Analysis
-
max time kernel
91s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2022 09:08
Static task
static1
Behavioral task
behavioral1
Sample
f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe
-
Size
932KB
-
MD5
7e516e9ae57e0af1a61b0b06d010e84a
-
SHA1
bf3b99c072ed170e62d8fd023a06d06d05b648ab
-
SHA256
f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082
-
SHA512
4d2d8aa9c09cbfa8bebf053ba650be0154f9c4d5924f334a2a3f9d568253dba7d6325ea4a878fcc40acfb3d51e94f135ee73b4584ca9bd58aa4c20a8a6c74ee3
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe" f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3428 2148 WerFault.exe 80 -
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3020 schtasks.exe 3148 schtasks.exe 1800 schtasks.exe 3700 schtasks.exe 3036 schtasks.exe 720 schtasks.exe 3852 schtasks.exe 3264 schtasks.exe 4168 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1692 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 81 PID 2148 wrote to memory of 1692 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 81 PID 2148 wrote to memory of 1692 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 81 PID 2148 wrote to memory of 4764 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 82 PID 2148 wrote to memory of 4764 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 82 PID 2148 wrote to memory of 4764 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 82 PID 2148 wrote to memory of 4964 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 105 PID 2148 wrote to memory of 4964 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 105 PID 2148 wrote to memory of 4964 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 105 PID 2148 wrote to memory of 4736 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 85 PID 2148 wrote to memory of 4736 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 85 PID 2148 wrote to memory of 4736 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 85 PID 2148 wrote to memory of 4636 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 86 PID 2148 wrote to memory of 4636 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 86 PID 2148 wrote to memory of 4636 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 86 PID 2148 wrote to memory of 1952 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 102 PID 2148 wrote to memory of 1952 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 102 PID 2148 wrote to memory of 1952 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 102 PID 2148 wrote to memory of 2676 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 87 PID 2148 wrote to memory of 2676 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 87 PID 2148 wrote to memory of 2676 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 87 PID 2148 wrote to memory of 2492 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 88 PID 2148 wrote to memory of 2492 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 88 PID 2148 wrote to memory of 2492 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 88 PID 2148 wrote to memory of 4972 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 99 PID 2148 wrote to memory of 4972 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 99 PID 2148 wrote to memory of 4972 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 99 PID 2148 wrote to memory of 596 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 98 PID 2148 wrote to memory of 596 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 98 PID 2148 wrote to memory of 596 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 98 PID 2148 wrote to memory of 4244 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 97 PID 2148 wrote to memory of 4244 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 97 PID 2148 wrote to memory of 4244 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 97 PID 2148 wrote to memory of 1892 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 93 PID 2148 wrote to memory of 1892 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 93 PID 2148 wrote to memory of 1892 2148 f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe 93 PID 1692 wrote to memory of 3264 1692 cmd.exe 96 PID 1692 wrote to memory of 3264 1692 cmd.exe 96 PID 1692 wrote to memory of 3264 1692 cmd.exe 96 PID 4764 wrote to memory of 4168 4764 cmd.exe 107 PID 4764 wrote to memory of 4168 4764 cmd.exe 107 PID 4764 wrote to memory of 4168 4764 cmd.exe 107 PID 4964 wrote to memory of 3700 4964 cmd.exe 106 PID 4964 wrote to memory of 3700 4964 cmd.exe 106 PID 4964 wrote to memory of 3700 4964 cmd.exe 106 PID 4736 wrote to memory of 3036 4736 cmd.exe 108 PID 4736 wrote to memory of 3036 4736 cmd.exe 108 PID 4736 wrote to memory of 3036 4736 cmd.exe 108 PID 4636 wrote to memory of 720 4636 cmd.exe 109 PID 4636 wrote to memory of 720 4636 cmd.exe 109 PID 4636 wrote to memory of 720 4636 cmd.exe 109 PID 2492 wrote to memory of 3852 2492 cmd.exe 110 PID 2492 wrote to memory of 3852 2492 cmd.exe 110 PID 2492 wrote to memory of 3852 2492 cmd.exe 110 PID 2676 wrote to memory of 3148 2676 cmd.exe 112 PID 2676 wrote to memory of 3148 2676 cmd.exe 112 PID 2676 wrote to memory of 3148 2676 cmd.exe 112 PID 4972 wrote to memory of 3020 4972 cmd.exe 111 PID 4972 wrote to memory of 3020 4972 cmd.exe 111 PID 4972 wrote to memory of 3020 4972 cmd.exe 111 PID 596 wrote to memory of 1800 596 cmd.exe 113 PID 596 wrote to memory of 1800 596 cmd.exe 113 PID 596 wrote to memory of 1800 596 cmd.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"3⤵
- Creates scheduled task(s)
PID:3264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"3⤵
- Creates scheduled task(s)
PID:4168
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"3⤵
- Creates scheduled task(s)
PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"3⤵
- Creates scheduled task(s)
PID:720
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"3⤵
- Creates scheduled task(s)
PID:3148
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"3⤵
- Creates scheduled task(s)
PID:3852
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2731" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"2⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4224" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"2⤵PID:4244
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3280" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3280" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"3⤵
- Creates scheduled task(s)
PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk9529" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk9529" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"3⤵
- Creates scheduled task(s)
PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"2⤵PID:1952
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\f997d0fd949f221a49d49286130787994f7cc08e624fe2ab010aded27e05c082.exe"3⤵
- Creates scheduled task(s)
PID:3700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 10522⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2148 -ip 21481⤵PID:4920