Analysis
-
max time kernel
143s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe
-
Size
887KB
-
MD5
09d42c04f53f324c01af280ef5430e3d
-
SHA1
33902204a206d9c64ad6f0b6131e11fc58d2ed8b
-
SHA256
7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b
-
SHA512
91a15efe1315c687b088b665134c8b855e1767d0be1f117db6ba8a8c62d78290aa36bb66ac3acc55499a76772cf8c5fd0894cc0aafc332dcf89dabdb5fe0ec28
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe" 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2272 4352 WerFault.exe 82 -
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1040 schtasks.exe 3448 schtasks.exe 1888 schtasks.exe 2256 schtasks.exe 4820 schtasks.exe 3500 schtasks.exe 4928 schtasks.exe 672 schtasks.exe 3520 schtasks.exe 3444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4352 wrote to memory of 1392 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 108 PID 4352 wrote to memory of 1392 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 108 PID 4352 wrote to memory of 1392 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 108 PID 4352 wrote to memory of 176 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 84 PID 4352 wrote to memory of 176 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 84 PID 4352 wrote to memory of 176 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 84 PID 4352 wrote to memory of 216 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 107 PID 4352 wrote to memory of 216 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 107 PID 4352 wrote to memory of 216 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 107 PID 4352 wrote to memory of 3100 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 106 PID 4352 wrote to memory of 3100 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 106 PID 4352 wrote to memory of 3100 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 106 PID 4352 wrote to memory of 2704 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 87 PID 4352 wrote to memory of 2704 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 87 PID 4352 wrote to memory of 2704 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 87 PID 4352 wrote to memory of 4724 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 104 PID 4352 wrote to memory of 4724 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 104 PID 4352 wrote to memory of 4724 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 104 PID 4352 wrote to memory of 3612 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 89 PID 4352 wrote to memory of 3612 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 89 PID 4352 wrote to memory of 3612 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 89 PID 4352 wrote to memory of 3808 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 90 PID 4352 wrote to memory of 3808 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 90 PID 4352 wrote to memory of 3808 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 90 PID 4352 wrote to memory of 3676 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 93 PID 4352 wrote to memory of 3676 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 93 PID 4352 wrote to memory of 3676 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 93 PID 4352 wrote to memory of 4176 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 94 PID 4352 wrote to memory of 4176 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 94 PID 4352 wrote to memory of 4176 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 94 PID 4352 wrote to memory of 4696 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 95 PID 4352 wrote to memory of 4696 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 95 PID 4352 wrote to memory of 4696 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 95 PID 4352 wrote to memory of 2316 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 97 PID 4352 wrote to memory of 2316 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 97 PID 4352 wrote to memory of 2316 4352 7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe 97 PID 1392 wrote to memory of 672 1392 cmd.exe 100 PID 1392 wrote to memory of 672 1392 cmd.exe 100 PID 1392 wrote to memory of 672 1392 cmd.exe 100 PID 216 wrote to memory of 3448 216 cmd.exe 109 PID 216 wrote to memory of 3448 216 cmd.exe 109 PID 216 wrote to memory of 3448 216 cmd.exe 109 PID 176 wrote to memory of 3520 176 cmd.exe 110 PID 176 wrote to memory of 3520 176 cmd.exe 110 PID 176 wrote to memory of 3520 176 cmd.exe 110 PID 2704 wrote to memory of 3444 2704 cmd.exe 111 PID 2704 wrote to memory of 3444 2704 cmd.exe 111 PID 2704 wrote to memory of 3444 2704 cmd.exe 111 PID 3612 wrote to memory of 4820 3612 cmd.exe 112 PID 3612 wrote to memory of 4820 3612 cmd.exe 112 PID 3612 wrote to memory of 4820 3612 cmd.exe 112 PID 4176 wrote to memory of 1040 4176 cmd.exe 115 PID 4176 wrote to memory of 1040 4176 cmd.exe 115 PID 4176 wrote to memory of 1040 4176 cmd.exe 115 PID 3100 wrote to memory of 4928 3100 cmd.exe 117 PID 3100 wrote to memory of 4928 3100 cmd.exe 117 PID 3100 wrote to memory of 4928 3100 cmd.exe 117 PID 3676 wrote to memory of 2256 3676 cmd.exe 114 PID 3676 wrote to memory of 2256 3676 cmd.exe 114 PID 3676 wrote to memory of 2256 3676 cmd.exe 114 PID 3808 wrote to memory of 1888 3808 cmd.exe 113 PID 3808 wrote to memory of 1888 3808 cmd.exe 113 PID 3808 wrote to memory of 1888 3808 cmd.exe 113 PID 2316 wrote to memory of 3500 2316 cmd.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:176 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"3⤵
- Creates scheduled task(s)
PID:3520
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"3⤵
- Creates scheduled task(s)
PID:3444
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"3⤵
- Creates scheduled task(s)
PID:4820
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"3⤵
- Creates scheduled task(s)
PID:1888
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3619" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3619" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"3⤵
- Creates scheduled task(s)
PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk317" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk317" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"3⤵
- Creates scheduled task(s)
PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9948" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"2⤵PID:4696
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6576" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6576" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"3⤵
- Creates scheduled task(s)
PID:3500
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"2⤵PID:4724
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"3⤵
- Creates scheduled task(s)
PID:4928
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"3⤵
- Creates scheduled task(s)
PID:3448
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 10202⤵
- Program crash
PID:2272
-
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\7279e3b3e9698e7cca51ee9d3576b6820b406f2af0476eccc1676f18e897c93b.exe"1⤵
- Creates scheduled task(s)
PID:672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4352 -ip 43521⤵PID:4668