsvc start=delayed-auto3⤵
- Launches sc.exe
PID:2564
-
-
C:\Windows\SysWOW64\sc.exesc config ssh-agent start=disabled3⤵PID:2024
-
-
C:\Windows\SysWOW64\sc.exesc config svsvc start=demand3⤵PID:1636
-
-
C:\Windows\SysWOW64\sc.exesc config swprv start=demand3⤵PID:1984
-
-
C:\Windows\SysWOW64\sc.exesc config tiledatamodelsvc start=auto3⤵PID:2928
-
-
C:\Windows\SysWOW64\sc.exesc config tzautoupdate start=disabled3⤵PID:2560
-
-
C:\Windows\SysWOW64\sc.exesc config uhssvc start=disabled3⤵PID:2860
-
-
C:\Windows\SysWOW64\sc.exesc config upnphost start=demand3⤵
- Launches sc.exe
PID:548
-
-
C:\Windows\SysWOW64\sc.exesc config vds start=demand3⤵PID:1384
-
-
C:\Windows\SysWOW64\sc.exesc config vm3dservice start=demand3⤵PID:1004
-
-
C:\Windows\SysWOW64\sc.exesc config vmicguestinterface start=demand3⤵PID:2712
-
-
C:\Windows\SysWOW64\sc.exesc config vmicheartbeat start=demand3⤵PID:588
-
-
C:\Windows\SysWOW64\sc.exesc config vmickvpexchange start=demand3⤵
- Launches sc.exe
PID:2256
-
-
C:\Windows\SysWOW64\sc.exesc config vmicrdv start=demand3⤵PID:1044
-
-
C:\Windows\SysWOW64\sc.exesc config vmicshutdown start=demand3⤵PID:1480
-
-
C:\Windows\SysWOW64\sc.exesc config vmictimesync start=demand3⤵PID:2752
-
-
C:\Windows\SysWOW64\sc.exesc config vmicvmsession start=demand3⤵PID:3020
-
-
C:\Windows\SysWOW64\sc.exesc config vmicvss start=demand3⤵PID:2640
-
-
C:\Windows\SysWOW64\sc.exesc config vmvss start=demand3⤵PID:2084
-
-
C:\Windows\SysWOW64\sc.exesc config wbengine start=demand3⤵PID:2488
-
-
C:\Windows\SysWOW64\sc.exesc config wcncsvc start=demand3⤵
- Launches sc.exe
PID:556
-
-
C:\Windows\SysWOW64\sc.exesc config webthreatdefsvc start=demand3⤵PID:2636
-
-
C:\Windows\SysWOW64\sc.exesc config webthreatdefusersvc_dc2a4 start=auto3⤵PID:992
-
-
C:\Windows\SysWOW64\sc.exesc config wercplsupport start=demand3⤵
- Launches sc.exe
PID:2844
-
-
C:\Windows\SysWOW64\sc.exesc config wisvc start=demand3⤵
- Launches sc.exe
PID:2072
-
-
C:\Windows\SysWOW64\sc.exesc config wlidsvc start=demand3⤵PID:2972
-
-
C:\Windows\SysWOW64\sc.exesc config wlpasvc start=demand3⤵
- Launches sc.exe
PID:2016
-
-
C:\Windows\SysWOW64\sc.exesc config wmiApSrv start=demand3⤵PID:2416
-
-
C:\Windows\SysWOW64\sc.exesc config workfolderssvc start=demand3⤵PID:2992
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start=delayed-auto3⤵PID:2996
-
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start=demand3⤵PID:1920
-
-
C:\Windows\SysWOW64\sc.exesc config wudfsvc start=demand3⤵PID:2960
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1236
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2380
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /Disable3⤵PID:2436
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\ProgramDataUpdater" /Disable3⤵PID:484
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Autochk\Proxy" /Disable3⤵PID:772
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /Disable3⤵PID:568
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /Disable3⤵PID:264
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /Disable3⤵PID:776
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Feedback\Siuf\DmClient" /Disable3⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Feedback\Siuf\DmClientOnScenarioDownload" /Disable3⤵PID:2852
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Error Reporting\QueueReporting" /Disable3⤵PID:580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\MareBackup" /Disable3⤵PID:1964
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\StartupAppTask" /Disable3⤵PID:2068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\PcaPatchDbTask" /Disable3⤵
- System Location Discovery: System Language Discovery
PID:2180
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Maps\MapsUpdateTask" /Disable3⤵PID:2116
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f3⤵PID:2112
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:544
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v ContentDeliveryAllowed /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v OemPreInstalledAppsEnabled /t REG_DWORD /d 0 /f3⤵PID:940
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v PreInstalledAppsEnabled /t REG_DWORD /d 0 /f3⤵PID:2520
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v PreInstalledAppsEverEnabled /t REG_DWORD /d 0 /f3⤵PID:932
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v SilentInstalledAppsEnabled /t REG_DWORD /d 0 /f3⤵PID:2464
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v SubscribedContent-338387Enabled /t REG_DWORD /d 0 /f3⤵PID:2840
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v SubscribedContent-338388Enabled /t REG_DWORD /d 0 /f3⤵PID:924
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v SubscribedContent-338389Enabled /t REG_DWORD /d 0 /f3⤵PID:2360
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v SubscribedContent-353698Enabled /t REG_DWORD /d 0 /f3⤵PID:1616
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v SystemPaneSuggestionsEnabled /t REG_DWORD /d 0 /f3⤵PID:2368
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\CloudContent" /v DisableWindowsConsumerFeatures /t REG_DWORD /d 1 /f3⤵PID:672
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Siuf\Rules" /v NumberOfSIUFInPeriod /t REG_DWORD /d 0 /f3⤵PID:2384
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v DoNotShowFeedbackNotifications /t REG_DWORD /d 1 /f3⤵PID:2228
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Policies\Microsoft\Windows\CloudContent" /v DisableTailoredExperiencesWithDiagnosticData /t REG_DWORD /d 1 /f3⤵PID:1492
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo" /v DisabledByGroupPolicy /t REG_DWORD /d 1 /f3⤵PID:2196
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /v Disabled /t REG_DWORD /d 1 /f3⤵PID:2512
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v DODownloadMode /t REG_DWORD /d 1 /f3⤵PID:1620
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Remote Assistance" /v fAllowToGetHelp /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:1088
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\OperationStatusManager" /v EnthusiastMode /t REG_DWORD /d 1 /f3⤵PID:736
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowTaskViewButton /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\People" /v PeopleBand /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v LaunchTo /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:1260
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\FileSystem" /v LongPathsEnabled /t REG_DWORD /d 1 /f3⤵PID:1508
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DriverSearching" /v SearchOrderConfig /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile" /v SystemResponsiveness /t REG_DWORD /d 0 /f3⤵PID:1820
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile" /v NetworkThrottlingIndex /t REG_DWORD /d 4294967295 /f3⤵PID:288
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v MenuShowDelay /t REG_DWORD /d 1 /f3⤵PID:912
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v AutoEndTasks /t REG_DWORD /d 1 /f3⤵PID:2964
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v ClearPageFileAtShutdown /t REG_DWORD /d 0 /f3⤵PID:1628
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Services\Ndu" /v Start /t REG_DWORD /d 2 /f3⤵PID:2340
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Mouse" /v MouseHoverTime /t REG_SZ /d 400 /f3⤵PID:1340
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" /v IRPStackSize /t REG_DWORD /d 30 /f3⤵PID:3036
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Policies\Microsoft\Windows\Windows Feeds" /v EnableFeeds /t REG_DWORD /d 0 /f3⤵PID:1672
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Feeds" /v ShellFeedsTaskbarViewMode /t REG_DWORD /d 2 /f3⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCAMeetNow /t REG_DWORD /d 1 /f3⤵PID:1684
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "GPU Priority" /t REG_DWORD /d 8 /f3⤵PID:2012
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v Priority /t REG_DWORD /d 6 /f3⤵PID:2264
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Scheduling Category" /t REG_SZ /d High /f3⤵PID:1392
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\UserProfileEngagement" /v "ScoobeSystemSettingEnabled" /t REG_DWORD /d 0 /f3⤵PID:2620
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v CurrentBuild 2>nul | findstr /r /c:"CurrentBuild"3⤵PID:608
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v CurrentBuild4⤵PID:756
-
-
C:\Windows\SysWOW64\findstr.exefindstr /r /c:"CurrentBuild"4⤵PID:2372
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -Command "Start-Process taskmgr.exe -WindowStyle Hidden"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308 -
C:\Windows\SysWOW64\taskmgr.exe"C:\Windows\system32\taskmgr.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2236
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2884
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2160
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:3004
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2680
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2676
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2708
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2800
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2280
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵PID:2736
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1244
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2188
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1828
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵PID:2004
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1680
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2816
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:864
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2724
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2728
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2716
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1180
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2392
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2420
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1436
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵PID:2100
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1652
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1788
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1524
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1752
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2504
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2776
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2404
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2568
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1712
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2528
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2088
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1984
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1624
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵PID:3008
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2860
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵PID:2056
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1800
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1384
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2616
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- System Location Discovery: System Language Discovery
PID:1336
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2712
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵PID:1152
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2876
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2256
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1924
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵PID:2856
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2752
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1688
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵
- System Location Discovery: System Language Discovery
PID:280
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2640
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2740
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵PID:2572
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2488
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2008
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2636
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2332
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2424
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1796
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2284
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2624
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2016
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:448
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2992
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1132
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵PID:2836
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1920
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2980
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2696
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵PID:1236
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2380
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵PID:324
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2444
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:484
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1780
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:536
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:568
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:596
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:580
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:684
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2108
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2068
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2180
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1324
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵
- System Location Discovery: System Language Discovery
PID:924
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2360
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:672
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2384
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:2228
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:1492
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:1620
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1088
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences3⤵PID:736
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:304
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000320" "0000000000000494"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2352
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
1Ignore Process Interrupts
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
1File Deletion
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5061be0f53c7febeb3e363c867b9c128d
SHA13629f358e24dddc04c05fdd4b9899f57a8091286
SHA25658729cdacc6ce4ea7e168a598fd3e29a1d3d017adbf85badbfb6de818b0de45c
SHA512d1c520e4565ed492f312e8fe611913f013fe2e05539e42f9185271e8a811b50af8a1cd2e5445959c068c5d4adf1633c06d6a387d3b6cb1fa5c5fa84faff31e2d
-
Filesize
1.6MB
MD5db09c9bbec6134db1766d369c339a0a1
SHA1c156d9f2d0e80b4cf41794cd9b8b1e8a352e0a0b
SHA256b1aac1e461174bbae952434e4dac092590d72b9832a04457c94bd9bb7ee8ad79
SHA512653a7fff6a2b6bffb9ea2c0b72ddb83c9c53d555e798eea47101b0d932358180a01af2b9dab9c27723057439c1eaffb8d84b9b41f6f9cd1c3c934f1794104d45
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD546b5d6953d94627432afed7aa366c29d
SHA11a96f7b134b7cc19ccbfb3e8808e163f50d45ba1
SHA2563ae83dd776edc6e1bd0f87509713a7428c0bddcb0047530664ae7cc2c4443e85
SHA512229f71c958d698a619ccda69e8621e9779a98e64105efdc1ab98e69a55ae603d1fbb72bd62dc37d85c5c5da339d14f46f04ee4d87e0f0219ac73860389097657
-
Filesize
10.8MB
MD5325bc1091d3aa90371df0e8f9095ab63
SHA128084aa70ddd36fe43e9c2078c5438c5048ab0cb
SHA256097826ecce3278e1da5f0bee44a75a35ef38ca4c56e1f64c43a40c7b47cd9c17
SHA5123f67b1bd376f3246900be4c7324e82cc71b3c890a87b76c51ea282d8f04db615435152063405c5ed402c88f44ef75b4c0f4260dd958044f96fb7775b11634996