Analysis
-
max time kernel
52s -
max time network
115s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
14/09/2022, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe
Resource
win10-20220901-en
6 signatures
150 seconds
General
-
Target
8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe
-
Size
896KB
-
MD5
5afa405730770eaaba1a29b0d0547a51
-
SHA1
77154ea902d45e905c95dc3d40a3935751d02572
-
SHA256
8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104
-
SHA512
826ece4a8af81b5e613cf45f2f962accb44ab08015cf201d8f1be62b858b7d00391a27349fe6ed015d33e496742fd3c8696026c38275c38399816441e0062a6f
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe" 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3284 2744 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4028 schtasks.exe 2796 schtasks.exe 4488 schtasks.exe 4688 schtasks.exe 3912 schtasks.exe 3608 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2744 wrote to memory of 1376 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 66 PID 2744 wrote to memory of 1376 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 66 PID 2744 wrote to memory of 1376 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 66 PID 2744 wrote to memory of 4868 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 67 PID 2744 wrote to memory of 4868 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 67 PID 2744 wrote to memory of 4868 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 67 PID 2744 wrote to memory of 2204 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 68 PID 2744 wrote to memory of 2204 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 68 PID 2744 wrote to memory of 2204 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 68 PID 2744 wrote to memory of 5096 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 69 PID 2744 wrote to memory of 5096 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 69 PID 2744 wrote to memory of 5096 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 69 PID 2744 wrote to memory of 8 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 89 PID 2744 wrote to memory of 8 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 89 PID 2744 wrote to memory of 8 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 89 PID 2744 wrote to memory of 3408 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 88 PID 2744 wrote to memory of 3408 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 88 PID 2744 wrote to memory of 3408 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 88 PID 2744 wrote to memory of 4908 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 86 PID 2744 wrote to memory of 4908 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 86 PID 2744 wrote to memory of 4908 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 86 PID 2744 wrote to memory of 4340 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 83 PID 2744 wrote to memory of 4340 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 83 PID 2744 wrote to memory of 4340 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 83 PID 2744 wrote to memory of 5088 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 70 PID 2744 wrote to memory of 5088 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 70 PID 2744 wrote to memory of 5088 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 70 PID 2744 wrote to memory of 452 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 82 PID 2744 wrote to memory of 452 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 82 PID 2744 wrote to memory of 452 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 82 PID 2744 wrote to memory of 4848 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 80 PID 2744 wrote to memory of 4848 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 80 PID 2744 wrote to memory of 4848 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 80 PID 2744 wrote to memory of 3708 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 79 PID 2744 wrote to memory of 3708 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 79 PID 2744 wrote to memory of 3708 2744 8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe 79 PID 5088 wrote to memory of 3608 5088 cmd.exe 95 PID 5088 wrote to memory of 3608 5088 cmd.exe 95 PID 5088 wrote to memory of 3608 5088 cmd.exe 95 PID 8 wrote to memory of 4028 8 cmd.exe 90 PID 8 wrote to memory of 4028 8 cmd.exe 90 PID 8 wrote to memory of 4028 8 cmd.exe 90 PID 3408 wrote to memory of 3912 3408 cmd.exe 94 PID 3408 wrote to memory of 3912 3408 cmd.exe 94 PID 3408 wrote to memory of 3912 3408 cmd.exe 94 PID 2204 wrote to memory of 2796 2204 cmd.exe 91 PID 2204 wrote to memory of 2796 2204 cmd.exe 91 PID 2204 wrote to memory of 2796 2204 cmd.exe 91 PID 452 wrote to memory of 4488 452 cmd.exe 92 PID 452 wrote to memory of 4488 452 cmd.exe 92 PID 452 wrote to memory of 4488 452 cmd.exe 92 PID 4340 wrote to memory of 4688 4340 cmd.exe 93 PID 4340 wrote to memory of 4688 4340 cmd.exe 93 PID 4340 wrote to memory of 4688 4340 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"2⤵PID:1376
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"2⤵PID:4868
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"3⤵
- Creates scheduled task(s)
PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"2⤵PID:5096
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1081" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1081" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"3⤵
- Creates scheduled task(s)
PID:3608
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5893" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"2⤵PID:3708
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6581" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"2⤵PID:4848
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5348" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5348" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"3⤵
- Creates scheduled task(s)
PID:4488
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"3⤵
- Creates scheduled task(s)
PID:4688
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"2⤵PID:4908
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"3⤵
- Creates scheduled task(s)
PID:3912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\8f49063ccbd833ab90f38ad114313265ca4bfcaf949e42024434ccd335aac104.exe"3⤵
- Creates scheduled task(s)
PID:4028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 13202⤵
- Program crash
PID:3284
-