Analysis
-
max time kernel
51s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
27/09/2022, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe
Resource
win10-20220901-en
6 signatures
150 seconds
General
-
Target
8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe
-
Size
928KB
-
MD5
d2c3f768b964949e012a3d7beb1a4dd5
-
SHA1
70c57e40c4352aa15505d96afb0ec5dc5cff0160
-
SHA256
8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38
-
SHA512
12d82a659b2a03a13edba86e9a905633d331454f19fff98b68ce24ad4550fb8ab430a466d267f25adfd67079e13e30b0a89c6a98b13c59fe8cc454082c5d458b
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe" 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2160 4760 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4504 schtasks.exe 4128 schtasks.exe 4268 schtasks.exe 4056 schtasks.exe 4808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 4760 wrote to memory of 1672 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 66 PID 4760 wrote to memory of 1672 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 66 PID 4760 wrote to memory of 1672 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 66 PID 4760 wrote to memory of 1352 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 67 PID 4760 wrote to memory of 1352 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 67 PID 4760 wrote to memory of 1352 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 67 PID 4760 wrote to memory of 4588 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 69 PID 4760 wrote to memory of 4588 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 69 PID 4760 wrote to memory of 4588 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 69 PID 4760 wrote to memory of 4604 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 68 PID 4760 wrote to memory of 4604 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 68 PID 4760 wrote to memory of 4604 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 68 PID 4760 wrote to memory of 4864 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 85 PID 4760 wrote to memory of 4864 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 85 PID 4760 wrote to memory of 4864 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 85 PID 4760 wrote to memory of 4848 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 84 PID 4760 wrote to memory of 4848 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 84 PID 4760 wrote to memory of 4848 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 84 PID 4760 wrote to memory of 3208 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 82 PID 4760 wrote to memory of 3208 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 82 PID 4760 wrote to memory of 3208 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 82 PID 4760 wrote to memory of 4896 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 78 PID 4760 wrote to memory of 4896 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 78 PID 4760 wrote to memory of 4896 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 78 PID 4760 wrote to memory of 2168 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 75 PID 4760 wrote to memory of 2168 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 75 PID 4760 wrote to memory of 2168 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 75 PID 4760 wrote to memory of 4700 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 74 PID 4760 wrote to memory of 4700 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 74 PID 4760 wrote to memory of 4700 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 74 PID 4760 wrote to memory of 4436 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 72 PID 4760 wrote to memory of 4436 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 72 PID 4760 wrote to memory of 4436 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 72 PID 4760 wrote to memory of 4184 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 81 PID 4760 wrote to memory of 4184 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 81 PID 4760 wrote to memory of 4184 4760 8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe 81 PID 4604 wrote to memory of 4808 4604 cmd.exe 94 PID 4604 wrote to memory of 4808 4604 cmd.exe 94 PID 4604 wrote to memory of 4808 4604 cmd.exe 94 PID 1672 wrote to memory of 4504 1672 cmd.exe 90 PID 1672 wrote to memory of 4504 1672 cmd.exe 90 PID 1672 wrote to memory of 4504 1672 cmd.exe 90 PID 2168 wrote to memory of 4056 2168 cmd.exe 93 PID 2168 wrote to memory of 4056 2168 cmd.exe 93 PID 2168 wrote to memory of 4056 2168 cmd.exe 93 PID 3208 wrote to memory of 4268 3208 cmd.exe 92 PID 3208 wrote to memory of 4268 3208 cmd.exe 92 PID 3208 wrote to memory of 4268 3208 cmd.exe 92 PID 4588 wrote to memory of 4128 4588 cmd.exe 91 PID 4588 wrote to memory of 4128 4588 cmd.exe 91 PID 4588 wrote to memory of 4128 4588 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"3⤵
- Creates scheduled task(s)
PID:4504
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"2⤵PID:1352
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"3⤵
- Creates scheduled task(s)
PID:4808
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"3⤵
- Creates scheduled task(s)
PID:4128
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9292" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"2⤵PID:4436
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk550" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"2⤵PID:4700
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk655" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk655" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"3⤵
- Creates scheduled task(s)
PID:4056
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"2⤵PID:4896
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4925" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"2⤵PID:4184
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"3⤵
- Creates scheduled task(s)
PID:4268
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"2⤵PID:4848
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\8bc098c108101914de4bcadd7d182bf24dd2d76fec9d1226d9356cd3add00e38.exe"2⤵PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 13562⤵
- Program crash
PID:2160
-