Technical Information
- [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] 'Realtek HD Audio' = '%PROGRAMDATA%\RealtekHD\taskhostw.exe'
- <SYSTEM32>\tasks\microsoft\windows\wininet\systemc
- [<HKLM>\System\CurrentControlSet\Services\AppIDSvc] 'Start' = '00000002'
- User Account Control (UAC)
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'DisallowRun' = '00000001'
- [<HKLM>\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths] '%PROGRAMDATA%' = 'System'
- [<HKLM>\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows Defender\Exclusions\Paths] '%PROGRAMDATA%' = 'System'
- [<HKLM>\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths] '<SYSTEM32>' = 'SystemHD'
- [<HKLM>\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows Defender\Exclusions\Paths] '<SYSTEM32>' = 'SystemHD'
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN
- '%WINDIR%\syswow64\netsh.exe' advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN
- %PROGRAMDATA%\microsoft\check\check.txt
- %PROGRAMDATA%\realtekhd\taskhostw.exe
- %TEMP%\aut1914.tmp
- C:\rdp\db.rar
- C:\rdp\run.vbs
- C:\rdp\rar.exe
- C:\rdp\pause.bat
- %CommonProgramFiles%\system\iediagcmd.exe
- %PROGRAMDATA%\windowstask\opencl.dll
- %TEMP%\aut3ec0.tmp
- %PROGRAMDATA%\microsoft\intel\taskhost.exe
- %PROGRAMDATA%\windows\install.vbs
- %PROGRAMDATA%\windows\reg2.reg
- %TEMP%\aut1b18.tmp
- %PROGRAMDATA%\windows\reg1.reg
- %PROGRAMDATA%\windows\vp8decoder.dll
- %PROGRAMDATA%\windows\winit.exe
- %PROGRAMDATA%\windows\rutserv.exe
- %PROGRAMDATA%\windows\rfusclient.exe
- %PROGRAMDATA%\microsoft\intel\r8.exe
- %PROGRAMDATA%\windows\install.bat
- %PROGRAMDATA%\install\cheat.exe
- %TEMP%\aut18ac.tmp
- %PROGRAMDATA%\microsoft\intel\wini.exe
- %TEMP%\autfa36.tmp
- %PROGRAMDATA%\microsoft\temp\h.bat
- %TEMP%\autf95b.tmp
- %PROGRAMDATA%\windows\vp8encoder.dll
- %PROGRAMDATA%\windowstask\microsofthost.exe
- %TEMP%\autf95b.tmp
- %TEMP%\autfa36.tmp
- %TEMP%\aut18ac.tmp
- %TEMP%\aut3ec0.tmp
- %TEMP%\aut1914.tmp
- %TEMP%\aut1b18.tmp
- ClassName: 'EDIT' WindowName: ''
- ClassName: 'RegEdit_RegEdit' WindowName: ''
- '%PROGRAMDATA%\microsoft\intel\wini.exe' -pnaxui
- '%PROGRAMDATA%\install\cheat.exe' -pnaxui
- '%PROGRAMDATA%\microsoft\intel\taskhost.exe'
- '%WINDIR%\syswow64\wscript.exe' "C:\rdp\run.vbs"
- '%WINDIR%\syswow64\wscript.exe' "%PROGRAMDATA%\Windows\install.vbs"
- '%PROGRAMDATA%\windows\winit.exe'
- '%PROGRAMDATA%\microsoft\intel\r8.exe'
- '%WINDIR%\syswow64\cmd.exe' /c icacls %PROGRAMDATA%\Indus /deny System:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %PROGRAMDATA%\Malwarebytes /deny %username%:(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %PROGRAMDATA%\Malwarebytes /deny System:(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %PROGRAMDATA%\MB3Install /deny %username%:(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls C:\AdwCleaner /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %PROGRAMDATA%\MB3Install /deny System:(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles(x86)%\360" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\ByteFence" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls C:\KVRT_Data /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %PROGRAMDATA%\Indus /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\Malwarebytes" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\COMODO" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %WINDIR%\speechstracing /deny system:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\schtasks.exe' /create /TN "Microsoft\Windows\Wininet\SystemC" /TR "%PROGRAMDATA%\RealtekHD\taskhostw.exe" /SC MINUTE /MO 15' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\Enigma Software Group" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\SpyHunter" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles(x86)%\AVAST Software" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\AVAST Software" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c %PROGRAMDATA%\microsoft\temp\H.bat' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%PROGRAMDATA%\AVAST Software" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\AVG" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\Internet Explorer\bin" /deny system:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%PROGRAMDATA%\360safe" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles(x86)%\SpyHunter" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %WINDIR%\speechstracing /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%WINDIR%\Fonts\Mysql" /deny System:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\Internet Explorer\bin" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c sc delete crmsvc' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c netsh advfirewall set allprofiles state on' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c sc stop bytefenceservice' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c sc delete bytefenceservice' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c sc config appmgmt start= auto' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c sc delete swprv' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c sc delete mbamservice' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c sc config appidsvc start= auto' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c sc start appmgmt' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c sc stop mbamservice' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles(x86)%\Microsoft JDX" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c sc start appidsvc' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles(x86)%\Microsoft JDX" /deny System:(OI)(CI)(F)' (with hidden window)
- '%PROGRAMDATA%\microsoft\intel\r8.exe' ' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%CommonProgramFiles%\System\iediagcmd.exe" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c ""%PROGRAMDATA%\Windows\install.bat" "' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%CommonProgramFiles%\System\iediagcmd.exe" /deny System:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%PROGRAMDATA%\microsoft\clr_optimization_v4.0.30318_64" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%PROGRAMDATA%\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%PROGRAMDATA%\Norton" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%WINDIR%\Fonts\Mysql" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles(x86)%\AVG" /deny %username%:(OI)(CI)(F)' (with hidden window)
- '%WINDIR%\syswow64\schtasks.exe' /create /TN "Microsoft\Windows\Wininet\SystemC" /TR "%PROGRAMDATA%\RealtekHD\taskhostw.exe" /SC MINUTE /MO 1' (with hidden window)
- '%WINDIR%\syswow64\schtasks.exe' /create /TN "Microsoft\Windows\Wininet\SystemC" /TR "%PROGRAMDATA%\RealtekHD\taskhostw.exe" /SC MINUTE /MO 15
- '%WINDIR%\syswow64\regedit.exe' /s "reg2.reg"
- '%WINDIR%\syswow64\icacls.exe' %PROGRAMDATA%\Malwarebytes /deny System:(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\SpyHunter" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\Enigma Software Group" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\COMODO" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\Malwarebytes" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles(x86)%\SpyHunter" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\icacls.exe' "%ProgramFiles%\ByteFence" /deny user:(OI)(CI)(F)
- '%WINDIR%\syswow64\sc.exe' config appidsvc start= auto
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles(x86)%\360" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls C:\KVRT_Data /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\ByteFence" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\sc.exe' delete crmsvc
- '%WINDIR%\syswow64\icacls.exe' "%CommonProgramFiles%\System\iediagcmd.exe" /deny user:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls C:\AdwCleaner /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%PROGRAMDATA%\360safe" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\timeout.exe' 2
- '%WINDIR%\syswow64\icacls.exe' %PROGRAMDATA%\Malwarebytes /deny user:(F)
- '%WINDIR%\syswow64\icacls.exe' %PROGRAMDATA%\MB3Install /deny user:(F)
- '%WINDIR%\syswow64\icacls.exe' "%PROGRAMDATA%\microsoft\clr_optimization_v4.0.30318_64" /deny user:(OI)(CI)(F)
- '%WINDIR%\syswow64\schtasks.exe' /create /TN "Microsoft\Windows\Wininet\SystemC" /TR "%PROGRAMDATA%\RealtekHD\taskhostw.exe" /SC MINUTE /MO 1
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%PROGRAMDATA%\Norton" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles(x86)%\AVG" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\icacls.exe' "%ProgramFiles(x86)%\Microsoft JDX" /deny System:(OI)(CI)(F)
- '%WINDIR%\syswow64\sc.exe' stop bytefenceservice
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\AVG" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\regedit.exe' /s "reg1.reg"
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%PROGRAMDATA%\AVAST Software" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\icacls.exe' "%WINDIR%\Fonts\Mysql" /deny System:(OI)(CI)(F)
- '%WINDIR%\syswow64\sc.exe' delete swprv
- '%WINDIR%\syswow64\sc.exe' delete mbamservice
- '%WINDIR%\syswow64\cmd.exe' /c %PROGRAMDATA%\microsoft\temp\H.bat
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\AVAST Software" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles(x86)%\AVAST Software" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\icacls.exe' %PROGRAMDATA%\Indus /deny System:(OI)(CI)(F)
- '%WINDIR%\syswow64\icacls.exe' %PROGRAMDATA%\MB3Install /deny System:(F)
- '%WINDIR%\syswow64\icacls.exe' C:\AdwCleaner /deny user:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %PROGRAMDATA%\Indus /deny System:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%CommonProgramFiles%\System\iediagcmd.exe" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN
- '%WINDIR%\syswow64\cmd.exe' /c netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN
- '%WINDIR%\syswow64\cmd.exe' /c netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles(x86)%\Microsoft JDX" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c sc delete mbamservice
- '%WINDIR%\syswow64\cmd.exe' /c sc delete crmsvc
- '%WINDIR%\syswow64\cmd.exe' /c netsh advfirewall set allprofiles state on
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles(x86)%\Microsoft JDX" /deny System:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN
- '%WINDIR%\syswow64\cmd.exe' /c sc delete bytefenceservice
- '%WINDIR%\syswow64\cmd.exe' /c sc stop mbamservice
- '%WINDIR%\syswow64\cmd.exe' /c sc delete swprv
- '%WINDIR%\syswow64\cmd.exe' /c sc config appmgmt start= auto
- '%WINDIR%\syswow64\cmd.exe' /c sc config appidsvc start= auto
- '%WINDIR%\syswow64\cmd.exe' /c sc start appmgmt
- '%WINDIR%\syswow64\cmd.exe' /c sc start appidsvc
- '%WINDIR%\syswow64\cmd.exe' /c sc stop bytefenceservice
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\Internet Explorer\bin" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\icacls.exe' "%ProgramFiles(x86)%\Microsoft JDX" /deny user:(OI)(CI)(F)
- '%WINDIR%\syswow64\sc.exe' start appidsvc
- '%WINDIR%\syswow64\cmd.exe' /c icacls %PROGRAMDATA%\MB3Install /deny System:(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %PROGRAMDATA%\MB3Install /deny %username%:(F)
- '%WINDIR%\syswow64\netsh.exe' advfirewall set allprofiles state on
- '%WINDIR%\syswow64\cmd.exe' /c icacls %PROGRAMDATA%\Malwarebytes /deny System:(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %PROGRAMDATA%\Malwarebytes /deny %username%:(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %WINDIR%\speechstracing /deny system:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %WINDIR%\speechstracing /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls %PROGRAMDATA%\Indus /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%ProgramFiles%\Internet Explorer\bin" /deny system:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%WINDIR%\Fonts\Mysql" /deny System:(OI)(CI)(F)
- '%WINDIR%\syswow64\sc.exe' delete bytefenceservice
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%WINDIR%\Fonts\Mysql" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%PROGRAMDATA%\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%PROGRAMDATA%\microsoft\clr_optimization_v4.0.30318_64" /deny %username%:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c icacls "%CommonProgramFiles%\System\iediagcmd.exe" /deny System:(OI)(CI)(F)
- '%WINDIR%\syswow64\cmd.exe' /c ""%PROGRAMDATA%\Windows\install.bat" "
- '%WINDIR%\syswow64\sc.exe' start appmgmt
- '%WINDIR%\syswow64\sc.exe' config appmgmt start= auto