Eventvwr.exe

Displays Windows Event Logs in a GUI window.

UAC Bypass

Execute a binary or script as a high-integrity process without a UAC prompt.

eventvwr.exe

During startup, eventvwr.exe checks the registry value `HKCU\Software\Classes\mscfile\shell\open\command` for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user. — MITRE: T1548.002 — Privileges: User

Execute a command to bypass security restrictions that limit the use of command-line interpreters.

ysoserial.exe -o raw -f BinaryFormatter - g DataSet -c "{CMD}" > RecentViews & copy RecentViews %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews & eventvwr.exe

During startup, eventvwr.exe uses .NET deserialization with `%LOCALAPPDATA%\Microsoft\EventV~1\RecentViews` file. This file can be created using https://github.com/pwntester/ysoserial.net — MITRE: T1548.002 — Privileges: Administrator