Analysis
-
max time kernel
90s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2022 07:05
Static task
static1
Behavioral task
behavioral1
Sample
6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe
-
Size
899KB
-
MD5
be60dccdc86a7268bc8d802e4adde81d
-
SHA1
8d7440a33838339ef3a14dbb0276951e7121383b
-
SHA256
6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64
-
SHA512
c540811dd064c366c123cab18a2a3cbb28988d3cecc578336f0551c6ccf9dd2c98edef3be024584d018ba0d02e11a15de297155d10d1af6968a99fecb7f8ee7f
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe" 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1524 5016 WerFault.exe 78 -
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4336 schtasks.exe 3608 schtasks.exe 5104 schtasks.exe 2976 schtasks.exe 3296 schtasks.exe 4608 schtasks.exe 1884 schtasks.exe 1484 schtasks.exe 3400 schtasks.exe 1004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5016 wrote to memory of 4956 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 79 PID 5016 wrote to memory of 4956 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 79 PID 5016 wrote to memory of 4956 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 79 PID 5016 wrote to memory of 4928 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 80 PID 5016 wrote to memory of 4928 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 80 PID 5016 wrote to memory of 4928 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 80 PID 5016 wrote to memory of 4980 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 81 PID 5016 wrote to memory of 4980 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 81 PID 5016 wrote to memory of 4980 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 81 PID 5016 wrote to memory of 5032 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 103 PID 5016 wrote to memory of 5032 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 103 PID 5016 wrote to memory of 5032 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 103 PID 5016 wrote to memory of 2080 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 83 PID 5016 wrote to memory of 2080 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 83 PID 5016 wrote to memory of 2080 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 83 PID 5016 wrote to memory of 1016 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 100 PID 5016 wrote to memory of 1016 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 100 PID 5016 wrote to memory of 1016 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 100 PID 5016 wrote to memory of 368 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 86 PID 5016 wrote to memory of 368 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 86 PID 5016 wrote to memory of 368 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 86 PID 5016 wrote to memory of 2452 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 98 PID 5016 wrote to memory of 2452 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 98 PID 5016 wrote to memory of 2452 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 98 PID 5016 wrote to memory of 2468 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 88 PID 5016 wrote to memory of 2468 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 88 PID 5016 wrote to memory of 2468 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 88 PID 5016 wrote to memory of 220 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 90 PID 5016 wrote to memory of 220 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 90 PID 5016 wrote to memory of 220 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 90 PID 5016 wrote to memory of 920 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 92 PID 5016 wrote to memory of 920 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 92 PID 5016 wrote to memory of 920 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 92 PID 5016 wrote to memory of 4036 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 93 PID 5016 wrote to memory of 4036 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 93 PID 5016 wrote to memory of 4036 5016 6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe 93 PID 4956 wrote to memory of 4336 4956 cmd.exe 97 PID 4956 wrote to memory of 4336 4956 cmd.exe 97 PID 4956 wrote to memory of 4336 4956 cmd.exe 97 PID 4980 wrote to memory of 4608 4980 cmd.exe 104 PID 4980 wrote to memory of 4608 4980 cmd.exe 104 PID 4980 wrote to memory of 4608 4980 cmd.exe 104 PID 5032 wrote to memory of 3608 5032 cmd.exe 105 PID 5032 wrote to memory of 3608 5032 cmd.exe 105 PID 5032 wrote to memory of 3608 5032 cmd.exe 105 PID 4928 wrote to memory of 5104 4928 cmd.exe 107 PID 4928 wrote to memory of 5104 4928 cmd.exe 107 PID 4928 wrote to memory of 5104 4928 cmd.exe 107 PID 1016 wrote to memory of 1884 1016 cmd.exe 106 PID 1016 wrote to memory of 1884 1016 cmd.exe 106 PID 1016 wrote to memory of 1884 1016 cmd.exe 106 PID 2468 wrote to memory of 1484 2468 cmd.exe 108 PID 2468 wrote to memory of 1484 2468 cmd.exe 108 PID 2468 wrote to memory of 1484 2468 cmd.exe 108 PID 220 wrote to memory of 3400 220 cmd.exe 109 PID 220 wrote to memory of 3400 220 cmd.exe 109 PID 220 wrote to memory of 3400 220 cmd.exe 109 PID 2080 wrote to memory of 2976 2080 cmd.exe 110 PID 2080 wrote to memory of 2976 2080 cmd.exe 110 PID 2080 wrote to memory of 2976 2080 cmd.exe 110 PID 2452 wrote to memory of 3296 2452 cmd.exe 111 PID 2452 wrote to memory of 3296 2452 cmd.exe 111 PID 2452 wrote to memory of 3296 2452 cmd.exe 111 PID 4036 wrote to memory of 1004 4036 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"3⤵
- Creates scheduled task(s)
PID:4336
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"3⤵
- Creates scheduled task(s)
PID:5104
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"3⤵
- Creates scheduled task(s)
PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"3⤵
- Creates scheduled task(s)
PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"2⤵PID:368
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3645" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3645" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"3⤵
- Creates scheduled task(s)
PID:1484
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk1744" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk1744" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"3⤵
- Creates scheduled task(s)
PID:3400
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4538" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"2⤵PID:920
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4244" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4244" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"3⤵
- Creates scheduled task(s)
PID:1004
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"3⤵
- Creates scheduled task(s)
PID:3296
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"3⤵
- Creates scheduled task(s)
PID:1884
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\6354a955a925497e2398e9127d71f2e1e1006cb7d9d27fc24ca6327211d50c64.exe"3⤵
- Creates scheduled task(s)
PID:3608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 11442⤵
- Program crash
PID:1524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5016 -ip 50161⤵PID:3068