Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
28-09-2022 11:05
Static task
static1
Behavioral task
behavioral1
Sample
4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe
Resource
win10-20220812-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe
-
Size
932KB
-
MD5
51a4bb3d2d46fb7cc56d76770e8ad3c0
-
SHA1
66fcb70c7f5da52ebd958318fab2e128273c7197
-
SHA256
4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647
-
SHA512
e134f3a1b63355308dd50eb151a425106ea5382e35464e5ea27c7eeb94d1df5bd2b16c1127841bbdc66915b213958f2b5829994340732f57f2e5753b90e644a4
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe" 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1744 1756 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5032 schtasks.exe 4540 schtasks.exe 4292 schtasks.exe 3808 schtasks.exe 5008 schtasks.exe 4592 schtasks.exe 5040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1756 wrote to memory of 5104 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 66 PID 1756 wrote to memory of 5104 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 66 PID 1756 wrote to memory of 5104 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 66 PID 1756 wrote to memory of 4156 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 91 PID 1756 wrote to memory of 4156 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 91 PID 1756 wrote to memory of 4156 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 91 PID 1756 wrote to memory of 4280 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 67 PID 1756 wrote to memory of 4280 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 67 PID 1756 wrote to memory of 4280 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 67 PID 1756 wrote to memory of 3956 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 90 PID 1756 wrote to memory of 3956 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 90 PID 1756 wrote to memory of 3956 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 90 PID 1756 wrote to memory of 936 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 68 PID 1756 wrote to memory of 936 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 68 PID 1756 wrote to memory of 936 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 68 PID 1756 wrote to memory of 1984 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 89 PID 1756 wrote to memory of 1984 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 89 PID 1756 wrote to memory of 1984 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 89 PID 1756 wrote to memory of 1888 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 87 PID 1756 wrote to memory of 1888 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 87 PID 1756 wrote to memory of 1888 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 87 PID 1756 wrote to memory of 4340 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 84 PID 1756 wrote to memory of 4340 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 84 PID 1756 wrote to memory of 4340 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 84 PID 1756 wrote to memory of 3988 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 69 PID 1756 wrote to memory of 3988 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 69 PID 1756 wrote to memory of 3988 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 69 PID 1756 wrote to memory of 2236 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 70 PID 1756 wrote to memory of 2236 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 70 PID 1756 wrote to memory of 2236 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 70 PID 1756 wrote to memory of 3420 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 71 PID 1756 wrote to memory of 3420 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 71 PID 1756 wrote to memory of 3420 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 71 PID 1756 wrote to memory of 3508 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 72 PID 1756 wrote to memory of 3508 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 72 PID 1756 wrote to memory of 3508 1756 4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe 72 PID 3956 wrote to memory of 4540 3956 cmd.exe 79 PID 3956 wrote to memory of 4540 3956 cmd.exe 79 PID 3956 wrote to memory of 4540 3956 cmd.exe 79 PID 4280 wrote to memory of 3808 4280 cmd.exe 81 PID 4280 wrote to memory of 3808 4280 cmd.exe 81 PID 4280 wrote to memory of 3808 4280 cmd.exe 81 PID 4156 wrote to memory of 4292 4156 cmd.exe 80 PID 4156 wrote to memory of 4292 4156 cmd.exe 80 PID 4156 wrote to memory of 4292 4156 cmd.exe 80 PID 1888 wrote to memory of 4592 1888 cmd.exe 93 PID 1888 wrote to memory of 4592 1888 cmd.exe 93 PID 1888 wrote to memory of 4592 1888 cmd.exe 93 PID 4340 wrote to memory of 5008 4340 cmd.exe 92 PID 4340 wrote to memory of 5008 4340 cmd.exe 92 PID 4340 wrote to memory of 5008 4340 cmd.exe 92 PID 3988 wrote to memory of 5040 3988 cmd.exe 94 PID 3988 wrote to memory of 5040 3988 cmd.exe 94 PID 3988 wrote to memory of 5040 3988 cmd.exe 94 PID 2236 wrote to memory of 5032 2236 cmd.exe 95 PID 2236 wrote to memory of 5032 2236 cmd.exe 95 PID 2236 wrote to memory of 5032 2236 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"2⤵PID:5104
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"3⤵
- Creates scheduled task(s)
PID:3808
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"2⤵PID:936
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7009" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7009" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"3⤵
- Creates scheduled task(s)
PID:5040
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk402" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk402" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"3⤵
- Creates scheduled task(s)
PID:5032
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9522" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"2⤵PID:3420
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8901" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"2⤵PID:3508
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"3⤵
- Creates scheduled task(s)
PID:5008
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"3⤵
- Creates scheduled task(s)
PID:4592
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"2⤵PID:1984
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3956
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 13202⤵
- Program crash
PID:1744
-
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"1⤵
- Creates scheduled task(s)
PID:4540
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\4b4411ef7ad56b5dd1e8f44c03d56b2cd1b81b45928f14a04a9ce84c69d8d647.exe"1⤵
- Creates scheduled task(s)
PID:4292