Analysis
-
max time kernel
97s -
max time network
117s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/09/2022, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe
-
Size
899KB
-
MD5
b63d015a45696c20666f66e699f86700
-
SHA1
0290ec3f98ee4a784cfa1bba79a26dde01acfe2a
-
SHA256
0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28
-
SHA512
bdfb8e701c7e6349d422e3bdeef6cb05d926a85ab848e4e912bfb526a091aa95953e5f5360633ec4845796cef4ed689291757899978f4c3bcf00b7ec3954776d
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe" 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3320 2744 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3424 schtasks.exe 1764 schtasks.exe 3792 schtasks.exe 3308 schtasks.exe 3492 schtasks.exe 4296 schtasks.exe 4248 schtasks.exe 5116 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2380 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 66 PID 2744 wrote to memory of 2380 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 66 PID 2744 wrote to memory of 2380 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 66 PID 2744 wrote to memory of 4604 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 67 PID 2744 wrote to memory of 4604 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 67 PID 2744 wrote to memory of 4604 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 67 PID 2744 wrote to memory of 2556 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 68 PID 2744 wrote to memory of 2556 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 68 PID 2744 wrote to memory of 2556 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 68 PID 2744 wrote to memory of 520 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 69 PID 2744 wrote to memory of 520 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 69 PID 2744 wrote to memory of 520 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 69 PID 2744 wrote to memory of 4576 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 76 PID 2744 wrote to memory of 4576 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 76 PID 2744 wrote to memory of 4576 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 76 PID 2744 wrote to memory of 4880 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 75 PID 2744 wrote to memory of 4880 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 75 PID 2744 wrote to memory of 4880 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 75 PID 2744 wrote to memory of 3208 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 73 PID 2744 wrote to memory of 3208 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 73 PID 2744 wrote to memory of 3208 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 73 PID 2744 wrote to memory of 3376 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 70 PID 2744 wrote to memory of 3376 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 70 PID 2744 wrote to memory of 3376 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 70 PID 2744 wrote to memory of 4664 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 97 PID 2744 wrote to memory of 4664 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 97 PID 2744 wrote to memory of 4664 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 97 PID 2744 wrote to memory of 3268 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 88 PID 2744 wrote to memory of 3268 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 88 PID 2744 wrote to memory of 3268 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 88 PID 2744 wrote to memory of 4408 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 87 PID 2744 wrote to memory of 4408 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 87 PID 2744 wrote to memory of 4408 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 87 PID 2744 wrote to memory of 1384 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 85 PID 2744 wrote to memory of 1384 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 85 PID 2744 wrote to memory of 1384 2744 0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe 85 PID 1384 wrote to memory of 4248 1384 cmd.exe 96 PID 1384 wrote to memory of 4248 1384 cmd.exe 96 PID 1384 wrote to memory of 4248 1384 cmd.exe 96 PID 3268 wrote to memory of 4296 3268 cmd.exe 95 PID 3268 wrote to memory of 4296 3268 cmd.exe 95 PID 3268 wrote to memory of 4296 3268 cmd.exe 95 PID 4408 wrote to memory of 3492 4408 cmd.exe 94 PID 4408 wrote to memory of 3492 4408 cmd.exe 94 PID 4408 wrote to memory of 3492 4408 cmd.exe 94 PID 3208 wrote to memory of 3308 3208 cmd.exe 93 PID 3208 wrote to memory of 3308 3208 cmd.exe 93 PID 3208 wrote to memory of 3308 3208 cmd.exe 93 PID 2380 wrote to memory of 3792 2380 cmd.exe 92 PID 2380 wrote to memory of 3792 2380 cmd.exe 92 PID 2380 wrote to memory of 3792 2380 cmd.exe 92 PID 4604 wrote to memory of 5116 4604 cmd.exe 89 PID 4604 wrote to memory of 5116 4604 cmd.exe 89 PID 4604 wrote to memory of 5116 4604 cmd.exe 89 PID 3376 wrote to memory of 1764 3376 cmd.exe 91 PID 3376 wrote to memory of 1764 3376 cmd.exe 91 PID 3376 wrote to memory of 1764 3376 cmd.exe 91 PID 4576 wrote to memory of 3424 4576 cmd.exe 90 PID 4576 wrote to memory of 3424 4576 cmd.exe 90 PID 4576 wrote to memory of 3424 4576 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"3⤵
- Creates scheduled task(s)
PID:3792
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"3⤵
- Creates scheduled task(s)
PID:5116
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"2⤵PID:2556
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"2⤵PID:520
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"3⤵
- Creates scheduled task(s)
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"3⤵
- Creates scheduled task(s)
PID:3308
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"2⤵PID:4880
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"3⤵
- Creates scheduled task(s)
PID:3424
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk1368" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk1368" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"3⤵
- Creates scheduled task(s)
PID:4248
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5409" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5409" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"3⤵
- Creates scheduled task(s)
PID:3492
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk2586" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk2586" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"3⤵
- Creates scheduled task(s)
PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7744" /TR "C:\Users\Admin\AppData\Local\Temp\0fa2d3cd66f12c3185265f66a35a6e1e0f7f341626c48ead72246c21bd4a7b28.exe"2⤵PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 13162⤵
- Program crash
PID:3320
-