Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-04-2021 08:27
Static task
static1
Behavioral task
behavioral1
Sample
75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe
Resource
win10v20210408
General
-
Target
75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe
-
Size
439KB
-
MD5
d4bbe83cc2d148175032e57a362d2f38
-
SHA1
b6984512d630c45c759e84074c6a0670bc7824cb
-
SHA256
75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66
-
SHA512
d836629aba2cd58d65dcee5026f04501c207b6dbed00e1afbf687d08271f052381b0a6063e559fa6d1bc7dcbc1e8e6eadc14b7face091a1953f103c9c957b30d
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 508 Smadav.exe 3000 Smadav.exe -
Loads dropped DLL 2 IoCs
pid Process 508 Smadav.exe 3000 Smadav.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run Smadav.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\SmadavIUe = "\"C:\\ProgramData\\Smadav\\SmadavIUe\\Smadav.exe\" 326" Smadav.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Smadav.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SmadavIUe = "\"C:\\ProgramData\\Smadav\\SmadavIUe\\Smadav.exe\" 326" Smadav.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: Smadav.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2068 schtasks.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\ms-pu\CLSID = 36004300340044004300420046004500320032004500300039003700460041000000 Smadav.exe Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu Smadav.exe Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu\PROXY Smadav.exe Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu Smadav.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-pu Smadav.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe 3000 Smadav.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3000 Smadav.exe Token: SeTcbPrivilege 3000 Smadav.exe Token: SeDebugPrivilege 3000 Smadav.exe Token: SeDebugPrivilege 3000 Smadav.exe Token: SeDebugPrivilege 3000 Smadav.exe Token: SeDebugPrivilege 3000 Smadav.exe Token: SeDebugPrivilege 3000 Smadav.exe Token: SeDebugPrivilege 3000 Smadav.exe Token: SeDebugPrivilege 3000 Smadav.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 424 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe 424 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 424 wrote to memory of 508 424 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe 75 PID 424 wrote to memory of 508 424 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe 75 PID 424 wrote to memory of 508 424 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe 75 PID 508 wrote to memory of 3000 508 Smadav.exe 77 PID 508 wrote to memory of 3000 508 Smadav.exe 77 PID 508 wrote to memory of 3000 508 Smadav.exe 77 PID 3000 wrote to memory of 3116 3000 Smadav.exe 79 PID 3000 wrote to memory of 3116 3000 Smadav.exe 79 PID 3000 wrote to memory of 3116 3000 Smadav.exe 79 PID 3000 wrote to memory of 1548 3000 Smadav.exe 81 PID 3000 wrote to memory of 1548 3000 Smadav.exe 81 PID 3000 wrote to memory of 1548 3000 Smadav.exe 81 PID 3000 wrote to memory of 392 3000 Smadav.exe 83 PID 3000 wrote to memory of 392 3000 Smadav.exe 83 PID 3000 wrote to memory of 392 3000 Smadav.exe 83 PID 3000 wrote to memory of 2220 3000 Smadav.exe 86 PID 3000 wrote to memory of 2220 3000 Smadav.exe 86 PID 3000 wrote to memory of 2220 3000 Smadav.exe 86 PID 3000 wrote to memory of 2396 3000 Smadav.exe 88 PID 3000 wrote to memory of 2396 3000 Smadav.exe 88 PID 3000 wrote to memory of 2396 3000 Smadav.exe 88 PID 392 wrote to memory of 2336 392 cmd.exe 90 PID 392 wrote to memory of 2336 392 cmd.exe 90 PID 392 wrote to memory of 2336 392 cmd.exe 90 PID 1548 wrote to memory of 2068 1548 cmd.exe 89 PID 1548 wrote to memory of 2068 1548 cmd.exe 89 PID 1548 wrote to memory of 2068 1548 cmd.exe 89 PID 3000 wrote to memory of 936 3000 Smadav.exe 91 PID 3000 wrote to memory of 936 3000 Smadav.exe 91 PID 3000 wrote to memory of 936 3000 Smadav.exe 91 PID 3000 wrote to memory of 804 3000 Smadav.exe 94 PID 3000 wrote to memory of 804 3000 Smadav.exe 94 PID 3000 wrote to memory of 804 3000 Smadav.exe 94 PID 3000 wrote to memory of 1492 3000 Smadav.exe 95 PID 3000 wrote to memory of 1492 3000 Smadav.exe 95 PID 3000 wrote to memory of 1492 3000 Smadav.exe 95 PID 936 wrote to memory of 1872 936 cmd.exe 98 PID 936 wrote to memory of 1872 936 cmd.exe 98 PID 936 wrote to memory of 1872 936 cmd.exe 98 PID 2220 wrote to memory of 3792 2220 cmd.exe 99 PID 2220 wrote to memory of 3792 2220 cmd.exe 99 PID 2220 wrote to memory of 3792 2220 cmd.exe 99 PID 2396 wrote to memory of 2128 2396 cmd.exe 100 PID 2396 wrote to memory of 2128 2396 cmd.exe 100 PID 2396 wrote to memory of 2128 2396 cmd.exe 100 PID 804 wrote to memory of 2336 804 cmd.exe 101 PID 804 wrote to memory of 2336 804 cmd.exe 101 PID 804 wrote to memory of 2336 804 cmd.exe 101 PID 1492 wrote to memory of 3892 1492 cmd.exe 102 PID 1492 wrote to memory of 3892 1492 cmd.exe 102 PID 1492 wrote to memory of 3892 1492 cmd.exe 102 PID 3000 wrote to memory of 936 3000 Smadav.exe 104 PID 3000 wrote to memory of 936 3000 Smadav.exe 104 PID 3000 wrote to memory of 936 3000 Smadav.exe 104 PID 3000 wrote to memory of 1332 3000 Smadav.exe 106 PID 3000 wrote to memory of 1332 3000 Smadav.exe 106 PID 3000 wrote to memory of 1332 3000 Smadav.exe 106 PID 3000 wrote to memory of 3276 3000 Smadav.exe 108 PID 3000 wrote to memory of 3276 3000 Smadav.exe 108 PID 3000 wrote to memory of 3276 3000 Smadav.exe 108 PID 3000 wrote to memory of 492 3000 Smadav.exe 110 PID 3000 wrote to memory of 492 3000 Smadav.exe 110 PID 3000 wrote to memory of 492 3000 Smadav.exe 110 PID 3000 wrote to memory of 3556 3000 Smadav.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe"C:\Users\Admin\AppData\Local\Temp\75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Users\Admin\AppData\Local\Temp\Smadav.exe"C:\Users\Admin\AppData\Local\Temp\Smadav.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:508 -
C:\ProgramData\Smadav\SmadavIUe\Smadav.exeC:\ProgramData\Smadav\SmadavIUe\Smadav.exe 3263⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exedel %0 /tn "Autodesk plugin" /f4⤵PID:3116
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /create /sc minute /mo 10 /tn "Autodesk plugin" /tr """"C:\ProgramData\Smadav\SmadavIUe\Smadav.exe""" 513" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /create /sc minute /mo 10 /tn "Autodesk plugin" /tr """"C:\ProgramData\Smadav\SmadavIUe\Smadav.exe""" 513" /f5⤵
- Creates scheduled task(s)
PID:2068
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /run /tn "Autodesk plugin"4⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /run /tn "Autodesk plugin"5⤵PID:2336
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_1" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_1" /f5⤵PID:3792
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_2" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_2" /f5⤵PID:2128
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "ZBT_0.1" /f4⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "ZBT_0.1" /f5⤵PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "LKUFORYOU_1" /f4⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "LKUFORYOU_1" /f5⤵PID:2336
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "AcroRd32" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "AcroRd32" /f5⤵PID:3892
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_1" /f4⤵PID:936
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_1" /f5⤵PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_2" /f4⤵PID:1332
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_2" /f5⤵PID:1484
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "ZBT_0.1" /f4⤵PID:3276
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "ZBT_0.1" /f5⤵PID:3452
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "LKUFORYOU_1" /f4⤵PID:492
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "LKUFORYOU_1" /f5⤵PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "AcroRd32" /f4⤵PID:3556
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "AcroRd32" /f5⤵PID:2204
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_1" /f4⤵PID:4036
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_1" /f5⤵PID:692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_2" /f4⤵PID:3952
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_2" /f5⤵PID:1460
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "ZBT_0.1" /f4⤵PID:2036
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "ZBT_0.1" /f5⤵PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "LKUFORYOU_1" /f4⤵PID:1608
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "LKUFORYOU_1" /f5⤵PID:3276
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "AcroRd32" /f4⤵PID:2020
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "AcroRd32" /f5⤵PID:504
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_1" /f4⤵PID:2252
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_1" /f5⤵PID:636
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_2" /f4⤵PID:2204
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_2" /f5⤵PID:3624
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "ZBT_0.1" /f4⤵PID:1796
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "ZBT_0.1" /f5⤵PID:2136
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "LKUFORYOU_1" /f4⤵PID:1472
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "LKUFORYOU_1" /f5⤵PID:692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "AcroRd32" /f4⤵PID:3720
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "AcroRd32" /f5⤵PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_1" /f4⤵PID:1484
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_1" /f5⤵PID:3772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_2" /f4⤵PID:1464
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_2" /f5⤵PID:772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "ZBT_0.1" /f4⤵PID:2600
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "ZBT_0.1" /f5⤵PID:1272
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "LKUFORYOU_1" /f4⤵PID:424
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "LKUFORYOU_1" /f5⤵PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "AcroRd32" /f4⤵PID:4028
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "AcroRd32" /f5⤵PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_1" /f4⤵PID:2384
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_1" /f5⤵PID:3620
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_2" /f4⤵PID:3248
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_2" /f5⤵PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "ZBT_0.1" /f4⤵PID:2348
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "ZBT_0.1" /f5⤵PID:4000
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "LKUFORYOU_1" /f4⤵PID:1332
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "LKUFORYOU_1" /f5⤵PID:572
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "AcroRd32" /f4⤵PID:692
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "AcroRd32" /f5⤵PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_1" /f4⤵PID:1228
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_1" /f5⤵PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "udisk_2" /f4⤵PID:3968
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "udisk_2" /f5⤵PID:1092
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "ZBT_0.1" /f4⤵PID:2504
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "ZBT_0.1" /f5⤵PID:1180
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "LKUFORYOU_1" /f4⤵PID:3244
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "LKUFORYOU_1" /f5⤵PID:640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "AcroRd32" /f4⤵PID:1608
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /delete /tn "AcroRd32" /f5⤵PID:2248
-
-
-
-