Analysis
-
max time kernel
53s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
23/09/2022, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe
-
Size
917KB
-
MD5
af6fffd28002882546a7f0dcab156fff
-
SHA1
17f3401c197e359ad43a400ab612dd48e3f7f727
-
SHA256
5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c
-
SHA512
a533f156c4c058530fd9aa3b589d2fc9b155522af364c1490905f1f0aeffc3841c0f4227ddce605bfe29b13332e482c9c55a50e23bf8d2bb6b59d106207b1861
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe" 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 788 2700 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4300 schtasks.exe 4316 schtasks.exe 2912 schtasks.exe 3956 schtasks.exe 3488 schtasks.exe 4492 schtasks.exe 388 schtasks.exe 4356 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2700 wrote to memory of 4684 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 66 PID 2700 wrote to memory of 4684 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 66 PID 2700 wrote to memory of 4684 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 66 PID 2700 wrote to memory of 2176 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 67 PID 2700 wrote to memory of 2176 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 67 PID 2700 wrote to memory of 2176 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 67 PID 2700 wrote to memory of 2084 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 68 PID 2700 wrote to memory of 2084 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 68 PID 2700 wrote to memory of 2084 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 68 PID 2700 wrote to memory of 4772 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 71 PID 2700 wrote to memory of 4772 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 71 PID 2700 wrote to memory of 4772 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 71 PID 2700 wrote to memory of 4836 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 69 PID 2700 wrote to memory of 4836 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 69 PID 2700 wrote to memory of 4836 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 69 PID 2700 wrote to memory of 5056 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 70 PID 2700 wrote to memory of 5056 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 70 PID 2700 wrote to memory of 5056 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 70 PID 2700 wrote to memory of 4184 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 86 PID 2700 wrote to memory of 4184 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 86 PID 2700 wrote to memory of 4184 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 86 PID 2700 wrote to memory of 940 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 85 PID 2700 wrote to memory of 940 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 85 PID 2700 wrote to memory of 940 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 85 PID 2700 wrote to memory of 2428 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 72 PID 2700 wrote to memory of 2428 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 72 PID 2700 wrote to memory of 2428 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 72 PID 2700 wrote to memory of 4044 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 81 PID 2700 wrote to memory of 4044 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 81 PID 2700 wrote to memory of 4044 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 81 PID 2700 wrote to memory of 1608 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 73 PID 2700 wrote to memory of 1608 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 73 PID 2700 wrote to memory of 1608 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 73 PID 2700 wrote to memory of 3568 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 74 PID 2700 wrote to memory of 3568 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 74 PID 2700 wrote to memory of 3568 2700 5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe 74 PID 2176 wrote to memory of 3488 2176 cmd.exe 90 PID 2176 wrote to memory of 3488 2176 cmd.exe 90 PID 4184 wrote to memory of 3956 4184 cmd.exe 97 PID 2176 wrote to memory of 3488 2176 cmd.exe 90 PID 4184 wrote to memory of 3956 4184 cmd.exe 97 PID 4184 wrote to memory of 3956 4184 cmd.exe 97 PID 4772 wrote to memory of 2912 4772 cmd.exe 96 PID 4772 wrote to memory of 2912 4772 cmd.exe 96 PID 4772 wrote to memory of 2912 4772 cmd.exe 96 PID 4836 wrote to memory of 4492 4836 cmd.exe 91 PID 4836 wrote to memory of 4492 4836 cmd.exe 91 PID 4836 wrote to memory of 4492 4836 cmd.exe 91 PID 2084 wrote to memory of 4316 2084 cmd.exe 95 PID 2084 wrote to memory of 4316 2084 cmd.exe 95 PID 2084 wrote to memory of 4316 2084 cmd.exe 95 PID 4044 wrote to memory of 4300 4044 cmd.exe 94 PID 4044 wrote to memory of 4300 4044 cmd.exe 94 PID 4044 wrote to memory of 4300 4044 cmd.exe 94 PID 2428 wrote to memory of 388 2428 cmd.exe 92 PID 2428 wrote to memory of 388 2428 cmd.exe 92 PID 2428 wrote to memory of 388 2428 cmd.exe 92 PID 1608 wrote to memory of 4356 1608 cmd.exe 93 PID 1608 wrote to memory of 4356 1608 cmd.exe 93 PID 1608 wrote to memory of 4356 1608 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"2⤵PID:4684
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"3⤵
- Creates scheduled task(s)
PID:3488
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"3⤵
- Creates scheduled task(s)
PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"3⤵
- Creates scheduled task(s)
PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"2⤵PID:5056
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"3⤵
- Creates scheduled task(s)
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4448" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4448" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"3⤵
- Creates scheduled task(s)
PID:388
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2146" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2146" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"3⤵
- Creates scheduled task(s)
PID:4356
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7439" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"2⤵PID:3568
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4705" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4705" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"3⤵
- Creates scheduled task(s)
PID:4300
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"2⤵PID:940
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\5eec7434959a34463eb13016f606e59b180f193e9611c61fa432ccc7fbe85f4c.exe"3⤵
- Creates scheduled task(s)
PID:3956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 13922⤵
- Program crash
PID:788
-