Analysis
-
max time kernel
70s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25/09/2022, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe
-
Size
923KB
-
MD5
487ba5f26d8254b0ee971479c54ffcd3
-
SHA1
aacc4ef7865e8cb554eb2070075ae50d0259f959
-
SHA256
872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa
-
SHA512
93c7938c6df502681fce27cb0d197d23108d6f32ef703cfe15967749c5701d6b50298ff615d5a894ccf552c77d488c9ad6528c67284afb6ee4b398eca3098275
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe" 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3304 2244 WerFault.exe 66 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4928 schtasks.exe 860 schtasks.exe 4720 schtasks.exe 3712 schtasks.exe 512 schtasks.exe 4864 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1048 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 67 PID 2244 wrote to memory of 1048 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 67 PID 2244 wrote to memory of 1048 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 67 PID 2244 wrote to memory of 1408 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 68 PID 2244 wrote to memory of 1408 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 68 PID 2244 wrote to memory of 1408 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 68 PID 2244 wrote to memory of 2744 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 92 PID 2244 wrote to memory of 2744 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 92 PID 2244 wrote to memory of 2744 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 92 PID 2244 wrote to memory of 3060 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 69 PID 2244 wrote to memory of 3060 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 69 PID 2244 wrote to memory of 3060 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 69 PID 2244 wrote to memory of 1232 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 91 PID 2244 wrote to memory of 1232 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 91 PID 2244 wrote to memory of 1232 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 91 PID 2244 wrote to memory of 3536 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 89 PID 2244 wrote to memory of 3536 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 89 PID 2244 wrote to memory of 3536 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 89 PID 2244 wrote to memory of 1600 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 88 PID 2244 wrote to memory of 1600 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 88 PID 2244 wrote to memory of 1600 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 88 PID 2244 wrote to memory of 3976 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 86 PID 2244 wrote to memory of 3976 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 86 PID 2244 wrote to memory of 3976 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 86 PID 2244 wrote to memory of 4832 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 71 PID 2244 wrote to memory of 4832 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 71 PID 2244 wrote to memory of 4832 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 71 PID 2244 wrote to memory of 3616 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 73 PID 2244 wrote to memory of 3616 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 73 PID 2244 wrote to memory of 3616 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 73 PID 2244 wrote to memory of 4344 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 75 PID 2244 wrote to memory of 4344 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 75 PID 2244 wrote to memory of 4344 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 75 PID 2244 wrote to memory of 4972 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 76 PID 2244 wrote to memory of 4972 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 76 PID 2244 wrote to memory of 4972 2244 872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe 76 PID 1408 wrote to memory of 3712 1408 cmd.exe 84 PID 1408 wrote to memory of 3712 1408 cmd.exe 84 PID 1408 wrote to memory of 3712 1408 cmd.exe 84 PID 1048 wrote to memory of 4720 1048 cmd.exe 83 PID 1048 wrote to memory of 4720 1048 cmd.exe 83 PID 1048 wrote to memory of 4720 1048 cmd.exe 83 PID 3060 wrote to memory of 512 3060 cmd.exe 93 PID 3060 wrote to memory of 512 3060 cmd.exe 93 PID 3060 wrote to memory of 512 3060 cmd.exe 93 PID 3616 wrote to memory of 4864 3616 cmd.exe 94 PID 3616 wrote to memory of 4864 3616 cmd.exe 94 PID 3616 wrote to memory of 4864 3616 cmd.exe 94 PID 1232 wrote to memory of 4928 1232 cmd.exe 95 PID 1232 wrote to memory of 4928 1232 cmd.exe 95 PID 1232 wrote to memory of 4928 1232 cmd.exe 95 PID 4972 wrote to memory of 860 4972 cmd.exe 96 PID 4972 wrote to memory of 860 4972 cmd.exe 96 PID 4972 wrote to memory of 860 4972 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"3⤵
- Creates scheduled task(s)
PID:4720
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"3⤵
- Creates scheduled task(s)
PID:3712
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"3⤵
- Creates scheduled task(s)
PID:512
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk64" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"2⤵PID:4832
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7904" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7904" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"3⤵
- Creates scheduled task(s)
PID:4864
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk7267" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"2⤵PID:4344
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6483" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6483" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"3⤵
- Creates scheduled task(s)
PID:860
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"2⤵PID:3976
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"2⤵PID:1600
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"2⤵PID:3536
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"3⤵
- Creates scheduled task(s)
PID:4928
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\872d0fb4aea421e8bff04e75bbbc6cba47a137bdd86c26f18a29d3cca5b1effa.exe"2⤵PID:2744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 13202⤵
- Program crash
PID:3304
-