Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2022 00:01
Static task
static1
Behavioral task
behavioral1
Sample
b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe
-
Size
901KB
-
MD5
f251506360d69f104ebf4f38f5658cb5
-
SHA1
1aeecbe214e3d51e1c1219c8a5a2c6b721dbc29a
-
SHA256
b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d
-
SHA512
75bf01563a901fc70802682b8fa868ef2aeef29ad77ade4bd39cdec1c76c5c7225d279d1a6993807ccefc9fb91e5f10372ec9253b5efed8f3ff78a54bffb571d
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe" b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3804 3996 WerFault.exe 78 -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3452 schtasks.exe 2772 schtasks.exe 2788 schtasks.exe 2056 schtasks.exe 2780 schtasks.exe 2076 schtasks.exe 2452 schtasks.exe 5088 schtasks.exe 2460 schtasks.exe 2756 schtasks.exe 1644 schtasks.exe 2272 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3996 wrote to memory of 4652 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 79 PID 3996 wrote to memory of 4652 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 79 PID 3996 wrote to memory of 4652 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 79 PID 3996 wrote to memory of 4960 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 80 PID 3996 wrote to memory of 4960 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 80 PID 3996 wrote to memory of 4960 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 80 PID 3996 wrote to memory of 4948 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 81 PID 3996 wrote to memory of 4948 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 81 PID 3996 wrote to memory of 4948 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 81 PID 3996 wrote to memory of 628 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 82 PID 3996 wrote to memory of 628 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 82 PID 3996 wrote to memory of 628 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 82 PID 3996 wrote to memory of 4900 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 93 PID 3996 wrote to memory of 4900 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 93 PID 3996 wrote to memory of 4900 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 93 PID 3996 wrote to memory of 4936 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 90 PID 3996 wrote to memory of 4936 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 90 PID 3996 wrote to memory of 4936 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 90 PID 3996 wrote to memory of 4808 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 85 PID 3996 wrote to memory of 4808 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 85 PID 3996 wrote to memory of 4808 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 85 PID 3996 wrote to memory of 3276 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 87 PID 3996 wrote to memory of 3276 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 87 PID 3996 wrote to memory of 3276 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 87 PID 3996 wrote to memory of 1804 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 94 PID 3996 wrote to memory of 1804 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 94 PID 3996 wrote to memory of 1804 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 94 PID 3996 wrote to memory of 4424 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 96 PID 3996 wrote to memory of 4424 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 96 PID 3996 wrote to memory of 4424 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 96 PID 3996 wrote to memory of 4208 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 97 PID 3996 wrote to memory of 4208 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 97 PID 3996 wrote to memory of 4208 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 97 PID 3996 wrote to memory of 220 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 99 PID 3996 wrote to memory of 220 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 99 PID 3996 wrote to memory of 220 3996 b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe 99 PID 628 wrote to memory of 3452 628 cmd.exe 103 PID 628 wrote to memory of 3452 628 cmd.exe 103 PID 628 wrote to memory of 3452 628 cmd.exe 103 PID 3276 wrote to memory of 2272 3276 cmd.exe 114 PID 3276 wrote to memory of 2272 3276 cmd.exe 114 PID 3276 wrote to memory of 2272 3276 cmd.exe 114 PID 1804 wrote to memory of 2076 1804 cmd.exe 111 PID 1804 wrote to memory of 2076 1804 cmd.exe 111 PID 1804 wrote to memory of 2076 1804 cmd.exe 111 PID 4936 wrote to memory of 2756 4936 cmd.exe 108 PID 4936 wrote to memory of 2756 4936 cmd.exe 108 PID 4936 wrote to memory of 2756 4936 cmd.exe 108 PID 4960 wrote to memory of 2780 4960 cmd.exe 110 PID 4960 wrote to memory of 2780 4960 cmd.exe 110 PID 4960 wrote to memory of 2780 4960 cmd.exe 110 PID 4208 wrote to memory of 1644 4208 cmd.exe 113 PID 4208 wrote to memory of 1644 4208 cmd.exe 113 PID 4208 wrote to memory of 1644 4208 cmd.exe 113 PID 220 wrote to memory of 2452 220 cmd.exe 112 PID 220 wrote to memory of 2452 220 cmd.exe 112 PID 220 wrote to memory of 2452 220 cmd.exe 112 PID 4424 wrote to memory of 2460 4424 cmd.exe 107 PID 4424 wrote to memory of 2460 4424 cmd.exe 107 PID 4424 wrote to memory of 2460 4424 cmd.exe 107 PID 4808 wrote to memory of 5088 4808 cmd.exe 104 PID 4808 wrote to memory of 5088 4808 cmd.exe 104 PID 4808 wrote to memory of 5088 4808 cmd.exe 104 PID 4948 wrote to memory of 2772 4948 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"2⤵PID:4652
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"3⤵
- Creates scheduled task(s)
PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"3⤵
- Creates scheduled task(s)
PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"3⤵
- Creates scheduled task(s)
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"3⤵
- Creates scheduled task(s)
PID:3452
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"3⤵
- Creates scheduled task(s)
PID:5088
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"3⤵
- Creates scheduled task(s)
PID:2272
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"3⤵
- Creates scheduled task(s)
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"2⤵PID:4900
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"3⤵
- Creates scheduled task(s)
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1309" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1309" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"3⤵
- Creates scheduled task(s)
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8805" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8805" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"3⤵
- Creates scheduled task(s)
PID:2460
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3237" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3237" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"3⤵
- Creates scheduled task(s)
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4740" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4740" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"3⤵
- Creates scheduled task(s)
PID:2452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 13722⤵
- Program crash
PID:3804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 3996 -ip 39961⤵PID:4456