Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2022 15:36
Static task
static1
Behavioral task
behavioral1
Sample
85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe
-
Size
891KB
-
MD5
79a028ecda35a64391ae83b5d12a6bb2
-
SHA1
346f8cc214df1864d5ca519d29cb04a98f9e119b
-
SHA256
85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7
-
SHA512
5ef327137ddf7c2fcbf804fd99ffbb61654c57d3ef29ffd604d72da77d75e95f22da482c5667d2f790696a25bcff152f586883f27d7f3f583087210ffdb2fa59
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe" 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3312 3788 WerFault.exe 81 -
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5100 schtasks.exe 1976 schtasks.exe 5088 schtasks.exe 4200 schtasks.exe 1852 schtasks.exe 4516 schtasks.exe 3712 schtasks.exe 3084 schtasks.exe 3336 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3788 wrote to memory of 4972 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 82 PID 3788 wrote to memory of 4972 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 82 PID 3788 wrote to memory of 4972 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 82 PID 3788 wrote to memory of 4008 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 83 PID 3788 wrote to memory of 4008 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 83 PID 3788 wrote to memory of 4008 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 83 PID 3788 wrote to memory of 5036 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 84 PID 3788 wrote to memory of 5036 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 84 PID 3788 wrote to memory of 5036 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 84 PID 3788 wrote to memory of 4712 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 103 PID 3788 wrote to memory of 4712 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 103 PID 3788 wrote to memory of 4712 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 103 PID 3788 wrote to memory of 4660 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 87 PID 3788 wrote to memory of 4660 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 87 PID 3788 wrote to memory of 4660 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 87 PID 3788 wrote to memory of 4820 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 88 PID 3788 wrote to memory of 4820 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 88 PID 3788 wrote to memory of 4820 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 88 PID 3788 wrote to memory of 3284 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 91 PID 3788 wrote to memory of 3284 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 91 PID 3788 wrote to memory of 3284 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 91 PID 3788 wrote to memory of 1892 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 89 PID 3788 wrote to memory of 1892 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 89 PID 3788 wrote to memory of 1892 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 89 PID 3788 wrote to memory of 4428 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 97 PID 3788 wrote to memory of 4428 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 97 PID 3788 wrote to memory of 4428 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 97 PID 3788 wrote to memory of 1708 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 95 PID 3788 wrote to memory of 1708 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 95 PID 3788 wrote to memory of 1708 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 95 PID 3788 wrote to memory of 4444 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 100 PID 3788 wrote to memory of 4444 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 100 PID 3788 wrote to memory of 4444 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 100 PID 3788 wrote to memory of 1484 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 98 PID 3788 wrote to memory of 1484 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 98 PID 3788 wrote to memory of 1484 3788 85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe 98 PID 4008 wrote to memory of 1852 4008 cmd.exe 108 PID 4008 wrote to memory of 1852 4008 cmd.exe 108 PID 4008 wrote to memory of 1852 4008 cmd.exe 108 PID 4712 wrote to memory of 5100 4712 cmd.exe 106 PID 4712 wrote to memory of 5100 4712 cmd.exe 106 PID 4712 wrote to memory of 5100 4712 cmd.exe 106 PID 1484 wrote to memory of 4200 1484 cmd.exe 107 PID 1484 wrote to memory of 4200 1484 cmd.exe 107 PID 1484 wrote to memory of 4200 1484 cmd.exe 107 PID 1892 wrote to memory of 5088 1892 cmd.exe 114 PID 1892 wrote to memory of 5088 1892 cmd.exe 114 PID 1892 wrote to memory of 5088 1892 cmd.exe 114 PID 4444 wrote to memory of 3336 4444 cmd.exe 113 PID 4444 wrote to memory of 3336 4444 cmd.exe 113 PID 4444 wrote to memory of 3336 4444 cmd.exe 113 PID 4428 wrote to memory of 1976 4428 cmd.exe 112 PID 4428 wrote to memory of 1976 4428 cmd.exe 112 PID 4428 wrote to memory of 1976 4428 cmd.exe 112 PID 4660 wrote to memory of 3084 4660 cmd.exe 111 PID 4660 wrote to memory of 3084 4660 cmd.exe 111 PID 4660 wrote to memory of 3084 4660 cmd.exe 111 PID 4972 wrote to memory of 3712 4972 cmd.exe 110 PID 4972 wrote to memory of 3712 4972 cmd.exe 110 PID 4972 wrote to memory of 3712 4972 cmd.exe 110 PID 5036 wrote to memory of 4516 5036 cmd.exe 109 PID 5036 wrote to memory of 4516 5036 cmd.exe 109 PID 5036 wrote to memory of 4516 5036 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"3⤵
- Creates scheduled task(s)
PID:3712
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"3⤵
- Creates scheduled task(s)
PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"3⤵
- Creates scheduled task(s)
PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"3⤵
- Creates scheduled task(s)
PID:3084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"2⤵PID:4820
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"3⤵
- Creates scheduled task(s)
PID:5088
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"2⤵PID:3284
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8572" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"2⤵PID:1708
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4273" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4273" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"3⤵
- Creates scheduled task(s)
PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6392" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6392" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"3⤵
- Creates scheduled task(s)
PID:4200
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3892" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3892" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"3⤵
- Creates scheduled task(s)
PID:3336
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"3⤵
- Creates scheduled task(s)
PID:5100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 11442⤵
- Program crash
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3788 -ip 37881⤵PID:3948