Analysis
-
max time kernel
77s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2022 21:14
Static task
static1
Behavioral task
behavioral1
Sample
8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe
-
Size
901KB
-
MD5
dbce8c3b6d6bb92655fc9ef3d9998699
-
SHA1
336da48811089ab5227dc0a5e0b39dbaaa10a7e6
-
SHA256
8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8
-
SHA512
a4c67e059e18fbef4dafa48160e2381fb2f8391fe86a90da8257ff78733ab360629cf703b6e0bda43ccc43fe51fc4ab2973ba312d912e528d886a07ee835313d
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe" 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1752 3344 WerFault.exe 83 -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5052 schtasks.exe 628 schtasks.exe 1440 schtasks.exe 2404 schtasks.exe 4940 schtasks.exe 4428 schtasks.exe 3480 schtasks.exe 2132 schtasks.exe 1952 schtasks.exe 696 schtasks.exe 1228 schtasks.exe 3192 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3344 wrote to memory of 1740 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 85 PID 3344 wrote to memory of 1740 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 85 PID 3344 wrote to memory of 1740 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 85 PID 3344 wrote to memory of 4996 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 86 PID 3344 wrote to memory of 4996 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 86 PID 3344 wrote to memory of 4996 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 86 PID 3344 wrote to memory of 3476 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 87 PID 3344 wrote to memory of 3476 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 87 PID 3344 wrote to memory of 3476 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 87 PID 3344 wrote to memory of 1884 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 109 PID 3344 wrote to memory of 1884 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 109 PID 3344 wrote to memory of 1884 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 109 PID 3344 wrote to memory of 1188 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 89 PID 3344 wrote to memory of 1188 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 89 PID 3344 wrote to memory of 1188 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 89 PID 3344 wrote to memory of 404 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 90 PID 3344 wrote to memory of 404 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 90 PID 3344 wrote to memory of 404 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 90 PID 3344 wrote to memory of 4928 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 105 PID 3344 wrote to memory of 4928 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 105 PID 3344 wrote to memory of 4928 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 105 PID 3344 wrote to memory of 1820 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 91 PID 3344 wrote to memory of 1820 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 91 PID 3344 wrote to memory of 1820 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 91 PID 3344 wrote to memory of 3560 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 93 PID 3344 wrote to memory of 3560 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 93 PID 3344 wrote to memory of 3560 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 93 PID 3344 wrote to memory of 4828 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 94 PID 3344 wrote to memory of 4828 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 94 PID 3344 wrote to memory of 4828 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 94 PID 1740 wrote to memory of 4940 1740 cmd.exe 102 PID 1740 wrote to memory of 4940 1740 cmd.exe 102 PID 1740 wrote to memory of 4940 1740 cmd.exe 102 PID 3344 wrote to memory of 4992 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 101 PID 3344 wrote to memory of 4992 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 101 PID 3344 wrote to memory of 4992 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 101 PID 3344 wrote to memory of 644 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 96 PID 3344 wrote to memory of 644 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 96 PID 3344 wrote to memory of 644 3344 8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe 96 PID 4928 wrote to memory of 1952 4928 cmd.exe 98 PID 4928 wrote to memory of 1952 4928 cmd.exe 98 PID 4928 wrote to memory of 1952 4928 cmd.exe 98 PID 4996 wrote to memory of 3480 4996 cmd.exe 112 PID 4996 wrote to memory of 3480 4996 cmd.exe 112 PID 4996 wrote to memory of 3480 4996 cmd.exe 112 PID 3476 wrote to memory of 4428 3476 cmd.exe 111 PID 3476 wrote to memory of 4428 3476 cmd.exe 111 PID 3476 wrote to memory of 4428 3476 cmd.exe 111 PID 1188 wrote to memory of 628 1188 cmd.exe 116 PID 1188 wrote to memory of 628 1188 cmd.exe 116 PID 1188 wrote to memory of 628 1188 cmd.exe 116 PID 1884 wrote to memory of 2132 1884 cmd.exe 113 PID 1884 wrote to memory of 2132 1884 cmd.exe 113 PID 1884 wrote to memory of 2132 1884 cmd.exe 113 PID 404 wrote to memory of 5052 404 cmd.exe 115 PID 404 wrote to memory of 5052 404 cmd.exe 115 PID 404 wrote to memory of 5052 404 cmd.exe 115 PID 1820 wrote to memory of 696 1820 cmd.exe 114 PID 1820 wrote to memory of 696 1820 cmd.exe 114 PID 1820 wrote to memory of 696 1820 cmd.exe 114 PID 4828 wrote to memory of 1440 4828 cmd.exe 117 PID 4828 wrote to memory of 1440 4828 cmd.exe 117 PID 4828 wrote to memory of 1440 4828 cmd.exe 117 PID 3560 wrote to memory of 1228 3560 cmd.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"3⤵
- Creates scheduled task(s)
PID:4940
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"3⤵
- Creates scheduled task(s)
PID:3480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"3⤵
- Creates scheduled task(s)
PID:4428
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"3⤵
- Creates scheduled task(s)
PID:628
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"3⤵
- Creates scheduled task(s)
PID:5052
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"3⤵
- Creates scheduled task(s)
PID:696
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6882" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6882" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"3⤵
- Creates scheduled task(s)
PID:1228
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8486" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8486" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"3⤵
- Creates scheduled task(s)
PID:1440
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9264" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"2⤵PID:644
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9264" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"3⤵
- Creates scheduled task(s)
PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5104" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"2⤵PID:4992
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5104" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"3⤵
- Creates scheduled task(s)
PID:3192
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4928
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"3⤵
- Creates scheduled task(s)
PID:2132
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 10962⤵
- Program crash
PID:1752
-
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\8351dab8915e9e08f3b247dd97bd59c174207cd67aaf54b091b8ac7350530af8.exe"1⤵
- Creates scheduled task(s)
PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3344 -ip 33441⤵PID:4752