Overview
overview
10Static
static
10e1dcb9ba72...29.exe
windows7-x64
3e1dcb9ba72...29.exe
windows10-2004-x64
3e2071b429e...5c.exe
windows7-x64
10e2071b429e...5c.exe
windows10-2004-x64
10e249dbf0ac...f4.exe
windows7-x64
8e249dbf0ac...f4.exe
windows10-2004-x64
8e277271cc7...e8.exe
windows7-x64
10e277271cc7...e8.exe
windows10-2004-x64
10e282def0d2...89.exe
windows7-x64
10e282def0d2...89.exe
windows10-2004-x64
10e29645b977...39.exe
windows7-x64
7e29645b977...39.exe
windows10-2004-x64
7e2bfb9c5da...0c.exe
windows7-x64
1e2bfb9c5da...0c.exe
windows10-2004-x64
1e316eea789...fa.exe
windows7-x64
1e316eea789...fa.exe
windows10-2004-x64
1e3250ba3e9...f9.exe
windows7-x64
10e3250ba3e9...f9.exe
windows10-2004-x64
10e34a914ca2...b1.exe
windows7-x64
10e34a914ca2...b1.exe
windows10-2004-x64
10e37b2913aa...c6.exe
windows7-x64
10e37b2913aa...c6.exe
windows10-2004-x64
10e37c63b72b...0d.exe
windows7-x64
10e37c63b72b...0d.exe
windows10-2004-x64
10e37cf80804...e0.exe
windows7-x64
10e37cf80804...e0.exe
windows10-2004-x64
10e3a2f6c598...82.exe
windows7-x64
1e3a2f6c598...82.exe
windows10-2004-x64
1e3a86fc42d...62.exe
windows7-x64
9e3a86fc42d...62.exe
windows10-2004-x64
9e3e3053d34...10.exe
windows7-x64
10e3e3053d34...10.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:17
Behavioral task
behavioral1
Sample
e1dcb9ba72b5d530a7025537eed091187313975f51f1a4756d379129a1eaa629.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1dcb9ba72b5d530a7025537eed091187313975f51f1a4756d379129a1eaa629.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
e2071b429ed0a109ba6ae98cc6bd94651c73805963058322d9ab5fc3ad8c385c.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
e2071b429ed0a109ba6ae98cc6bd94651c73805963058322d9ab5fc3ad8c385c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
e249dbf0acda03b41cc7ffb9d3ffe996eb648e79ec5b514d819180faebef48f4.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
e249dbf0acda03b41cc7ffb9d3ffe996eb648e79ec5b514d819180faebef48f4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
e277271cc70bc12cb5a62950728025e8.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
e277271cc70bc12cb5a62950728025e8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
e282def0d26b0a0ace50c80bd0d3e389.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
e282def0d26b0a0ace50c80bd0d3e389.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
e29645b97716a1a1d083e644500c71a7e2a3c20f8c6812785f6242461eccfe39.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
e29645b97716a1a1d083e644500c71a7e2a3c20f8c6812785f6242461eccfe39.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
e2bfb9c5dab6674c2bd9eec1f66e4f0c.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
e2bfb9c5dab6674c2bd9eec1f66e4f0c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
e316eea78900620a3194bc604bab1d058ec60832baa6df78d0795ebee9ecd6fa.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
e316eea78900620a3194bc604bab1d058ec60832baa6df78d0795ebee9ecd6fa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
e3250ba3e962ddf90560e00c92659cf9.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
e3250ba3e962ddf90560e00c92659cf9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
e34a914ca2b4fd7d490bd7fa0893c9b1.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
e34a914ca2b4fd7d490bd7fa0893c9b1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
e37b2913aafb08ae275e16364b9916c6.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
e37b2913aafb08ae275e16364b9916c6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
e37c63b72b4dd8c6a148989a74f33e54278e68275a33bcd9bab0dbac29e5af0d.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
e37c63b72b4dd8c6a148989a74f33e54278e68275a33bcd9bab0dbac29e5af0d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
e3a2f6c598bc05769da36673f1f02c90f737d5293bf16ba0c839e92cf4258382.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
e3a2f6c598bc05769da36673f1f02c90f737d5293bf16ba0c839e92cf4258382.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
e3a86fc42dbea243f01ab5183b1e1f0c1907b4b6d46428df1d055ceb3dc9f662.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
e3a86fc42dbea243f01ab5183b1e1f0c1907b4b6d46428df1d055ceb3dc9f662.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe
Resource
win10v2004-20250314-en
General
-
Target
e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe
-
Size
563KB
-
MD5
2b846d776f1a6fbe1ec811a245da8143
-
SHA1
ecc293b1fc5be7e85f69f423817dbbcb090d76c2
-
SHA256
e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0
-
SHA512
ea5640d2abf98c22415b443ea1debb71bc218c8f02ae1f86444d57e0ca524b04158c6e91f0ea3b80b4fddc1687d77c954e4f6f7f6bf533774a17e1f642beaa56
-
SSDEEP
6144:+mLrULcs2P7uZA3j41e6VlWT8b9EheZw/uzQ7Ozl449NYI0VxWRbX12Vvz:3+N8+1PVle8RZB4OY1Wr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Users\\Admin\\Videos\\xdwdSpybot - Search & Destroy.exe" e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\System32 = "C:\\Users\\Admin\\AppData\\Roaming\\xdwdUnreal Engine.exe" e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\xdwd.dll e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 544 schtasks.exe 2216 schtasks.exe 268 schtasks.exe 1716 schtasks.exe 1228 schtasks.exe 2512 schtasks.exe 1456 schtasks.exe 2288 schtasks.exe 852 schtasks.exe 2536 schtasks.exe 3040 schtasks.exe 2388 schtasks.exe 1732 schtasks.exe 2540 schtasks.exe 1404 schtasks.exe 2788 schtasks.exe 2012 schtasks.exe 1244 schtasks.exe 2992 schtasks.exe 944 schtasks.exe 1344 schtasks.exe 1084 schtasks.exe 2696 schtasks.exe 944 schtasks.exe 1152 schtasks.exe 2588 schtasks.exe 2764 schtasks.exe 1500 schtasks.exe 1056 schtasks.exe 1756 schtasks.exe 2456 schtasks.exe 2700 schtasks.exe 1944 schtasks.exe 1900 schtasks.exe 1540 schtasks.exe 2588 schtasks.exe 2732 schtasks.exe 2864 schtasks.exe 376 schtasks.exe 2120 schtasks.exe 2224 schtasks.exe 916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2540 schtasks.exe 2464 CMD.exe 1732 schtasks.exe 1644 CMD.exe 944 schtasks.exe 3004 CMD.exe 1228 schtasks.exe 2364 CMD.exe 916 schtasks.exe 1588 CMD.exe 1056 schtasks.exe 2972 CMD.exe 1756 schtasks.exe 2020 CMD.exe 2732 schtasks.exe 2648 CMD.exe 2588 schtasks.exe 1508 CMD.exe 2512 schtasks.exe 2332 CMD.exe 1404 schtasks.exe 772 CMD.exe 2864 schtasks.exe 1340 CMD.exe 376 schtasks.exe 2232 CMD.exe 1456 schtasks.exe 2408 CMD.exe 2456 schtasks.exe 2212 CMD.exe 2788 schtasks.exe 2724 CMD.exe 2700 schtasks.exe 3012 CMD.exe 2288 schtasks.exe 1968 CMD.exe 544 schtasks.exe 2860 CMD.exe 852 schtasks.exe 924 CMD.exe 1944 schtasks.exe 2712 CMD.exe 1344 schtasks.exe 2976 CMD.exe 2120 schtasks.exe 1612 CMD.exe 2216 schtasks.exe 2832 CMD.exe 1084 schtasks.exe 2668 CMD.exe 2536 schtasks.exe 592 CMD.exe 2012 schtasks.exe 1624 CMD.exe 1244 schtasks.exe 2392 CMD.exe 268 schtasks.exe 2916 CMD.exe 2224 schtasks.exe 2364 CMD.exe 3040 schtasks.exe 980 CMD.exe 1900 schtasks.exe 2684 CMD.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2668 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 32 PID 1792 wrote to memory of 2668 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 32 PID 1792 wrote to memory of 2668 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 32 PID 2668 wrote to memory of 2388 2668 CMD.exe 34 PID 2668 wrote to memory of 2388 2668 CMD.exe 34 PID 2668 wrote to memory of 2388 2668 CMD.exe 34 PID 1792 wrote to memory of 2752 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 35 PID 1792 wrote to memory of 2752 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 35 PID 1792 wrote to memory of 2752 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 35 PID 2752 wrote to memory of 2588 2752 CMD.exe 37 PID 2752 wrote to memory of 2588 2752 CMD.exe 37 PID 2752 wrote to memory of 2588 2752 CMD.exe 37 PID 1792 wrote to memory of 1060 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 38 PID 1792 wrote to memory of 1060 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 38 PID 1792 wrote to memory of 1060 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 38 PID 1060 wrote to memory of 2540 1060 CMD.exe 40 PID 1060 wrote to memory of 2540 1060 CMD.exe 40 PID 1060 wrote to memory of 2540 1060 CMD.exe 40 PID 1792 wrote to memory of 2464 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 41 PID 1792 wrote to memory of 2464 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 41 PID 1792 wrote to memory of 2464 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 41 PID 2464 wrote to memory of 1732 2464 CMD.exe 43 PID 2464 wrote to memory of 1732 2464 CMD.exe 43 PID 2464 wrote to memory of 1732 2464 CMD.exe 43 PID 1792 wrote to memory of 1644 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 44 PID 1792 wrote to memory of 1644 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 44 PID 1792 wrote to memory of 1644 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 44 PID 1644 wrote to memory of 944 1644 CMD.exe 46 PID 1644 wrote to memory of 944 1644 CMD.exe 46 PID 1644 wrote to memory of 944 1644 CMD.exe 46 PID 1792 wrote to memory of 3004 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 47 PID 1792 wrote to memory of 3004 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 47 PID 1792 wrote to memory of 3004 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 47 PID 3004 wrote to memory of 1228 3004 CMD.exe 49 PID 3004 wrote to memory of 1228 3004 CMD.exe 49 PID 3004 wrote to memory of 1228 3004 CMD.exe 49 PID 1792 wrote to memory of 2364 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 50 PID 1792 wrote to memory of 2364 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 50 PID 1792 wrote to memory of 2364 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 50 PID 2364 wrote to memory of 916 2364 CMD.exe 52 PID 2364 wrote to memory of 916 2364 CMD.exe 52 PID 2364 wrote to memory of 916 2364 CMD.exe 52 PID 1792 wrote to memory of 1588 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 53 PID 1792 wrote to memory of 1588 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 53 PID 1792 wrote to memory of 1588 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 53 PID 1588 wrote to memory of 1056 1588 CMD.exe 55 PID 1588 wrote to memory of 1056 1588 CMD.exe 55 PID 1588 wrote to memory of 1056 1588 CMD.exe 55 PID 1792 wrote to memory of 2972 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 56 PID 1792 wrote to memory of 2972 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 56 PID 1792 wrote to memory of 2972 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 56 PID 2972 wrote to memory of 1756 2972 CMD.exe 58 PID 2972 wrote to memory of 1756 2972 CMD.exe 58 PID 2972 wrote to memory of 1756 2972 CMD.exe 58 PID 1792 wrote to memory of 2020 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 59 PID 1792 wrote to memory of 2020 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 59 PID 1792 wrote to memory of 2020 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 59 PID 2020 wrote to memory of 2732 2020 CMD.exe 61 PID 2020 wrote to memory of 2732 2020 CMD.exe 61 PID 2020 wrote to memory of 2732 2020 CMD.exe 61 PID 1792 wrote to memory of 2648 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 62 PID 1792 wrote to memory of 2648 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 62 PID 1792 wrote to memory of 2648 1792 e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe 62 PID 2648 wrote to memory of 2588 2648 CMD.exe 64 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe"C:\Users\Admin\AppData\Local\Temp\e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\system32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Project" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Project" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2388
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2588
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Dropbox" /tr "C:\Users\Admin\AppData\Roaming\xdwdUnreal Engine.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Dropbox" /tr "C:\Users\Admin\AppData\Roaming\xdwdUnreal Engine.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1228
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1404
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:376
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2456
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2212 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:852
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:592 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:268
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:980 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2764
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:1492
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2696
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:2708
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:2012
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1500
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:752
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:944
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:2632
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1152
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:756
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1716
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST & exit2⤵PID:2112
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Greenshot" /tr "C:\Users\Admin\Videos\xdwdSpybot - Search & Destroy.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1540
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6