Analysis
-
max time kernel
54s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
27/09/2022, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe
-
Size
929KB
-
MD5
6005928256c3946b218994de4b8c7850
-
SHA1
507674022c767b6112b92adc01d6e647f181ee67
-
SHA256
caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1
-
SHA512
8facf5451b5d6aba44bb30c7ef29809a8d2683a8d5574698b54120210ea3fc2d2fdc55a00193aeb1888452028a56c3c5199e1b8ec3ec7a73866560a18a8c8211
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe" caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 376 4876 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3236 schtasks.exe 1748 schtasks.exe 3252 schtasks.exe 3248 schtasks.exe 3240 schtasks.exe 3544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4876 wrote to memory of 4660 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 66 PID 4876 wrote to memory of 4660 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 66 PID 4876 wrote to memory of 4660 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 66 PID 4876 wrote to memory of 4740 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 67 PID 4876 wrote to memory of 4740 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 67 PID 4876 wrote to memory of 4740 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 67 PID 4876 wrote to memory of 4956 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 68 PID 4876 wrote to memory of 4956 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 68 PID 4876 wrote to memory of 4956 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 68 PID 4876 wrote to memory of 1424 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 74 PID 4876 wrote to memory of 1424 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 74 PID 4876 wrote to memory of 1424 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 74 PID 4876 wrote to memory of 3640 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 73 PID 4876 wrote to memory of 3640 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 73 PID 4876 wrote to memory of 3640 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 73 PID 4876 wrote to memory of 4284 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 69 PID 4876 wrote to memory of 4284 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 69 PID 4876 wrote to memory of 4284 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 69 PID 4876 wrote to memory of 4316 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 71 PID 4876 wrote to memory of 4316 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 71 PID 4876 wrote to memory of 4316 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 71 PID 4876 wrote to memory of 688 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 78 PID 4876 wrote to memory of 688 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 78 PID 4876 wrote to memory of 688 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 78 PID 4876 wrote to memory of 2312 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 76 PID 4876 wrote to memory of 2312 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 76 PID 4876 wrote to memory of 2312 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 76 PID 4876 wrote to memory of 4240 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 94 PID 4876 wrote to memory of 4240 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 94 PID 4876 wrote to memory of 4240 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 94 PID 4876 wrote to memory of 4988 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 80 PID 4876 wrote to memory of 4988 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 80 PID 4876 wrote to memory of 4988 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 80 PID 4876 wrote to memory of 1352 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 81 PID 4876 wrote to memory of 1352 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 81 PID 4876 wrote to memory of 1352 4876 caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe 81 PID 3640 wrote to memory of 3248 3640 cmd.exe 89 PID 3640 wrote to memory of 3248 3640 cmd.exe 89 PID 3640 wrote to memory of 3248 3640 cmd.exe 89 PID 4740 wrote to memory of 1748 4740 cmd.exe 87 PID 4740 wrote to memory of 1748 4740 cmd.exe 87 PID 4740 wrote to memory of 1748 4740 cmd.exe 87 PID 4660 wrote to memory of 3236 4660 cmd.exe 92 PID 4660 wrote to memory of 3236 4660 cmd.exe 92 PID 4660 wrote to memory of 3236 4660 cmd.exe 92 PID 4956 wrote to memory of 3544 4956 cmd.exe 91 PID 4956 wrote to memory of 3544 4956 cmd.exe 91 PID 4956 wrote to memory of 3544 4956 cmd.exe 91 PID 4284 wrote to memory of 3240 4284 cmd.exe 90 PID 4284 wrote to memory of 3240 4284 cmd.exe 90 PID 4284 wrote to memory of 3240 4284 cmd.exe 90 PID 1424 wrote to memory of 3252 1424 cmd.exe 88 PID 1424 wrote to memory of 3252 1424 cmd.exe 88 PID 1424 wrote to memory of 3252 1424 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"3⤵
- Creates scheduled task(s)
PID:3236
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"3⤵
- Creates scheduled task(s)
PID:1748
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"3⤵
- Creates scheduled task(s)
PID:3544
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"3⤵
- Creates scheduled task(s)
PID:3240
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"2⤵PID:4316
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"3⤵
- Creates scheduled task(s)
PID:3248
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"3⤵
- Creates scheduled task(s)
PID:3252
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3361" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"2⤵PID:2312
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"2⤵PID:688
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk530" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"2⤵PID:4988
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk412" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"2⤵PID:1352
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5785" /TR "C:\Users\Admin\AppData\Local\Temp\caf8533253e499824930f2d5468cbc3c6655fe646cbc2515ea26454dfb38d6e1.exe"2⤵PID:4240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 13882⤵
- Program crash
PID:376
-