Analysis
-
max time kernel
90s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15/09/2022, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe
-
Size
898KB
-
MD5
bd9578dd0a854168cc7125a41603a240
-
SHA1
7f796d01e348323dfe2c27646268f6f47366d908
-
SHA256
5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409
-
SHA512
07385fa332cb739d6c2d29d4d7bffb3a0b6eed6a753c8319edc8986d5c55f37fe69c3e0ca34c5bbd6a80fb496b9da02fedba3b5ecd7f89c1f256aa69cac2446a
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe" 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2332 4036 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4648 schtasks.exe 3244 schtasks.exe 4124 schtasks.exe 3204 schtasks.exe 3188 schtasks.exe 4412 schtasks.exe 4660 schtasks.exe 4692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 4036 wrote to memory of 2108 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 97 PID 4036 wrote to memory of 2108 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 97 PID 4036 wrote to memory of 2108 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 97 PID 4036 wrote to memory of 3516 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 96 PID 4036 wrote to memory of 3516 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 96 PID 4036 wrote to memory of 3516 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 96 PID 4036 wrote to memory of 3472 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 95 PID 4036 wrote to memory of 3472 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 95 PID 4036 wrote to memory of 3472 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 95 PID 4036 wrote to memory of 4368 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 66 PID 4036 wrote to memory of 4368 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 66 PID 4036 wrote to memory of 4368 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 66 PID 4036 wrote to memory of 4280 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 94 PID 4036 wrote to memory of 4280 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 94 PID 4036 wrote to memory of 4280 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 94 PID 4036 wrote to memory of 4240 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 67 PID 4036 wrote to memory of 4240 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 67 PID 4036 wrote to memory of 4240 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 67 PID 4036 wrote to memory of 2620 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 93 PID 4036 wrote to memory of 2620 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 93 PID 4036 wrote to memory of 2620 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 93 PID 4036 wrote to memory of 1252 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 92 PID 4036 wrote to memory of 1252 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 92 PID 4036 wrote to memory of 1252 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 92 PID 4036 wrote to memory of 4376 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 82 PID 4036 wrote to memory of 4376 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 82 PID 4036 wrote to memory of 4376 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 82 PID 4036 wrote to memory of 2240 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 71 PID 4036 wrote to memory of 2240 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 71 PID 4036 wrote to memory of 2240 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 71 PID 4036 wrote to memory of 4336 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 72 PID 4036 wrote to memory of 4336 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 72 PID 4036 wrote to memory of 4336 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 72 PID 4036 wrote to memory of 3592 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 80 PID 4036 wrote to memory of 3592 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 80 PID 4036 wrote to memory of 3592 4036 5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe 80 PID 4240 wrote to memory of 3188 4240 cmd.exe 90 PID 4240 wrote to memory of 3188 4240 cmd.exe 90 PID 4240 wrote to memory of 3188 4240 cmd.exe 90 PID 3592 wrote to memory of 3204 3592 cmd.exe 89 PID 3592 wrote to memory of 3204 3592 cmd.exe 89 PID 3592 wrote to memory of 3204 3592 cmd.exe 89 PID 4336 wrote to memory of 4124 4336 cmd.exe 88 PID 4336 wrote to memory of 4124 4336 cmd.exe 88 PID 4336 wrote to memory of 4124 4336 cmd.exe 88 PID 4376 wrote to memory of 3244 4376 cmd.exe 87 PID 4376 wrote to memory of 3244 4376 cmd.exe 87 PID 4376 wrote to memory of 3244 4376 cmd.exe 87 PID 2620 wrote to memory of 4692 2620 cmd.exe 85 PID 2620 wrote to memory of 4692 2620 cmd.exe 85 PID 2620 wrote to memory of 4692 2620 cmd.exe 85 PID 2240 wrote to memory of 4648 2240 cmd.exe 86 PID 2240 wrote to memory of 4648 2240 cmd.exe 86 PID 2240 wrote to memory of 4648 2240 cmd.exe 86 PID 1252 wrote to memory of 4660 1252 cmd.exe 84 PID 1252 wrote to memory of 4660 1252 cmd.exe 84 PID 1252 wrote to memory of 4660 1252 cmd.exe 84 PID 4368 wrote to memory of 4412 4368 cmd.exe 83 PID 4368 wrote to memory of 4412 4368 cmd.exe 83 PID 4368 wrote to memory of 4412 4368 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"3⤵
- Creates scheduled task(s)
PID:4412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"3⤵
- Creates scheduled task(s)
PID:3188
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3628" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3628" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"3⤵
- Creates scheduled task(s)
PID:4648
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9645" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9645" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"3⤵
- Creates scheduled task(s)
PID:4124
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2229" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2229" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"3⤵
- Creates scheduled task(s)
PID:3204
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4643" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4643" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"3⤵
- Creates scheduled task(s)
PID:3244
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1252
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2620
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"2⤵PID:4280
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"2⤵PID:3472
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"2⤵PID:3516
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"2⤵PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 13162⤵
- Program crash
PID:2332
-
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"1⤵
- Creates scheduled task(s)
PID:4660
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"1⤵
- Creates scheduled task(s)
PID:4692