Защити созданное

Другие наши ресурсы

  • free.drweb.kz — бесплатные утилиты, плагины, информеры
  • av-desk.com — интернет-сервис для поставщиков услуг Dr.Web AV-Desk
  • curenet.drweb.kz — сетевая лечащая утилита Dr.Web CureNet!
Закрыть

Библиотека
Моя библиотека

Чтобы добавить ресурс в библиотеку, войдите в аккаунт.

+ Добавить в библиотеку

Ресурсов: -

Последний: -

Моя библиотека

Поддержка
Круглосуточная поддержка | Правила обращения

Позвоните

Глобальная поддержка:
+7 (495) 789-45-86

ЧаВо | Форум

Ваши запросы

  • Все: -
  • Незакрытые: -
  • Последний: -

Позвоните

Глобальная поддержка:
+7 (495) 789-45-86

Свяжитесь с нами Незакрытые запросы: 

Профиль

Профиль

Trojan.BtcMine.1418

Добавлен в вирусную базу Dr.Web: 2017-07-31

Описание добавлено:

Technical Information

To ensure autorun and distribution
Sets the following service settings
  • [<HKLM>\System\CurrentControlSet\Services\NcbsServices] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\NcbsServices] 'ImagePath' = '<SYSTEM32>\ycogcg.exe'
Creates the following services
  • 'NcbsServices' <SYSTEM32>\ycogcg.exe
Malicious functions
Executes the following
  • '<SYSTEM32>\net.exe' stop UI0Detect
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=6666
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=7777
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=8005
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=8050
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=8100
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=8888
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=9100
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=45560
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=9500
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=9999
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=8443
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=8080
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=14444
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=14433
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=5555
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=9050
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=4444
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=in action=block protocol=UDP localport=445
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=allow protocol=TCP remoteport=80
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=allow protocol=TCP remoteport=443
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=in action=allow protocol=TCP localport=37799
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="sqlserver" dir=in action=allow protocol=TCP localport=1433
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=in action=allow protocol=TCP localport=3389
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=in action=block protocol=TCP localport=445
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=2999
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3335
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3000
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3001
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3002
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3003
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3333
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3334
  • '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3336
  • '<SYSTEM32>\netsh.exe' firewall set opmode mode=enable
Modifies file system
Creates the following files
  • %WINDIR%\media\runtimebrokers.exe
  • %WINDIR%\apppatch\windowsupdate.bat
  • <SYSTEM32>\ycogcg.exe
  • <DRIVERS>\etc\$
Sets the 'hidden' attribute to the following files
  • %WINDIR%\media\runtimebrokers.exe
  • %WINDIR%\apppatch\windowsupdate.bat
  • <SYSTEM32>\ycogcg.exe
Substitutes the HOSTS file.
Deletes itself.
Miscellaneous
Creates and executes the following
  • '<SYSTEM32>\ycogcg.exe'
  • '<SYSTEM32>\cmd.exe' /c del <Full path to file> > nul' (with hidden window)
Executes the following
  • '<SYSTEM32>\cmd.exe' /c icacls %WINDIR%\Media /grant Everyone:F /T /C /Q
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-IKE/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-IKEDBG/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-IPBusEnum/Tracing"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-IPSEC-SRV/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-International-RegionalOptionsControlPanel/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-GroupPolicy/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-International/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Iphlpsvc/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Iphlpsvc/Trace"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-Acpi/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-Boot/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-BootDiagnostics/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-Disk/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-HomeGroup-ListenerService"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Iphlpsvc/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-HttpService/Trace"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-HotStart/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-HomeGroup Provider Service/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-HomeGroup Provider Service Performance/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-FileInfoMinifilter/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Firewall-CPL/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Folder Redirection/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Forwarding/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Forwarding/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-EventTracing/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-GettingStarted/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-FailoverClustering-Client/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-HAL/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-HealthCenter/Performance"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-HealthCenterCPL/Performance"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Help/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-HomeGroup Control Panel Performance/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-HomeGroup Control Panel/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Fault-Tolerant-Heap/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-HomeGroup Listener Service/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-HealthCenter/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Feedback-Service-TriggerProvider"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-EventTracing/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-PnP/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-LanguagePackSetup/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-LanguagePackSetup/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MCT/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MPS-CLNT/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MPS-DRV/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MPS-SRV/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-L2NA/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MSPaint/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MSPaint/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MUI/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MUI/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MUI/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MUI/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MediaFoundation-MFReadWrite/SinkWriter"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-LUA-ConsentUI/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-LanguagePackSetup/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-LDAP-Client/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Known Folders API Service"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnostics-Performance/Diagnostic/Loopback"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-Power/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-Power/Thermal-Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-Power/Thermal-Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-Prefetch/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-Process/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-File/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-Network/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-Memory/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-Processor-Power/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-WDI/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-WDI/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-WDI/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-WHEA/Errors"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-WHEA/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-Registry/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-StoreMgr/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Kernel-StoreMgr/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-FMS/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-FMS/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-FMS/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-DPS/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-DPS/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-DPS/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-MSDE/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-PCW/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-PCW/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-Scripted/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-PCW/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-PLA/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-Perfhost/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-Scheduled/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-Scripted/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-Scripted/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Dhcpv6-Client/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DhcpNap/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DiagCpl/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DhcpNap/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Dhcp-Client/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-CredUI/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DCLocator/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DNS-Client/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DUI/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DUSER/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DXP/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-Scripted/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DateTimeControlPanel/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-PLA/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DateTimeControlPanel/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DeviceSync/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DeviceSync/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DeviceUx/Informational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DeviceUx/Performance"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Dhcp-Client/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DateTimeControlPanel/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Crypto-RNG/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Deplorch/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Dhcpv6-Client/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-ScriptedDiagnosticsProvider/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Documents/Performance"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DxgKrnl/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DxgKrnl/Performance"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DxpTaskRingtone/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DxpTaskSyncProvider/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-EFS/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DisplaySwitch/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-ScriptedDiagnosticsProvider/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DriverFrameworks-UserMode/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-EapHost/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-EventCollector/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-EventCollector/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-EventLog-WMIProvider/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-EventLog/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-EventLog/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-EapHost/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-EapHost/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-EaseOfAccess/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MSPaint/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MediaFoundation-MFReadWrite/SourceReader"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DiskDiagnosticResolver/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-WDC/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-WDI/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnostics-Networking/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnostics-Networking/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnostics-PerfTrack-Counters/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnostics-PerfTrack/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DisplayColorCalibration/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DisplayColorCalibration/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnostics-Performance/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DirectShow-KernelSupport/Performance"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DirectSound/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DirectWrite-FontCache/Tracing"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Disk/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DiskDiagnostic/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-DiskDiagnosticDataCollector/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnosis-TaskManager/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Diagnostics-Performance/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MediaFoundation-MFReadWrite/Transform"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MediaFoundation-PlayAPI/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MemoryDiagnostics-Results/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Subsys-SMSS/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Superfetch/Main"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Superfetch/StoreLog"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Sysprep/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-SystemHealthAgent/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TCPIP/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Shell-Core/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TSF-msctf/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TSF-msutb/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TSF-msutb/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TZUtil/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TaskScheduler/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TaskScheduler/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TaskScheduler/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-StorPort/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Subsys-Csr/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-StorDiag/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-StickyNotes/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-StickyNotes/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ShareMedia-ControlPanel/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Shell-AuthUI-BootAnim/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Shell-AuthUI-Common/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Shell-AuthUI-CredUI/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Shell-AuthUI-Logon/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Shell-AuthUI-PasswordProvider/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TaskbarCPL/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TSF-msctf/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Shell-AuthUI-Shutdown/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Shell-Shwebsvc"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Shell-ZipFolder/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Shsvcs/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Sidebar/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Speech-UserExperience/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-StickyNotes/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-SetupUGC/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Shell-DefaultPrograms/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-ClientUSBDevices/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-ClientUSBDevices/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-ClientUSBDevices/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-ServerUSBDevices/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-ServerUSBDevices/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-ServerUSBDevices/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ThemeCPL/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ThemeUI/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TunnelDriver"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-UAC-FileVirtualization/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-UIAnimation/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-SetupQueue/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-UIAutomationCore/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-UIAutomationCore/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-UIAutomationCore/Perf"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-UIRibbon/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-USB-USBHUB/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-USB-USBPORT/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-User Control Panel Performance/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-ServerUSBDevices/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-PnPDevices/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-PnPDevices/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-ClientUSBDevices/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-LocalSessionManager/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-LocalSessionManager/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-LocalSessionManager/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-LocalSessionManager/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-MediaRedirection/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-PnPDevices/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-CorruptedFileRecovery-Server/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-RemoteConnectionManager/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-PnPDevices/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-RDPClient/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-RDPClient/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-RDPClient/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-RdpSoundDriver/Capture"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-RdpSoundDriver/Playback"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-RemoteConnectionManager/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-TerminalServices-RemoteConnectionManager/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-RPC-Proxy/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-SetupCl/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ResourcePublication/Tracing"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-OLEACC/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-OOBE-Machine/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-OfflineFiles/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-OfflineFiles/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-OfflineFiles/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-OfflineFiles/SyncLog"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NWiFi/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-OneX/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PCI/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ParentalControls/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PeerToPeerDrtEventProvider/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PeopleNearMe/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PortableDeviceStatusProvider/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PortableDeviceSyncProvider/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NlaSvc/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-OLEACC/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NlaSvc/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Networking-Correlation/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NetworkProfile/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NCSI/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NCSI/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NDF-HelperClassDiscovery/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NDIS-PacketCapture/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NDIS/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NDIS/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PowerCfg/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-OobeLdr/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NTLM/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NetShell/Performance"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Network-and-Sharing-Center/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NetworkAccessProtection/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NetworkAccessProtection/WHC"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NetworkLocationWizard/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-NetworkProfile/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-MobilityCenter/Performance"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Narrator/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PowerCpl/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PowerEfficiencyDiagnostics/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PowerShell/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-RemoteAssistance/Tracing"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-RemoteDesktopServices-RdpCoreTS/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-RemoteDesktopServices-RdpCoreTS/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Remotefs-UTProvider/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Resource-Exhaustion-Detector/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Resource-Exhaustion-Resolver/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Resource-Leak-Diagnostic/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-RestartManager/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Setup/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Security-Audit-Configuration-Client/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Security-Audit-Configuration-Client/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Security-IdentityListener/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Security-SPP/Perf"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Sens/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ServiceReportingApi/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Services-Svchost/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-RemoteAssistance/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-User Profile Service/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-RemoteAssistance/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-QoS-qWAVE/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PowerShell/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PrimaryNetworkIcon/Performance"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PrintService/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PrintService/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-PrintService/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Program-Compatibility-Assistant/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-QoS-Pacer/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Services/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ReliabilityAnalysisComponent/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-RPC/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-RPC/EEInfo"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ReadyBoost/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ReadyBoost/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ReadyBoostDriver/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ReadyBoostDriver/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Recovery/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-RemoteApp and Desktop Connections/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-UAC/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-CorruptedFileRecovery-Client/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-COMRuntime/Tracing"
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\Microsof.NET\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3003
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\Microsof.NET\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Speech\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Speech\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Logs\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Speech\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Help\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Help\*.exe /T /D users
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3333
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Windows\\Fonts\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3334
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3335
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Sougou\*.exe" /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Help\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\Microsof.NET\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Sougou\*.exe" /T /D users
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Sougou\*.exe" /T /D administrators
  • '<SYSTEM32>\cacls.exe' "%ProgramFiles%\Windows NT\*.exe" /T /D users
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3000
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Tasks\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\*.exe /T /D users
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='conhosts.exe' And ExecutablePath='C:\\Windows\\Fonts\\conhosts.exe'" Call Terminate
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Logs\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\Microsoft\Windows\Optimization\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Logs\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' <SYSTEM32>\Com\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' <SYSTEM32>\Com\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' <SYSTEM32>\Com\*.exe /T /D users
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3002
  • '<SYSTEM32>\cacls.exe' "%ProgramFiles%\Windows NT\*.exe" /T /D administrators
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Tasks\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' "%ProgramFiles%\Windows NT\*.exe" /T /D SYSTEM
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3001
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Tasks\*.exe /T /D SYSTEM
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Windows\\system\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='Service.exe' And ExecutablePath='C:\\Windows\\Fones\\Service.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=9100
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='javas.exe' And ExecutablePath='C:\\Windows\\Fonts\\javas.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=9500
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='lsasa.exe' And ExecutablePath='C:\\Windows\\lsasa.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=9999
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Program Files\\SQLWriter$\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='timeout.exe' And ExecutablePath='C:\\Windows\\SysWOW64\\timeout.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=8443
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=8080
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='Update64.exe' And ExecutablePath='C:\\Windows\\dell\\Update64.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='Systmss.exe' And ExecutablePath='C:\\Windows\\dell\\Systmss.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=14444
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='wtio.exe' And ExecutablePath='C:\\ProgramData\\TMP\\wtio.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=14433
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=9050
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='javaw.exe' And ExecutablePath='C:\\Windows\\Fonts\\javaw.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='LMS.exe' And ExecutablePath='C:\\Windows\\Fonts\\LMS.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=8888
  • '<SYSTEM32>\cacls.exe' %WINDIR%\zecc\*.exe /T /D users
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=5555
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='work.exe' And ExecutablePath='C:\\Windows\\d11cache\\work.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=6666
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='netcore.exe' And ExecutablePath='C:\\Windows\\netcore.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='ntuhost.exe' And ExecutablePath='C:\\Windows\\ntuhost.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=3336
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=4444
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='Mineos.exe' And ExecutablePath='C:\\Windows\\Fonts\\Mineos.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=7777
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='secscan.exe' And ExecutablePath='C:\\Windows\\Prefetch\\secscan.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=8050
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svch0st.exe' And ExecutablePath='C:\\ProgramData\\Microsoft\\svch0st.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=8100
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='Tasksmgrs.exe' And ExecutablePath='C:\\ProgramData\\Microsoft\\Tasksmgrs.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='msinfo.exe' And ExecutablePath='c:\\windows\\system\\msinfo.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=8005
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='WINSec.exe' And ExecutablePath='C:\\Windows\\security\\WINSec.exe'" Call Terminate
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\Microsoft\Windows\Optimization\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\Microsoft\Windows\Optimization\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\tmp\*.exe /T /D users
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # localhost name resolution is handled within DNS itself. "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # 127.0.0.1 localhost "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # ::1 localhost "
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=allow protocol=TCP remoteport=443
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo 127.0.0.1 validation.sls.microsoft.com "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo Y"
  • '<SYSTEM32>\cacls.exe' %WINDIR%\system\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Fonts\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Fonts\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' %WINDIR%\d11cache\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %WINDIR%\d11cache\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %WINDIR%\d11cache\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' %WINDIR%\system\*.exe /T /D administrators
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # For example: "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # lines or following the machine name denoted by a '#' symbol. "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # 38.25.63.10 x.acme.com # x client host "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # Additionally, comments (such as these) may be inserted on individual "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # space. "
  • '<SYSTEM32>\icacls.exe' %WINDIR%\Media /grant Everyone:F /T /C /Q
  • '<SYSTEM32>\cmd.exe' /c %WINDIR%\AppPatch\WindowsUpdate.bat
  • '<SYSTEM32>\net1.exe' stop UI0Detect
  • '<SYSTEM32>\sc.exe' config UI0Detect start= DISABLED
  • '<SYSTEM32>\cmd.exe' /c cacls %WINDIR%\Media\*.exe /T /E /G Everyone:F
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Media\*.exe /T /E /G Everyone:F
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=in action=allow protocol=TCP localport=37799
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=allow protocol=TCP remoteport=80
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Fonts\*.exe /T /D SYSTEM
  • '<SYSTEM32>\findstr.exe' /i "crypto-pool"
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # This is a sample HOSTS file used by Microsoft TCP/IP for Windows. "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # This file contains the mappings of IP addresses to host names. Each "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # entry should be kept on an individual line. The IP address should "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # be placed in the first column followed by the corresponding host name. "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # The IP address and the host name should be separated by at least one "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # Copyright (c) 1993-2009 Microsoft Corp. "
  • '<SYSTEM32>\cmd.exe' /c cmd /c %WINDIR%\AppPatch\WindowsUpdate.bat
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # "
  • '<SYSTEM32>\cmd.exe' /S /D /c" echo # 102.54.94.97 rhino.acme.com # source server "
  • '<SYSTEM32>\cacls.exe' %WINDIR%\system\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' %WINDIR%\debug\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %WINDIR%\debug\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' %WINDIR%\programs\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %WINDIR%\programs\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %WINDIR%\programs\*.exe /T /D users
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=in action=block protocol=UDP localport=445
  • '<SYSTEM32>\cacls.exe' "%ProgramFiles%\test\*.exe" /T /D users
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Fones\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %WINDIR%\debug\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' "%CommonProgramFiles(x86)%\Services\*.exe" /T /D administrators
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\Microsoft.NET\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\Microsoft.NET\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\tmp\*.exe /T /D administrators
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=2999
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\tmp\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' "%CommonProgramFiles(x86)%\Services\*.exe" /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' "%CommonProgramFiles(x86)%\Services\*.exe" /T /D users
  • '<SYSTEM32>\cacls.exe' %ALLUSERSPROFILE%\Microsoft.NET\*.exe /T /D administrators
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Windows\\dell\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='m9xmb.exe' And ExecutablePath='C:\\ProgramData\\m9xmb.exe'" Call Terminate
  • '<SYSTEM32>\cacls.exe' "%ProgramFiles%\test\*.exe" /T /D administrators
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Fones\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Meda\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Meda\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="sqlserver" dir=in action=allow protocol=TCP localport=1433
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Meda\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' %WINDIR%\zecc\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' "%ProgramFiles%\test\*.exe" /T /D SYSTEM
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=in action=block protocol=TCP localport=445
  • '<SYSTEM32>\cacls.exe' %WINDIR%\zecc\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Vss\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Vss\*.exe /T /D users
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=in action=allow protocol=TCP localport=3389
  • '<SYSTEM32>\cacls.exe' %WINDIR%\systxm\*.exe /T /D administrators
  • '<SYSTEM32>\cacls.exe' %WINDIR%\systxm\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %WINDIR%\systxm\*.exe /T /D users
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Fones\*.exe /T /D SYSTEM
  • '<SYSTEM32>\cacls.exe' %WINDIR%\Vss\*.exe /T /D administrators
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='wmiprvser.exe' And ExecutablePath='C:\\Program Files\\Common Files\\System\\wmiprvser.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall firewall add rule name="Microsoft Corporation" dir=out action=block protocol=TCP remoteport=45560
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='alg.exe' And ExecutablePath='C:\\Program Files\\Common Files\\System\\alg.exe'" Call Terminate
  • '<SYSTEM32>\wevtutil.exe' CL "MediaFoundationPlatform"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-IE/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-IEFRAME/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-PerfTrack-IEFRAME/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-PerfTrack-MSHTML/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ADSI/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "DebugChannel"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-API-Tracing/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ATAPort/SATA-LPM"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ActionQueue/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-AltTab/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-AppID/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-AppLocker/EXE and DLL"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-AppLocker/MSI and Script"
  • '<SYSTEM32>\wevtutil.exe' CL "MediaFoundationPerformance"
  • '<SYSTEM32>\wevtutil.exe' CL "MediaFoundationPipeline"
  • '<SYSTEM32>\wevtutil.exe' CL "MediaFoundationDeviceProxy"
  • '<SYSTEM32>\wevtutil.exe' CL "Media Center"
  • '<SYSTEM32>\wevtutil.exe' CL "MF_MediaFoundationDeviceProxy"
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svch0st.exe' And ExecutablePath='C:\\Windows\\Help\\svch0st.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='sqlservr.exe' And ExecutablePath='C:\\Windows\\Fonts\\Win\\sqlservr.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='winlogin.exe' And ExecutablePath='C:\\Windows\\System\\winlogin.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c WEVTUTIL EL
  • '<SYSTEM32>\wevtutil.exe' EL
  • '<SYSTEM32>\wevtutil.exe' CL "Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Application Server-Applications/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ATAPort/General"
  • '<SYSTEM32>\wevtutil.exe' CL "Application"
  • '<SYSTEM32>\wevtutil.exe' CL "DirectShowPluginControl"
  • '<SYSTEM32>\wevtutil.exe' CL "EndpointMapper"
  • '<SYSTEM32>\wevtutil.exe' CL "ForwardedEvents"
  • '<SYSTEM32>\wevtutil.exe' CL "HardwareEvents"
  • '<SYSTEM32>\wevtutil.exe' CL "Internet Explorer"
  • '<SYSTEM32>\wevtutil.exe' CL "Key Management Service"
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Users\\Administrator\\AppData\\Local\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\wevtutil.exe' CL "DirectShowFilterGraph"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Application Server-Applications/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Application Server-Applications/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Application Server-Applications/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-BranchCacheClientEventProvider/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-BranchCacheEventProvider/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-BranchCacheSMB/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-BranchCacheSMB/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-CAPI2/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-CDROM/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-COM/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Calculator/Debug"
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='spoolsv.exe' And ExecutablePath='C:\\Users\\Administrator\\AppData\\Roaming\\spoolsv.exe'" Call Terminate
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Calculator/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-CertPoleEng/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-CertificateServicesClient-CredentialRoaming/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ClearTypeTextTuner/Diagnostic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-CmiSetup/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-CodeIntegrity/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-CodeIntegrity/Verbose"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-BranchCache/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Audio/Performance"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Bluetooth-MTPEnum/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Audio/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Application-Experience/Problem-Steps-Recorder"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Application-Experience/Program-Compatibility-Assistant"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Application-Experience/Program-Compatibility-Troubleshooter"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Application-Experience/Program-Inventory"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Application-Experience/Program-Inventory/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Application-Experience/Program-Telemetry"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Audio/CaptureMonitor"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ComDlg32/Debug"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Bits-Client/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Audit/Analytic"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Authentication User Interface/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-AxInstallService/Log"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Backup"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Biometrics/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-BitLocker-DrivePreparationTool/Admin"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-BitLocker-DrivePreparationTool/Operational"
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-Bits-Client/Operational"
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='creesho.exe' And ExecutablePath='c:\\Users\\Public\\creesho.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='WUDFHost.exe' And ExecutablePath='C:\\Windows\\Tasks\\WUDFHost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='winlog.exe' And ExecutablePath='C:\\ProgramData\\Microsof.NET\\winlog.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='NsCpuCNMiner64.exe' And ExecutablePath='C:\\Program Files\\test\\NsCpuCNMiner64.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='start.exe' And ExecutablePath='C:\\Program Files\\test\\start.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='wuauser.exe' And ExecutablePath='C:\\Windows\\Prefetch\\wuauser.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='lsass.exe' And ExecutablePath='C:\\Windows\\security\\lsass.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='csrss.exe' And ExecutablePath='C:\\Windows\\security\\csrss.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='winlogon.exe' And ExecutablePath='C:\\Windows\\systxm\\winlogon.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='cftmon.exe' And ExecutablePath='C:\\Windows\\AppPatch\\cftmon.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Windows\\systxm\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='systemNT.exe' And ExecutablePath='C:\\Program Files\\system\\systemNT.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='mscorsvw.exe' And ExecutablePath='C:\\Windows\\debug\\wk\\mscorsvw.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='NsCpuCNMiner64.exe' And ExecutablePath='C:\\Windows\\debug\\wk\\NsCpuCNMiner64.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='NsCpuCNMiner32.exe' And ExecutablePath='C:\\Windows\\debug\\wk\\NsCpuCNMiner32.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='WUDFHost.exe' And ExecutablePath='C:\\Windows\\debug\\wk\\WUDFHost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='ini.exe' And ExecutablePath='C:\\Windows\\programs\\ini.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='mstdc.exe' And ExecutablePath='C:\\Windows\\Vss\\mstdc.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='lsass.exe' And ExecutablePath='C:\\Windows\\Vss\\lsass.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='tomcats.exe' And ExecutablePath='C:\\Windows\\Fonts\\tomcats.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='lsm.exe' And ExecutablePath='C:\\Windows\\zecc\\lsm.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='winlogon.exe' And ExecutablePath='C:\\Windows\\zecc\\winlogon.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='winhost.exe' And ExecutablePath='C:\\Windows\\winhost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='winlogon.exe' And ExecutablePath='C:\\Windows\\system\\winlogon.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh advfirewall set allprofiles state on
  • '<SYSTEM32>\netsh.exe' advfirewall set allprofiles state on
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='Isass.exe' And ExecutablePath='C:\\Windows\\debug\\Isass.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='dwnclear.exe' And ExecutablePath='c:\\windows\\dwnclear.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='crss.exe' And ExecutablePath='C:\\Program Files (x86)\\Common Files\\Services\\crss.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Program Files\\fofbws\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='expleror.exe' And ExecutablePath='C:\\Windows\\AppPatch\\expleror.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Windows\\Meda\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Windows\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='Cerreas.exe' And ExecutablePath='c:\\windows\\Cerreas.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='Cerreas.exe' And ExecutablePath='C:\\Windows\\Temp\\Cerreas.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c del <Full path to file> > nul
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='Creesew.exe' And ExecutablePath='C:\\Windows\\Temp\\Creesew.exe'" Call Terminate
  • '<SYSTEM32>\cmd.exe' /c netsh firewall set opmode mode=enable
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='winlogon.exe' And ExecutablePath='C:\\Windows\\Meda\\winlogon.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='ipjltest.exe' And ExecutablePath='C:\\Program Files (x86)\\Common Files\\Services\\ipjltest.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='java.exe' And ExecutablePath='C:\\ProgramData\\Microsoft.NET\\java.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='csrss.exe' And ExecutablePath='C:\\ProgramData\\Microsoft.NET\\csrss.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='lsass.exe' And ExecutablePath='C:\\Users\\Public\\lsass.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='nssm.exe' And ExecutablePath='C:\\Windows\\Logs\\Logsfiles64\\nssm.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Windows\\Logs\\Logsfiles64\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='taskhostw.exe' And ExecutablePath='C:\\Windows\\System32\\Com\\taskhostw.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Program Files\\Windows NT\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='minerd.exe' And ExecutablePath='C:\\Windows\\Sougou\\minerd.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='winlogon.exe' And ExecutablePath='C:\\ProgramData\\Microsof.NET\\winlogon.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='secury.exe' And ExecutablePath='C:\\ProgramData\\Microsof.NET\\secury.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='mscorsvw.exe' And ExecutablePath='C:\\Windows\\Tasks\\mscorsvw.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='kingsoft.exe' And ExecutablePath='C:\\ProgramData\\Microsof.NET\\kingsoft.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='xgyz.exe' And ExecutablePath='C:\\ProgramData\\TMP\\xgyz.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='shovsts.exe' And ExecutablePath='C:\\ProgramData\\shovsts.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='audiodg.exe' And ExecutablePath='C:\\ProgramData\\audiodg.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='java-nt.exe' And ExecutablePath='C:\\ProgramData\\java-nt.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='csrss.exe' And ExecutablePath='C:\\Windows\\Speech\\csrss.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='smss.exe' And ExecutablePath='C:\\Windows\\Speech\\smss.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='micc.com' And ExecutablePath='C:\\Users\\Public\\micc.com'" Call Terminate
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-ComDlg32/Analytic"
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='expl0rer.exe' And ExecutablePath='C:\\ProgramData\\expl0rer.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='SearchFilterHosts.exe' And ExecutablePath='C:\\Windows\\System\\Vmtools\\SearchFilterHosts.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='Searchlndexers.exe' And ExecutablePath='C:\\Users\\Public\\Documents\\Searchlndexers.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='winlnlt.exe' And ExecutablePath='C:\\Users\Public\\Vmtool\\winlnlt.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='csrsss.exe' And ExecutablePath='C:\\Users\\Public\\Documents\\csrsss.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='lsasss.exe' And ExecutablePath='C:\\Users\\Public\\Documents\\lsasss.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='Taskmgrs.exe' And ExecutablePath='C:\\Users\Public\\Libraries\\Taskmgrs.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='Searchlndexers.exe' And ExecutablePath='C:\\ProgramData\\Microsoft\\Searchlndexers.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='winlnlt.exe' And ExecutablePath='C:\\ProgramData\\Vmtools\\winlnlt.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Windows\\Speech\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svchost.exe' And ExecutablePath='C:\\Windows\\Tasks\\svchost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='taskmgr.exe' And ExecutablePath='C:\\ProgramData\\taskmgr.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='taskhost.exe' And ExecutablePath='C:\\Windows\\debug\\taskhost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='svhost.exe' And ExecutablePath='C:\\Windows\\SysWOW64\\svhost.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='csrss.exe' And ExecutablePath='C:\\ProgramData\\Microsoft\\Windows\\Optimization\\csrss.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='services.exe' And ExecutablePath='C:\\ProgramData\\Microsoft\\Windows\\Optimization\\services.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='mscoirsvw.exe' And ExecutablePath='C:\\ProgramData\\Microsoft\\Windows\\Optimization\\mscoirsvw.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='csrss.exe' And ExecutablePath='C:\\Windows\\Tasks\\csrss.exe'" Call Terminate
  • '<SYSTEM32>\wbem\wmic.exe' Process Where "Name='services.exe' And ExecutablePath='C:\\ProgramData\\services.exe'" Call Terminate
  • '<SYSTEM32>\wevtutil.exe' CL "Microsoft-Windows-User Profile Service/Operational"

Рекомендации по лечению

  1. В случае если операционная система способна загрузиться (в штатном режиме или режиме защиты от сбоев), скачайте лечащую утилиту Dr.Web CureIt! и выполните с ее помощью полную проверку вашего компьютера, а также используемых вами переносных носителей информации.
  2. Если загрузка операционной системы невозможна, измените настройки BIOS вашего компьютера, чтобы обеспечить возможность загрузки ПК с компакт-диска или USB-накопителя. Скачайте образ аварийного диска восстановления системы Dr.Web® LiveDisk или утилиту записи Dr.Web® LiveDisk на USB-накопитель, подготовьте соответствующий носитель. Загрузив компьютер с использованием данного носителя, выполните его полную проверку и лечение обнаруженных угроз.
Скачать Dr.Web

По серийному номеру

Выполните полную проверку системы с использованием Антивируса Dr.Web Light для macOS. Данный продукт можно загрузить с официального сайта Apple App Store.

На загруженной ОС выполните полную проверку всех дисковых разделов с использованием продукта Антивирус Dr.Web для Linux.

Скачать Dr.Web

По серийному номеру

  1. Если мобильное устройство функционирует в штатном режиме, загрузите и установите на него бесплатный антивирусный продукт Dr.Web для Android Light. Выполните полную проверку системы и используйте рекомендации по нейтрализации обнаруженных угроз.
  2. Если мобильное устройство заблокировано троянцем-вымогателем семейства Android.Locker (на экране отображается обвинение в нарушении закона, требование выплаты определенной денежной суммы или иное сообщение, мешающее нормальной работе с устройством), выполните следующие действия:
    • загрузите свой смартфон или планшет в безопасном режиме (в зависимости от версии операционной системы и особенностей конкретного мобильного устройства эта процедура может быть выполнена различными способами; обратитесь за уточнением к инструкции, поставляемой вместе с приобретенным аппаратом, или напрямую к его производителю);
    • после активации безопасного режима установите на зараженное устройство бесплатный антивирусный продукт Dr.Web для Android Light и произведите полную проверку системы, выполнив рекомендации по нейтрализации обнаруженных угроз;
    • выключите устройство и включите его в обычном режиме.

Подробнее о Dr.Web для Android

Демо бесплатно на 14 дней

Выдаётся при установке