Analysis
-
max time kernel
56s -
max time network
119s -
platform
windows10-1703_x64 -
resource
win10-20220722-en -
resource tags
arch:x64arch:x86image:win10-20220722-enlocale:en-usos:windows10-1703-x64system -
submitted
06-08-2022 07:02
Static task
static1
Behavioral task
behavioral1
Sample
31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe
Resource
win10-20220722-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe
-
Size
772KB
-
MD5
dfb7617f9cbbbd63c9bc435e074db316
-
SHA1
aae62c0980f242cf5ac013942f2491672287dbde
-
SHA256
31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9
-
SHA512
7adc4f275ef6b99e3ebd1e0ff27cfc9a58c4e804a3d109ced82f52f192fee6e9ec9d7d2c67c353bd9f53423eeb66bf2c50a6ebc4def500b811dae6d14f671245
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1608273745-3137450291-1597631108-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe" 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1608273745-3137450291-1597631108-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1608273745-3137450291-1597631108-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1608273745-3137450291-1597631108-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1608273745-3137450291-1597631108-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1608273745-3137450291-1597631108-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1608273745-3137450291-1597631108-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1608273745-3137450291-1597631108-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1608273745-3137450291-1597631108-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2256 2352 WerFault.exe 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4524 schtasks.exe 4336 schtasks.exe 4332 schtasks.exe 4324 schtasks.exe 4344 schtasks.exe 4296 schtasks.exe 4884 schtasks.exe 4300 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exepid process 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exedescription pid process Token: SeDebugPrivilege 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2352 wrote to memory of 4864 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 4864 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 4864 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 5100 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 5100 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 5100 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 1436 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 1436 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 1436 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3680 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3680 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3680 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3664 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3664 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3664 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3192 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3192 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3192 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3492 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3492 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3492 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 2836 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 2836 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 2836 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 2248 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 2248 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 2248 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3832 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3832 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3832 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3796 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3796 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 3796 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 4420 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 4420 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 2352 wrote to memory of 4420 2352 31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe cmd.exe PID 3192 wrote to memory of 4332 3192 cmd.exe schtasks.exe PID 3796 wrote to memory of 4344 3796 cmd.exe schtasks.exe PID 3192 wrote to memory of 4332 3192 cmd.exe schtasks.exe PID 3796 wrote to memory of 4344 3796 cmd.exe schtasks.exe PID 3192 wrote to memory of 4332 3192 cmd.exe schtasks.exe PID 3796 wrote to memory of 4344 3796 cmd.exe schtasks.exe PID 1436 wrote to memory of 4324 1436 cmd.exe schtasks.exe PID 1436 wrote to memory of 4324 1436 cmd.exe schtasks.exe PID 1436 wrote to memory of 4324 1436 cmd.exe schtasks.exe PID 3832 wrote to memory of 4524 3832 cmd.exe schtasks.exe PID 3832 wrote to memory of 4524 3832 cmd.exe schtasks.exe PID 3832 wrote to memory of 4524 3832 cmd.exe schtasks.exe PID 4420 wrote to memory of 4336 4420 cmd.exe schtasks.exe PID 4420 wrote to memory of 4336 4420 cmd.exe schtasks.exe PID 4420 wrote to memory of 4336 4420 cmd.exe schtasks.exe PID 3664 wrote to memory of 4300 3664 cmd.exe schtasks.exe PID 3664 wrote to memory of 4300 3664 cmd.exe schtasks.exe PID 3664 wrote to memory of 4300 3664 cmd.exe schtasks.exe PID 2836 wrote to memory of 4296 2836 cmd.exe schtasks.exe PID 2836 wrote to memory of 4296 2836 cmd.exe schtasks.exe PID 2836 wrote to memory of 4296 2836 cmd.exe schtasks.exe PID 3492 wrote to memory of 4884 3492 cmd.exe schtasks.exe PID 3492 wrote to memory of 4884 3492 cmd.exe schtasks.exe PID 3492 wrote to memory of 4884 3492 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"2⤵PID:4864
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"3⤵
- Creates scheduled task(s)
PID:4324
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"2⤵PID:3680
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"3⤵
- Creates scheduled task(s)
PID:4332
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"3⤵
- Creates scheduled task(s)
PID:4300
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"2⤵PID:5100
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9400" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9400" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"3⤵
- Creates scheduled task(s)
PID:4336
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5535" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5535" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"3⤵
- Creates scheduled task(s)
PID:4344
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7994" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7994" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"3⤵
- Creates scheduled task(s)
PID:4524
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7005" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"2⤵PID:2248
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"3⤵
- Creates scheduled task(s)
PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"3⤵
- Creates scheduled task(s)
PID:4884
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 13202⤵
- Program crash
PID:2256
-