Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12/09/2022, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe
-
Size
891KB
-
MD5
89f1d08119e5c110c0c2583d658a472a
-
SHA1
7985eb6c1edc62fb12f080f70902bb213386e528
-
SHA256
100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7
-
SHA512
9991a6628ba7516ac113b2cf4c5f488534f3e0b5f11b2c0fec3ccae88f3cfb2df893f01479de0fbecf9e16f0ba78bf2950d3141b7f30a20c565ef7833ebd7128
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe" 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 280 1112 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3200 schtasks.exe 3264 schtasks.exe 3180 schtasks.exe 2312 schtasks.exe 2236 schtasks.exe 4840 schtasks.exe 4440 schtasks.exe 4444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1112 wrote to memory of 4648 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 66 PID 1112 wrote to memory of 4648 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 66 PID 1112 wrote to memory of 4648 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 66 PID 1112 wrote to memory of 4808 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 67 PID 1112 wrote to memory of 4808 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 67 PID 1112 wrote to memory of 4808 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 67 PID 1112 wrote to memory of 4764 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 68 PID 1112 wrote to memory of 4764 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 68 PID 1112 wrote to memory of 4764 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 68 PID 1112 wrote to memory of 4836 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 69 PID 1112 wrote to memory of 4836 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 69 PID 1112 wrote to memory of 4836 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 69 PID 1112 wrote to memory of 2356 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 70 PID 1112 wrote to memory of 2356 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 70 PID 1112 wrote to memory of 2356 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 70 PID 1112 wrote to memory of 4208 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 89 PID 1112 wrote to memory of 4208 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 89 PID 1112 wrote to memory of 4208 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 89 PID 1112 wrote to memory of 3588 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 71 PID 1112 wrote to memory of 3588 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 71 PID 1112 wrote to memory of 3588 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 71 PID 1112 wrote to memory of 2012 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 86 PID 1112 wrote to memory of 2012 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 86 PID 1112 wrote to memory of 2012 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 86 PID 1112 wrote to memory of 2224 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 84 PID 1112 wrote to memory of 2224 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 84 PID 1112 wrote to memory of 2224 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 84 PID 1112 wrote to memory of 4068 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 73 PID 1112 wrote to memory of 4068 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 73 PID 1112 wrote to memory of 4068 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 73 PID 1112 wrote to memory of 3752 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 75 PID 1112 wrote to memory of 3752 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 75 PID 1112 wrote to memory of 3752 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 75 PID 1112 wrote to memory of 4296 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 79 PID 1112 wrote to memory of 4296 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 79 PID 1112 wrote to memory of 4296 1112 100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe 79 PID 4764 wrote to memory of 4840 4764 cmd.exe 96 PID 4764 wrote to memory of 4840 4764 cmd.exe 96 PID 4764 wrote to memory of 4840 4764 cmd.exe 96 PID 4808 wrote to memory of 2236 4808 cmd.exe 95 PID 4808 wrote to memory of 2236 4808 cmd.exe 95 PID 4808 wrote to memory of 2236 4808 cmd.exe 95 PID 3752 wrote to memory of 2312 3752 cmd.exe 94 PID 3752 wrote to memory of 2312 3752 cmd.exe 94 PID 3752 wrote to memory of 2312 3752 cmd.exe 94 PID 2224 wrote to memory of 3180 2224 cmd.exe 93 PID 2224 wrote to memory of 3180 2224 cmd.exe 93 PID 2224 wrote to memory of 3180 2224 cmd.exe 93 PID 4296 wrote to memory of 3264 4296 cmd.exe 92 PID 4296 wrote to memory of 3264 4296 cmd.exe 92 PID 4296 wrote to memory of 3264 4296 cmd.exe 92 PID 2012 wrote to memory of 4444 2012 cmd.exe 90 PID 2012 wrote to memory of 4444 2012 cmd.exe 90 PID 2012 wrote to memory of 4444 2012 cmd.exe 90 PID 4208 wrote to memory of 3200 4208 cmd.exe 91 PID 4208 wrote to memory of 3200 4208 cmd.exe 91 PID 4208 wrote to memory of 3200 4208 cmd.exe 91 PID 3588 wrote to memory of 4440 3588 cmd.exe 97 PID 3588 wrote to memory of 4440 3588 cmd.exe 97 PID 3588 wrote to memory of 4440 3588 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"2⤵PID:4648
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"3⤵
- Creates scheduled task(s)
PID:2236
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"3⤵
- Creates scheduled task(s)
PID:4840
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"2⤵PID:4836
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"2⤵PID:2356
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"3⤵
- Creates scheduled task(s)
PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9068" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"2⤵PID:4068
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2154" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2154" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"3⤵
- Creates scheduled task(s)
PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6847" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6847" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"3⤵
- Creates scheduled task(s)
PID:3264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7700" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7700" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"3⤵
- Creates scheduled task(s)
PID:3180
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"3⤵
- Creates scheduled task(s)
PID:4444
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"3⤵
- Creates scheduled task(s)
PID:3200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 13642⤵
- Program crash
PID:280
-