Analysis
-
max time kernel
54s -
max time network
117s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30-09-2022 23:16
Static task
static1
Behavioral task
behavioral1
Sample
aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe
Resource
win10-20220812-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe
-
Size
939KB
-
MD5
bbeacdba8d763499cbfee781db9ec22c
-
SHA1
464f7119c778aeca2066e2385e8aa68b0e6e36d4
-
SHA256
aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224
-
SHA512
d581f30114936460700f6036b7f8d3294a8dba995337e75611aae3dca7368bd630d475f66374207aa0b1a36488ebb494ce116d377439806b797756e1ee60775e
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe" aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 208 2208 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4168 schtasks.exe 4180 schtasks.exe 4236 schtasks.exe 3716 schtasks.exe 4604 schtasks.exe 4544 schtasks.exe 4508 schtasks.exe 3260 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2208 wrote to memory of 5072 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 66 PID 2208 wrote to memory of 5072 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 66 PID 2208 wrote to memory of 5072 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 66 PID 2208 wrote to memory of 5080 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 67 PID 2208 wrote to memory of 5080 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 67 PID 2208 wrote to memory of 5080 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 67 PID 2208 wrote to memory of 4228 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 68 PID 2208 wrote to memory of 4228 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 68 PID 2208 wrote to memory of 4228 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 68 PID 2208 wrote to memory of 2056 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 69 PID 2208 wrote to memory of 2056 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 69 PID 2208 wrote to memory of 2056 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 69 PID 2208 wrote to memory of 2500 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 88 PID 2208 wrote to memory of 2500 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 88 PID 2208 wrote to memory of 2500 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 88 PID 2208 wrote to memory of 3160 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 87 PID 2208 wrote to memory of 3160 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 87 PID 2208 wrote to memory of 3160 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 87 PID 2208 wrote to memory of 3336 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 85 PID 2208 wrote to memory of 3336 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 85 PID 2208 wrote to memory of 3336 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 85 PID 2208 wrote to memory of 2220 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 70 PID 2208 wrote to memory of 2220 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 70 PID 2208 wrote to memory of 2220 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 70 PID 2208 wrote to memory of 3824 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 82 PID 2208 wrote to memory of 3824 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 82 PID 2208 wrote to memory of 3824 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 82 PID 2208 wrote to memory of 4120 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 80 PID 2208 wrote to memory of 4120 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 80 PID 2208 wrote to memory of 4120 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 80 PID 2208 wrote to memory of 1364 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 72 PID 2208 wrote to memory of 1364 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 72 PID 2208 wrote to memory of 1364 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 72 PID 2208 wrote to memory of 4616 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 74 PID 2208 wrote to memory of 4616 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 74 PID 2208 wrote to memory of 4616 2208 aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe 74 PID 2056 wrote to memory of 3260 2056 cmd.exe 96 PID 2056 wrote to memory of 3260 2056 cmd.exe 96 PID 2056 wrote to memory of 3260 2056 cmd.exe 96 PID 2500 wrote to memory of 4508 2500 cmd.exe 95 PID 2500 wrote to memory of 4508 2500 cmd.exe 95 PID 2500 wrote to memory of 4508 2500 cmd.exe 95 PID 3160 wrote to memory of 4544 3160 cmd.exe 94 PID 3160 wrote to memory of 4544 3160 cmd.exe 94 PID 3160 wrote to memory of 4544 3160 cmd.exe 94 PID 5072 wrote to memory of 4604 5072 cmd.exe 93 PID 5072 wrote to memory of 4604 5072 cmd.exe 93 PID 5072 wrote to memory of 4604 5072 cmd.exe 93 PID 2220 wrote to memory of 3716 2220 cmd.exe 92 PID 2220 wrote to memory of 3716 2220 cmd.exe 92 PID 2220 wrote to memory of 3716 2220 cmd.exe 92 PID 4616 wrote to memory of 4236 4616 cmd.exe 91 PID 4616 wrote to memory of 4236 4616 cmd.exe 91 PID 4616 wrote to memory of 4236 4616 cmd.exe 91 PID 4228 wrote to memory of 4180 4228 cmd.exe 90 PID 4228 wrote to memory of 4180 4228 cmd.exe 90 PID 4228 wrote to memory of 4180 4228 cmd.exe 90 PID 3824 wrote to memory of 4168 3824 cmd.exe 89 PID 3824 wrote to memory of 4168 3824 cmd.exe 89 PID 3824 wrote to memory of 4168 3824 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"3⤵
- Creates scheduled task(s)
PID:4604
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"2⤵PID:5080
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"3⤵
- Creates scheduled task(s)
PID:4180
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"3⤵
- Creates scheduled task(s)
PID:3260
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"3⤵
- Creates scheduled task(s)
PID:3716
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3872" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"2⤵PID:1364
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5427" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5427" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"3⤵
- Creates scheduled task(s)
PID:4236
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk201" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"2⤵PID:4120
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5541" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5541" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"3⤵
- Creates scheduled task(s)
PID:4168
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"2⤵PID:3336
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"3⤵
- Creates scheduled task(s)
PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"3⤵
- Creates scheduled task(s)
PID:4508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 13802⤵
- Program crash
PID:208
-