Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
106b5428dd82...c1.exe
windows7-x64
106b5428dd82...c1.exe
windows10-2004-x64
106b6755ca1b...7b.exe
windows7-x64
106b6755ca1b...7b.exe
windows10-2004-x64
106b96951c0d...e8.exe
windows7-x64
106b96951c0d...e8.exe
windows10-2004-x64
106b990bdc11...15.exe
windows7-x64
36b990bdc11...15.exe
windows10-2004-x64
36bcf962809...67.exe
windows7-x64
106bcf962809...67.exe
windows10-2004-x64
106bf4d95191...d6.exe
windows7-x64
106bf4d95191...d6.exe
windows10-2004-x64
106c17f80a5a...33.exe
windows7-x64
106c17f80a5a...33.exe
windows10-2004-x64
76c25a9ad3a...ff.exe
windows7-x64
106c25a9ad3a...ff.exe
windows10-2004-x64
106c46d70788...18.exe
windows7-x64
106c46d70788...18.exe
windows10-2004-x64
106c5038f87e...dc.exe
windows7-x64
106c5038f87e...dc.exe
windows10-2004-x64
106c53fda3cb...65.exe
windows7-x64
106c53fda3cb...65.exe
windows10-2004-x64
106c79c2f450...b4.exe
windows7-x64
106c79c2f450...b4.exe
windows10-2004-x64
106ca3cb8c05...9a.exe
windows7-x64
106ca3cb8c05...9a.exe
windows10-2004-x64
106cb59f599a...bf.exe
windows7-x64
106cb59f599a...bf.exe
windows10-2004-x64
106ccb172e66...df.exe
windows7-x64
106ccb172e66...df.exe
windows10-2004-x64
106cdf89e8d2...1d.exe
windows7-x64
106cdf89e8d2...1d.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:12
Behavioral task
behavioral1
Sample
6b5428dd828c35d7783578dcbf39f9c1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6b5428dd828c35d7783578dcbf39f9c1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
6b6755ca1bb4486fb7501572a580e96343181ff957605ea150f7d94beabef27b.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
6b6755ca1bb4486fb7501572a580e96343181ff957605ea150f7d94beabef27b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
6b96951c0d2a6e97c54c030298a7eee8.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
6b96951c0d2a6e97c54c030298a7eee8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
6b990bdc11976a009c1a3ccda05849bebff003ab1a3c6096c0603249d7374c15.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
6b990bdc11976a009c1a3ccda05849bebff003ab1a3c6096c0603249d7374c15.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
6bf4d95191becc3a5f28dc233d702cd6.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
6bf4d95191becc3a5f28dc233d702cd6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
6c17f80a5a74741689d6145a1e7dca2a7ba13e52fab6e37e2c3240bb47ac7133.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
6c17f80a5a74741689d6145a1e7dca2a7ba13e52fab6e37e2c3240bb47ac7133.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
6c25a9ad3a7149deae7bb50429c9fefe20b60a59914bd7b63174796b640adfff.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
6c25a9ad3a7149deae7bb50429c9fefe20b60a59914bd7b63174796b640adfff.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
6c46d70788b60ff0ba7ea4c5f0549f18.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
6c46d70788b60ff0ba7ea4c5f0549f18.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
6c5038f87e96a5799d1221ec35527d35fb454d450bff95dc0bf5b0b813183edc.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
6c5038f87e96a5799d1221ec35527d35fb454d450bff95dc0bf5b0b813183edc.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
6c53fda3cb5c0cb93d53eff2fa6433a8679aedcdccf5b8487f4294e897bd2365.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
6c53fda3cb5c0cb93d53eff2fa6433a8679aedcdccf5b8487f4294e897bd2365.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
6c79c2f450da5e97631c33ddce170bb4.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
6c79c2f450da5e97631c33ddce170bb4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
6ca3cb8c056b4e81c7a8a885e150b7efb068a36f38a023cb6e07f5640a62ad9a.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
6ca3cb8c056b4e81c7a8a885e150b7efb068a36f38a023cb6e07f5640a62ad9a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
6cb59f599a4d87e0a3e34f264f3d87e410ab436afadcd02e1fe516ac8e4534bf.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
6cb59f599a4d87e0a3e34f264f3d87e410ab436afadcd02e1fe516ac8e4534bf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
6ccb172e6696a44a0b3a581df57d89df.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
6ccb172e6696a44a0b3a581df57d89df.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
6cdf89e8d2c2fb9a5db53881f501181d.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
6cdf89e8d2c2fb9a5db53881f501181d.exe
Resource
win10v2004-20250314-en
General
-
Target
6c46d70788b60ff0ba7ea4c5f0549f18.exe
-
Size
1.9MB
-
MD5
6c46d70788b60ff0ba7ea4c5f0549f18
-
SHA1
10cd8b050891004ca06c2be54d55e38a243be162
-
SHA256
f4b884338e802040f828153f0a161ab18205ee0a90b8f778831900c7ae97c465
-
SHA512
c156dfae670696f766ef3672e3513f7c0f66460674cb78c4419b876f36128e593fc9a8be6923d752116f855d3334df65bbc8f26010aee9d8c8d6e4db430ee81a
-
SSDEEP
24576:kz4T3bMX0/0ZqSEaa3OVFu8VQTo8Ia29MSVyAXmFPf87ptY60/YYhdbh7JRj:kOMX0/08SVYTcxMXPxthD
Malware Config
Signatures
-
Process spawned unexpected child process 57 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2840 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2568 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1176 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3040 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1268 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2340 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1728 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 576 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 404 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1040 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1124 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1192 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2564 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 272 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1768 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1544 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2580 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2924 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2484 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2472 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2004 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1648 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1212 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1856 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 2812 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 2812 schtasks.exe 30 -
UAC bypass 3 TTPs 24 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c46d70788b60ff0ba7ea4c5f0549f18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6c46d70788b60ff0ba7ea4c5f0549f18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6c46d70788b60ff0ba7ea4c5f0549f18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 20 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1624 powershell.exe 892 powershell.exe 1156 powershell.exe 1616 powershell.exe 1888 powershell.exe 2204 powershell.exe 2172 powershell.exe 836 powershell.exe 708 powershell.exe 2520 powershell.exe 2320 powershell.exe 2480 powershell.exe 956 powershell.exe 2552 powershell.exe 1608 powershell.exe 2008 powershell.exe 1640 powershell.exe 2088 powershell.exe 2284 powershell.exe 2924 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 6c46d70788b60ff0ba7ea4c5f0549f18.exe -
Executes dropped EXE 7 IoCs
pid Process 1348 smss.exe 2300 smss.exe 2004 smss.exe 2124 smss.exe 1972 smss.exe 1976 smss.exe 1040 smss.exe -
Checks whether UAC is enabled 1 TTPs 16 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA smss.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA smss.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA smss.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c46d70788b60ff0ba7ea4c5f0549f18.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA smss.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6c46d70788b60ff0ba7ea4c5f0549f18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA smss.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\System.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\csrss.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\6ccacd8608530f 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\RCX230E.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\69ddcba757bf72 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\smss.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Program Files (x86)\Windows Defender\de-DE\6203df4a6bafc7 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Program Files (x86)\Google\Update\System.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Program Files (x86)\Google\Update\27d1bcfc3c54e0 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\System.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Google\Update\RCX39CC.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Google\Update\RCX39CD.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\RCX4599.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\RCX4607.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Program Files (x86)\Windows Defender\de-DE\lsass.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\RCX29C7.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\RCX29C8.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\RCX3C3E.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\RCX3C3F.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\csrss.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\lsass.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\886983d96e3d3e 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\RCX22FD.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Google\Update\System.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\smss.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Idle.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\27d1bcfc3c54e0 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Idle.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\RCX4327.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\RCX4395.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\b75386f1303e64 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Windows\TAPI\42af1c969fbb7b 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\RCX3052.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\taskhost.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Windows\TAPI\RCX40B5.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Windows\TAPI\RCX40B6.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\taskhost.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File created C:\Windows\TAPI\audiodg.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\RCX3053.tmp 6c46d70788b60ff0ba7ea4c5f0549f18.exe File opened for modification C:\Windows\TAPI\audiodg.exe 6c46d70788b60ff0ba7ea4c5f0549f18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 57 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2984 schtasks.exe 272 schtasks.exe 1768 schtasks.exe 1544 schtasks.exe 2924 schtasks.exe 2840 schtasks.exe 2776 schtasks.exe 1192 schtasks.exe 1992 schtasks.exe 2168 schtasks.exe 1480 schtasks.exe 1856 schtasks.exe 1328 schtasks.exe 1908 schtasks.exe 2116 schtasks.exe 2004 schtasks.exe 1712 schtasks.exe 1628 schtasks.exe 2184 schtasks.exe 1728 schtasks.exe 1040 schtasks.exe 1176 schtasks.exe 1888 schtasks.exe 2472 schtasks.exe 1804 schtasks.exe 2424 schtasks.exe 2564 schtasks.exe 2340 schtasks.exe 2920 schtasks.exe 1212 schtasks.exe 2492 schtasks.exe 2736 schtasks.exe 1996 schtasks.exe 2484 schtasks.exe 2044 schtasks.exe 2648 schtasks.exe 2688 schtasks.exe 3040 schtasks.exe 2512 schtasks.exe 1780 schtasks.exe 2188 schtasks.exe 2640 schtasks.exe 1064 schtasks.exe 1624 schtasks.exe 2568 schtasks.exe 404 schtasks.exe 2608 schtasks.exe 1268 schtasks.exe 2124 schtasks.exe 2580 schtasks.exe 1124 schtasks.exe 1788 schtasks.exe 2276 schtasks.exe 2108 schtasks.exe 1648 schtasks.exe 2020 schtasks.exe 576 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 2480 powershell.exe 2284 powershell.exe 836 powershell.exe 2088 powershell.exe 956 powershell.exe 1624 powershell.exe 2204 powershell.exe 2520 powershell.exe 892 powershell.exe 708 powershell.exe 1608 powershell.exe 2320 powershell.exe 1156 powershell.exe 2008 powershell.exe 2552 powershell.exe 2924 powershell.exe 1640 powershell.exe 2172 powershell.exe 1616 powershell.exe 1888 powershell.exe 1348 smss.exe 2300 smss.exe 2004 smss.exe 2124 smss.exe 1972 smss.exe 1976 smss.exe 1040 smss.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe Token: SeDebugPrivilege 2480 powershell.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 836 powershell.exe Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 2204 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeDebugPrivilege 708 powershell.exe Token: SeDebugPrivilege 1608 powershell.exe Token: SeDebugPrivilege 2320 powershell.exe Token: SeDebugPrivilege 1348 smss.exe Token: SeDebugPrivilege 1156 powershell.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 2552 powershell.exe Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 2172 powershell.exe Token: SeDebugPrivilege 1616 powershell.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeDebugPrivilege 2300 smss.exe Token: SeDebugPrivilege 2004 smss.exe Token: SeDebugPrivilege 2124 smss.exe Token: SeDebugPrivilege 1972 smss.exe Token: SeDebugPrivilege 1976 smss.exe Token: SeDebugPrivilege 1040 smss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1616 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 88 PID 2516 wrote to memory of 1616 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 88 PID 2516 wrote to memory of 1616 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 88 PID 2516 wrote to memory of 1888 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 89 PID 2516 wrote to memory of 1888 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 89 PID 2516 wrote to memory of 1888 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 89 PID 2516 wrote to memory of 1608 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 91 PID 2516 wrote to memory of 1608 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 91 PID 2516 wrote to memory of 1608 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 91 PID 2516 wrote to memory of 1156 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 92 PID 2516 wrote to memory of 1156 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 92 PID 2516 wrote to memory of 1156 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 92 PID 2516 wrote to memory of 1640 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 93 PID 2516 wrote to memory of 1640 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 93 PID 2516 wrote to memory of 1640 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 93 PID 2516 wrote to memory of 2008 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 94 PID 2516 wrote to memory of 2008 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 94 PID 2516 wrote to memory of 2008 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 94 PID 2516 wrote to memory of 708 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 95 PID 2516 wrote to memory of 708 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 95 PID 2516 wrote to memory of 708 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 95 PID 2516 wrote to memory of 2552 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 97 PID 2516 wrote to memory of 2552 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 97 PID 2516 wrote to memory of 2552 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 97 PID 2516 wrote to memory of 2088 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 98 PID 2516 wrote to memory of 2088 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 98 PID 2516 wrote to memory of 2088 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 98 PID 2516 wrote to memory of 956 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 100 PID 2516 wrote to memory of 956 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 100 PID 2516 wrote to memory of 956 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 100 PID 2516 wrote to memory of 2172 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 102 PID 2516 wrote to memory of 2172 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 102 PID 2516 wrote to memory of 2172 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 102 PID 2516 wrote to memory of 2480 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 104 PID 2516 wrote to memory of 2480 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 104 PID 2516 wrote to memory of 2480 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 104 PID 2516 wrote to memory of 2204 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 106 PID 2516 wrote to memory of 2204 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 106 PID 2516 wrote to memory of 2204 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 106 PID 2516 wrote to memory of 2320 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 108 PID 2516 wrote to memory of 2320 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 108 PID 2516 wrote to memory of 2320 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 108 PID 2516 wrote to memory of 892 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 110 PID 2516 wrote to memory of 892 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 110 PID 2516 wrote to memory of 892 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 110 PID 2516 wrote to memory of 1624 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 111 PID 2516 wrote to memory of 1624 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 111 PID 2516 wrote to memory of 1624 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 111 PID 2516 wrote to memory of 836 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 112 PID 2516 wrote to memory of 836 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 112 PID 2516 wrote to memory of 836 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 112 PID 2516 wrote to memory of 2520 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 113 PID 2516 wrote to memory of 2520 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 113 PID 2516 wrote to memory of 2520 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 113 PID 2516 wrote to memory of 2924 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 114 PID 2516 wrote to memory of 2924 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 114 PID 2516 wrote to memory of 2924 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 114 PID 2516 wrote to memory of 2284 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 115 PID 2516 wrote to memory of 2284 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 115 PID 2516 wrote to memory of 2284 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 115 PID 2516 wrote to memory of 1348 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 128 PID 2516 wrote to memory of 1348 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 128 PID 2516 wrote to memory of 1348 2516 6c46d70788b60ff0ba7ea4c5f0549f18.exe 128 PID 1348 wrote to memory of 1804 1348 smss.exe 129 -
System policy modification 1 TTPs 24 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c46d70788b60ff0ba7ea4c5f0549f18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6c46d70788b60ff0ba7ea4c5f0549f18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6c46d70788b60ff0ba7ea4c5f0549f18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c46d70788b60ff0ba7ea4c5f0549f18.exe"C:\Users\Admin\AppData\Local\Temp\6c46d70788b60ff0ba7ea4c5f0549f18.exe"1⤵
- UAC bypass
- Drops file in Drivers directory
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\6c46d70788b60ff0ba7ea4c5f0549f18.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\de-DE\lsass.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Downloads\6c46d70788b60ff0ba7ea4c5f0549f18.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\sppsvc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\taskhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Templates\taskhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\smss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\6c46d70788b60ff0ba7ea4c5f0549f18.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\Update\System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\csrss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Microsoft Help\explorer.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\TAPI\audiodg.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\smss.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Idle.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\wininit.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\spoolsv.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exe"C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1348 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\46d3707f-fea6-48d6-aad3-8a88a43cd07b.vbs"3⤵PID:1804
-
C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exeC:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exe4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2300 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\caf5f846-e0e7-411e-a2d1-66ec7bb6f636.vbs"5⤵PID:1700
-
C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exeC:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exe6⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2004 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0a137258-266b-48bf-a4d6-748efd8571fe.vbs"7⤵PID:1652
-
C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exeC:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exe8⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2124 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0480d5b5-c1de-4beb-915c-ef55f810b20b.vbs"9⤵PID:708
-
C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exeC:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exe10⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1972 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ddf61631-966a-4192-aceb-acbb8644ece1.vbs"11⤵PID:2276
-
C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exeC:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exe12⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1976 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a67178aa-d3bf-44c7-a561-38730446e18c.vbs"13⤵PID:3044
-
C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exeC:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exe14⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1040 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\38b56b22-93c2-497a-9afa-b77a9ceeafdd.vbs"15⤵PID:1396
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2622bafe-3667-4e28-9c29-7d5e844fcb13.vbs"15⤵PID:2452
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\394f2a3a-644a-43ad-8110-1a56f014e454.vbs"13⤵PID:2752
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\41152945-23ba-4972-b0e1-b9bf5b5b18d6.vbs"11⤵PID:916
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\86e85fb9-d823-439c-91ac-430690a2fcd2.vbs"9⤵PID:1900
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c16d035b-b61b-4f44-876c-3ef5fe1c7604.vbs"7⤵PID:1268
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\032c7cb2-f8db-445b-b2eb-90142ab65730.vbs"5⤵PID:2840
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99b4b1a1-9944-4fe2-89bf-a1f926af257d.vbs"3⤵PID:2364
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Defender\de-DE\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\de-DE\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Defender\de-DE\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6c46d70788b60ff0ba7ea4c5f0549f186" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Downloads\6c46d70788b60ff0ba7ea4c5f0549f18.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6c46d70788b60ff0ba7ea4c5f0549f18" /sc ONLOGON /tr "'C:\Users\Default\Downloads\6c46d70788b60ff0ba7ea4c5f0549f18.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6c46d70788b60ff0ba7ea4c5f0549f186" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Downloads\6c46d70788b60ff0ba7ea4c5f0549f18.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\Default\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Users\Default\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Windows\Installer\{90140000-002A-0000-1000-0000000FF1CE}\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Templates\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\All Users\Templates\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Templates\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Default User\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6c46d70788b60ff0ba7ea4c5f0549f186" /sc MINUTE /mo 10 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\6c46d70788b60ff0ba7ea4c5f0549f18.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6c46d70788b60ff0ba7ea4c5f0549f18" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\6c46d70788b60ff0ba7ea4c5f0549f18.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "6c46d70788b60ff0ba7ea4c5f0549f186" /sc MINUTE /mo 7 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\6c46d70788b60ff0ba7ea4c5f0549f18.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Google\Update\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\Update\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Microsoft Help\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft Help\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Microsoft Help\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\Windows\TAPI\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\TAPI\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Windows\TAPI\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2492
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD57e56baf6588f73cbc2d2fd2fd02c27d8
SHA12881efd42565f459c316064f67f029f476c615f2
SHA25614acedc286434a7ec0f978e043e231e4351e4c90a230f68ef87676cacce64aea
SHA5124ba4c211c021ec67fed69c752c5753a92b2fc797a83cca20edb6c6b490296ec38664d0625e8bab651731f2ec19ae850356e9e6a369a42d0ed635f4d4fd19e977
-
Filesize
1.9MB
MD5e1d2374101b80907cc489ec09c36f534
SHA12ae436c3b099e014848cc147f8c48c6c291ac657
SHA2569450f39af5cc107049e5bbfc115d7f3932f7b8948b01b0f286e3a907dc4bb2d7
SHA5128bed44c238f572ef66d864b871756d5ea33bb3d05c4ce47dfc5a05bbedecb4fdb647bfff919e651968db7cb9a87126b53b689784953eb536ceac0d1a40b135a2
-
Filesize
1.9MB
MD566734f2ee56af5cb930e611f38724550
SHA1ddb35e01efb7caf9d2b49762992f55205168c05a
SHA256168b2ebda2fb108391c5e21c3edbd40d62fbe29c46429d0937ed022acfac0e94
SHA51297810eef955c36f80e6e5087e7196caa3d5e896b6db69125d6b821ee1d958d8f9f6af04a2a376ca95635b136e2778e64393ce8b722ab1c72df0038082d3db13a
-
Filesize
1.9MB
MD59557a58c1288c2a96074e8d5fee8e0ab
SHA193ffe00043647e10e6e15408597759460d4c7450
SHA25646c795171ed593b029f40b5a550e06e0b0ec03c3496bdb488f4c235a8dd3c7f3
SHA512a1626c6a60a3e4efe7ab1b1855d8cf977443ae5863bd0fd3ee9db6f356c3bc7c92be4aab7b7cd00aab57e694a4c55b06f579d2e057c7f2c6c20b6e27fc2b6f66
-
Filesize
1.9MB
MD56c46d70788b60ff0ba7ea4c5f0549f18
SHA110cd8b050891004ca06c2be54d55e38a243be162
SHA256f4b884338e802040f828153f0a161ab18205ee0a90b8f778831900c7ae97c465
SHA512c156dfae670696f766ef3672e3513f7c0f66460674cb78c4419b876f36128e593fc9a8be6923d752116f855d3334df65bbc8f26010aee9d8c8d6e4db430ee81a
-
Filesize
1.9MB
MD5d12f68e1b7b60e09c815dd13a86ca566
SHA100d5b615d8d6ac809ebaec7ff36ed3839dca5a2c
SHA256283654b178dc3f66370f812ce5ccf97500ca94649113d88afa262f406f46bd55
SHA512ea71972127bd1ae3e3fc4c49c87a707416f8efa1675b7b4ea963de3ec5c4694ce15498ee103d5abec7cb64a7598a23315c31fd4998625572352c8d811877d423
-
Filesize
733B
MD58e16dad83eb87afe0f2b6c930a48c40c
SHA18295589a1bef6c908109f743c82aba7ccc93c36c
SHA256042a237160c7fe3470dd40f2d7303d3d3e1c333f4d71de248d6f271af1cb5373
SHA512c94be1cf47d773fb06b45ee70b138f6ba48cb8cfc9e7c51b1f0c4966afe6653472534902523a6694869b39ab39411818badb1d8af6d43164ffdfead92e210618
-
Filesize
733B
MD50fca0b0fe706accd9a73efa71e74c4fe
SHA18dd9080e7c63fe0fb3532b5d5d114a6ebb111ee9
SHA256e6b305d04d09b3ba38c511552bb4e33ee4689824a6e8defac97ed79e74367e9c
SHA5121d1a42259fd54885bfab9adef92e5f9d9b122d6eec946e323096eeda3de259e2c60017a4a4d8667c9cf7785f31fa5df78ab4b8bdf3317ded395e09a23e0e2a30
-
Filesize
733B
MD505b66a7a74d2fa61adfa8369bee3fda1
SHA1ba41cae1f770f1b2dc52293041f5733b0d5022e8
SHA256cdba8d44064b3fcc96d5312bb7cbd79337c0687a4838b89a211dcbeb30687350
SHA51221811ae9cbeb34715fe3a73524a9aa0d03d26125b83ea8b796295eac4c4615b93bdc30728b1567ba8d6c35ba4ed8599400d1d298ffb02ccc1cc0417f36619275
-
Filesize
733B
MD5d7f1cc598b88d484067d2286eacc8312
SHA12ff2a63267086c473a5152d41316875fcf095b04
SHA2566fbe7f3b4da9c30f050cd2964663b66aaaba273f20e0af46b0379bf745dc9ba9
SHA5121cccc633a132bf2257718cb22a717e593f0809e6eb9bc89b752f7b25d1fff5f0d10bccb549e041ed7bdb038cec087f88e34a9c9af8ac22e3bb39375aefcdc78a
-
Filesize
509B
MD55d339ddee8940634806ff9f3539e93f3
SHA191331064bbeea0e2b3efd96b5702ffc1ec211254
SHA2560152dd17258132c105e802f6aca7e106d41996ee04c5153b0ae70ddaa7b87e08
SHA51204732f62b6f3d192087a1c7c52f3c7d30fcd5507245c1ba4d741b5bef9afd37190803809a6623722279f79daa106ded0ec855fa91d782b680a4da914a812562a
-
Filesize
733B
MD59d68a7eade5121c2ad8472ff5784015c
SHA19ff2e1d00656bf0c3c4f0777d1c89b3a43d844a1
SHA256d9b1f9ea241d41c0a1da52b6750605b14e3961440f58c830f36dbb081cc92414
SHA5128cc68b8292b0fc4dec1285f38c080ebbf9d172f600a7aca8bc12bb9f1c553a60454800052d990453a61efb7e16f9ad4fae85691fd48480cc88268f493076e816
-
Filesize
733B
MD57f3eb00b45aa2eb309f445af97af557f
SHA115eba9058aaaf82c284210382b1ae37e98567167
SHA2569cbf16a8eb768d906757472379978291509d0d7f41943a40799bba378a12c7a0
SHA512c09922331281008ec1fd20105b728f1e17ccb128195f485da725aad35c37220451d91a9726d445739b3175a53eb4d7e7a86307f54ecfac7096eff6b0913278af
-
Filesize
733B
MD508861757cbbf854657c8dbeb1b83f39f
SHA13f643b4bf03efefc29f48468b002d34e542df853
SHA25615167e51dc45f66a6d3a55f2860dd3ad5a2b4a25dd3322b0d18596c3642d23a0
SHA512a8bdc923137917b3abdd8dcfc600041f6352b8e08208dd0c4925e98edf91d060848908e8ca77b6cf92565223bdf25e1e6f9d0c4cb3431dc6c09b92e0ea91437b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\X9M5M2MF78QB808AS6C2.temp
Filesize7KB
MD58e8bead467deb9b4fd11ae48c89596d9
SHA1573af28b07a69bb194882ad01ab69c79f9592941
SHA256ff12cdc0057c00d512417e9dd0a08cbde6882f44bb7e10a5d8f306e4edbf25b2
SHA512277e64d90811de6d0e7a8f690b55043e23dccd78eab5a320ac258814f434fdaa95bcad3d3d57c6ebdc7482911243612a0b5bbf503f7ad33dc51335a1d560a97d