Analysis
-
max time kernel
51s -
max time network
115s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
07-09-2022 16:53
Static task
static1
Behavioral task
behavioral1
Sample
1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe
Resource
win10-20220901-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe
-
Size
879KB
-
MD5
d86a4cb87b8a9cc757b77c5ade04ed1a
-
SHA1
a5f7d88b236ade2c3416b44d0e26456c4b14937c
-
SHA256
1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e
-
SHA512
5adc026d609a6f1f5d3b6561d086881d22cdf3d24ad97deb62e0c0bdb3156276e547bb2b5a528708510a4ddf2b1641d80bdbddc2eb935c2433f5ed907a441dd7
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe" 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1456 2656 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4728 schtasks.exe 5000 schtasks.exe 4280 schtasks.exe 4928 schtasks.exe 4724 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2656 wrote to memory of 4616 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 66 PID 2656 wrote to memory of 4616 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 66 PID 2656 wrote to memory of 4616 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 66 PID 2656 wrote to memory of 4640 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 67 PID 2656 wrote to memory of 4640 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 67 PID 2656 wrote to memory of 4640 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 67 PID 2656 wrote to memory of 4664 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 68 PID 2656 wrote to memory of 4664 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 68 PID 2656 wrote to memory of 4664 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 68 PID 2656 wrote to memory of 1192 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 69 PID 2656 wrote to memory of 1192 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 69 PID 2656 wrote to memory of 1192 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 69 PID 2656 wrote to memory of 2336 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 70 PID 2656 wrote to memory of 2336 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 70 PID 2656 wrote to memory of 2336 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 70 PID 2656 wrote to memory of 2608 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 72 PID 2656 wrote to memory of 2608 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 72 PID 2656 wrote to memory of 2608 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 72 PID 2656 wrote to memory of 3812 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 71 PID 2656 wrote to memory of 3812 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 71 PID 2656 wrote to memory of 3812 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 71 PID 2656 wrote to memory of 4052 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 91 PID 2656 wrote to memory of 4052 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 91 PID 2656 wrote to memory of 4052 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 91 PID 2656 wrote to memory of 4344 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 80 PID 2656 wrote to memory of 4344 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 80 PID 2656 wrote to memory of 4344 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 80 PID 2656 wrote to memory of 68 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 75 PID 2656 wrote to memory of 68 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 75 PID 2656 wrote to memory of 68 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 75 PID 2656 wrote to memory of 4620 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 78 PID 2656 wrote to memory of 4620 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 78 PID 2656 wrote to memory of 4620 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 78 PID 2656 wrote to memory of 808 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 76 PID 2656 wrote to memory of 808 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 76 PID 2656 wrote to memory of 808 2656 1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe 76 PID 2336 wrote to memory of 5000 2336 cmd.exe 87 PID 2336 wrote to memory of 5000 2336 cmd.exe 87 PID 2336 wrote to memory of 5000 2336 cmd.exe 87 PID 4616 wrote to memory of 4928 4616 cmd.exe 89 PID 4616 wrote to memory of 4928 4616 cmd.exe 89 PID 4616 wrote to memory of 4928 4616 cmd.exe 89 PID 1192 wrote to memory of 4280 1192 cmd.exe 88 PID 1192 wrote to memory of 4280 1192 cmd.exe 88 PID 1192 wrote to memory of 4280 1192 cmd.exe 88 PID 2608 wrote to memory of 4724 2608 cmd.exe 93 PID 2608 wrote to memory of 4724 2608 cmd.exe 93 PID 2608 wrote to memory of 4724 2608 cmd.exe 93 PID 4344 wrote to memory of 4728 4344 cmd.exe 94 PID 4344 wrote to memory of 4728 4344 cmd.exe 94 PID 4344 wrote to memory of 4728 4344 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"3⤵
- Creates scheduled task(s)
PID:4928
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"2⤵PID:4640
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"2⤵PID:4664
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"3⤵
- Creates scheduled task(s)
PID:4280
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"3⤵
- Creates scheduled task(s)
PID:5000
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"2⤵PID:3812
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"3⤵
- Creates scheduled task(s)
PID:4724
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7614" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"2⤵PID:68
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3053" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"2⤵PID:808
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk17" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"2⤵PID:4620
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6763" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6763" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"3⤵
- Creates scheduled task(s)
PID:4728
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\1e25be8f156b6fef8dc720dd0e9fd78921d14985184a387341d03eb44b0da65e.exe"2⤵PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 13162⤵
- Program crash
PID:1456
-