Analysis
-
max time kernel
90s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2022 15:21
Static task
static1
Behavioral task
behavioral1
Sample
5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe
-
Size
895KB
-
MD5
d5e7261c148f86b199f8c86ca073db28
-
SHA1
f3f0f9579e93b3593ece39bb39686a47e5c4d817
-
SHA256
5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929
-
SHA512
7ea99c1fcd20bb539ab3df8a087353d3488088bb4eff2e9724bdfd397722702c53e128c04468c0821fde021a05f8f13a3f8c8b0a655f9247777950c3dc167c64
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe" 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2272 4520 WerFault.exe 79 -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4144 schtasks.exe 748 schtasks.exe 3136 schtasks.exe 3520 schtasks.exe 3632 schtasks.exe 112 schtasks.exe 4048 schtasks.exe 2964 schtasks.exe 1556 schtasks.exe 2364 schtasks.exe 3596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 3068 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 80 PID 4520 wrote to memory of 3068 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 80 PID 4520 wrote to memory of 3068 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 80 PID 4520 wrote to memory of 2268 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 81 PID 4520 wrote to memory of 2268 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 81 PID 4520 wrote to memory of 2268 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 81 PID 4520 wrote to memory of 2316 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 84 PID 4520 wrote to memory of 2316 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 84 PID 4520 wrote to memory of 2316 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 84 PID 4520 wrote to memory of 4328 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 87 PID 4520 wrote to memory of 4328 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 87 PID 4520 wrote to memory of 4328 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 87 PID 4520 wrote to memory of 5052 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 86 PID 4520 wrote to memory of 5052 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 86 PID 4520 wrote to memory of 5052 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 86 PID 4520 wrote to memory of 5012 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 90 PID 4520 wrote to memory of 5012 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 90 PID 4520 wrote to memory of 5012 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 90 PID 4520 wrote to memory of 4956 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 94 PID 4520 wrote to memory of 4956 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 94 PID 4520 wrote to memory of 4956 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 94 PID 4520 wrote to memory of 3636 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 93 PID 4520 wrote to memory of 3636 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 93 PID 4520 wrote to memory of 3636 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 93 PID 4520 wrote to memory of 1352 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 96 PID 4520 wrote to memory of 1352 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 96 PID 4520 wrote to memory of 1352 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 96 PID 4520 wrote to memory of 4816 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 97 PID 4520 wrote to memory of 4816 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 97 PID 4520 wrote to memory of 4816 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 97 PID 4520 wrote to memory of 1496 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 99 PID 4520 wrote to memory of 1496 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 99 PID 4520 wrote to memory of 1496 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 99 PID 4520 wrote to memory of 1340 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 100 PID 4520 wrote to memory of 1340 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 100 PID 4520 wrote to memory of 1340 4520 5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe 100 PID 2268 wrote to memory of 748 2268 cmd.exe 105 PID 2268 wrote to memory of 748 2268 cmd.exe 105 PID 2268 wrote to memory of 748 2268 cmd.exe 105 PID 3636 wrote to memory of 4144 3636 cmd.exe 104 PID 3636 wrote to memory of 4144 3636 cmd.exe 104 PID 3636 wrote to memory of 4144 3636 cmd.exe 104 PID 3068 wrote to memory of 4048 3068 cmd.exe 106 PID 3068 wrote to memory of 4048 3068 cmd.exe 106 PID 3068 wrote to memory of 4048 3068 cmd.exe 106 PID 5012 wrote to memory of 2964 5012 cmd.exe 109 PID 5012 wrote to memory of 2964 5012 cmd.exe 109 PID 5012 wrote to memory of 2964 5012 cmd.exe 109 PID 5052 wrote to memory of 3520 5052 cmd.exe 108 PID 5052 wrote to memory of 3520 5052 cmd.exe 108 PID 5052 wrote to memory of 3520 5052 cmd.exe 108 PID 4956 wrote to memory of 3136 4956 cmd.exe 107 PID 4956 wrote to memory of 3136 4956 cmd.exe 107 PID 4956 wrote to memory of 3136 4956 cmd.exe 107 PID 2316 wrote to memory of 3632 2316 cmd.exe 110 PID 2316 wrote to memory of 3632 2316 cmd.exe 110 PID 2316 wrote to memory of 3632 2316 cmd.exe 110 PID 4328 wrote to memory of 1556 4328 cmd.exe 111 PID 4328 wrote to memory of 1556 4328 cmd.exe 111 PID 4328 wrote to memory of 1556 4328 cmd.exe 111 PID 1496 wrote to memory of 112 1496 cmd.exe 113 PID 1496 wrote to memory of 112 1496 cmd.exe 113 PID 1496 wrote to memory of 112 1496 cmd.exe 113 PID 4816 wrote to memory of 2364 4816 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"3⤵
- Creates scheduled task(s)
PID:4048
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"3⤵
- Creates scheduled task(s)
PID:748
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"3⤵
- Creates scheduled task(s)
PID:3632
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"3⤵
- Creates scheduled task(s)
PID:3520
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"3⤵
- Creates scheduled task(s)
PID:1556
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"3⤵
- Creates scheduled task(s)
PID:2964
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"3⤵
- Creates scheduled task(s)
PID:4144
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"3⤵
- Creates scheduled task(s)
PID:3136
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4436" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"2⤵PID:1352
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5721" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5721" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"3⤵
- Creates scheduled task(s)
PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8049" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8049" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"3⤵
- Creates scheduled task(s)
PID:112
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6976" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"2⤵PID:1340
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6976" /TR "C:\Users\Admin\AppData\Local\Temp\5fdf571aa7ccd896e04f59a94d7712f2f351cb28af146ef604bd80103e848929.exe"3⤵
- Creates scheduled task(s)
PID:3596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 10162⤵
- Program crash
PID:2272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4520 -ip 45201⤵PID:3092