Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2022, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe
Resource
win10v2004-20220812-en
6 signatures
150 seconds
General
-
Target
911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe
-
Size
916KB
-
MD5
1bc3a635bbaccbdd13d9dfb26280b5e2
-
SHA1
89817be9a18ce725d6a8c3b75683d437f64d4cb3
-
SHA256
911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674
-
SHA512
d00687d84c12e20ef2f32bf0c7edbb4d958e9d08f29e962403c9be90c0611f5da68cf5953a39e6e523a435db1dcca7e5813a176a596766311128f86a44e67046
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe" 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4840 3140 WerFault.exe 78 -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4932 schtasks.exe 1660 schtasks.exe 5064 schtasks.exe 216 schtasks.exe 1424 schtasks.exe 2708 schtasks.exe 2148 schtasks.exe 368 schtasks.exe 3764 schtasks.exe 5008 schtasks.exe 3780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3140 wrote to memory of 2252 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 79 PID 3140 wrote to memory of 2252 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 79 PID 3140 wrote to memory of 2252 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 79 PID 3140 wrote to memory of 2132 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 80 PID 3140 wrote to memory of 2132 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 80 PID 3140 wrote to memory of 2132 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 80 PID 3140 wrote to memory of 1132 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 82 PID 3140 wrote to memory of 1132 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 82 PID 3140 wrote to memory of 1132 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 82 PID 3140 wrote to memory of 4988 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 83 PID 3140 wrote to memory of 4988 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 83 PID 3140 wrote to memory of 4988 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 83 PID 3140 wrote to memory of 4656 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 85 PID 3140 wrote to memory of 4656 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 85 PID 3140 wrote to memory of 4656 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 85 PID 3140 wrote to memory of 2152 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 87 PID 3140 wrote to memory of 2152 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 87 PID 3140 wrote to memory of 2152 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 87 PID 3140 wrote to memory of 4228 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 90 PID 3140 wrote to memory of 4228 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 90 PID 3140 wrote to memory of 4228 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 90 PID 3140 wrote to memory of 620 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 100 PID 3140 wrote to memory of 620 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 100 PID 3140 wrote to memory of 620 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 100 PID 3140 wrote to memory of 872 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 92 PID 3140 wrote to memory of 872 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 92 PID 3140 wrote to memory of 872 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 92 PID 3140 wrote to memory of 4772 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 93 PID 3140 wrote to memory of 4772 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 93 PID 3140 wrote to memory of 4772 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 93 PID 3140 wrote to memory of 4648 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 95 PID 3140 wrote to memory of 4648 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 95 PID 3140 wrote to memory of 4648 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 95 PID 3140 wrote to memory of 3300 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 96 PID 3140 wrote to memory of 3300 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 96 PID 3140 wrote to memory of 3300 3140 911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe 96 PID 2252 wrote to memory of 4932 2252 cmd.exe 102 PID 2252 wrote to memory of 4932 2252 cmd.exe 102 PID 2252 wrote to memory of 4932 2252 cmd.exe 102 PID 1132 wrote to memory of 1424 1132 cmd.exe 104 PID 1132 wrote to memory of 1424 1132 cmd.exe 104 PID 1132 wrote to memory of 1424 1132 cmd.exe 104 PID 4656 wrote to memory of 1660 4656 cmd.exe 106 PID 4656 wrote to memory of 1660 4656 cmd.exe 106 PID 4656 wrote to memory of 1660 4656 cmd.exe 106 PID 2132 wrote to memory of 2708 2132 cmd.exe 105 PID 2132 wrote to memory of 2708 2132 cmd.exe 105 PID 2132 wrote to memory of 2708 2132 cmd.exe 105 PID 2152 wrote to memory of 368 2152 cmd.exe 109 PID 2152 wrote to memory of 368 2152 cmd.exe 109 PID 2152 wrote to memory of 368 2152 cmd.exe 109 PID 620 wrote to memory of 5064 620 cmd.exe 107 PID 620 wrote to memory of 5064 620 cmd.exe 107 PID 620 wrote to memory of 5064 620 cmd.exe 107 PID 872 wrote to memory of 3764 872 cmd.exe 110 PID 872 wrote to memory of 3764 872 cmd.exe 110 PID 872 wrote to memory of 3764 872 cmd.exe 110 PID 4988 wrote to memory of 2148 4988 cmd.exe 108 PID 4988 wrote to memory of 2148 4988 cmd.exe 108 PID 4988 wrote to memory of 2148 4988 cmd.exe 108 PID 4772 wrote to memory of 5008 4772 cmd.exe 111 PID 4772 wrote to memory of 5008 4772 cmd.exe 111 PID 4772 wrote to memory of 5008 4772 cmd.exe 111 PID 4648 wrote to memory of 3780 4648 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"3⤵
- Creates scheduled task(s)
PID:4932
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"3⤵
- Creates scheduled task(s)
PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"3⤵
- Creates scheduled task(s)
PID:1424
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"3⤵
- Creates scheduled task(s)
PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"3⤵
- Creates scheduled task(s)
PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"3⤵
- Creates scheduled task(s)
PID:368
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"2⤵PID:4228
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5341" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5341" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"3⤵
- Creates scheduled task(s)
PID:3764
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5401" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5401" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"3⤵
- Creates scheduled task(s)
PID:5008
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6844" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6844" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"3⤵
- Creates scheduled task(s)
PID:3780
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6565" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"2⤵PID:3300
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6565" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"3⤵
- Creates scheduled task(s)
PID:216
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\911b030cb843b3d0a753f5b51fd7493501991136c4319250e0e26f900e43f674.exe"3⤵
- Creates scheduled task(s)
PID:5064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 13682⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3140 -ip 31401⤵PID:1384