Analysis
-
max time kernel
54s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30-09-2022 20:22
Static task
static1
Behavioral task
behavioral1
Sample
c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe
Resource
win10-20220812-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe
-
Size
939KB
-
MD5
674ff95910d6eef6789de6ff1755a701
-
SHA1
4c689eb0a1c9c2ee0edcddba9bb444d191cc143d
-
SHA256
c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece
-
SHA512
587d826bef85de570dc2959cb3b00b9323a20290b7059e8ea6644748528f4c1caf87ca5bca8d39d3bb0d2ca88cffb30dad27c4266ef99e8f9099dbb5546d9991
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe" c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1636 3528 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3164 schtasks.exe 692 schtasks.exe 3020 schtasks.exe 4244 schtasks.exe 3180 schtasks.exe 3248 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3528 wrote to memory of 4816 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 66 PID 3528 wrote to memory of 4816 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 66 PID 3528 wrote to memory of 4816 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 66 PID 3528 wrote to memory of 4852 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 67 PID 3528 wrote to memory of 4852 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 67 PID 3528 wrote to memory of 4852 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 67 PID 3528 wrote to memory of 4888 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 68 PID 3528 wrote to memory of 4888 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 68 PID 3528 wrote to memory of 4888 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 68 PID 3528 wrote to memory of 4904 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 69 PID 3528 wrote to memory of 4904 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 69 PID 3528 wrote to memory of 4904 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 69 PID 3528 wrote to memory of 4312 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 70 PID 3528 wrote to memory of 4312 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 70 PID 3528 wrote to memory of 4312 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 70 PID 3528 wrote to memory of 4320 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 94 PID 3528 wrote to memory of 4320 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 94 PID 3528 wrote to memory of 4320 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 94 PID 3528 wrote to memory of 1112 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 92 PID 3528 wrote to memory of 1112 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 92 PID 3528 wrote to memory of 1112 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 92 PID 3528 wrote to memory of 5048 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 90 PID 3528 wrote to memory of 5048 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 90 PID 3528 wrote to memory of 5048 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 90 PID 3528 wrote to memory of 1176 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 72 PID 3528 wrote to memory of 1176 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 72 PID 3528 wrote to memory of 1176 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 72 PID 3528 wrote to memory of 4080 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 73 PID 3528 wrote to memory of 4080 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 73 PID 3528 wrote to memory of 4080 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 73 PID 3528 wrote to memory of 4932 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 74 PID 3528 wrote to memory of 4932 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 74 PID 3528 wrote to memory of 4932 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 74 PID 3528 wrote to memory of 4304 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 75 PID 3528 wrote to memory of 4304 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 75 PID 3528 wrote to memory of 4304 3528 c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe 75 PID 4816 wrote to memory of 3020 4816 cmd.exe 87 PID 4816 wrote to memory of 3020 4816 cmd.exe 87 PID 4816 wrote to memory of 3020 4816 cmd.exe 87 PID 5048 wrote to memory of 692 5048 cmd.exe 86 PID 5048 wrote to memory of 692 5048 cmd.exe 86 PID 5048 wrote to memory of 692 5048 cmd.exe 86 PID 1112 wrote to memory of 3164 1112 cmd.exe 85 PID 1112 wrote to memory of 3164 1112 cmd.exe 85 PID 1112 wrote to memory of 3164 1112 cmd.exe 85 PID 4852 wrote to memory of 3180 4852 cmd.exe 83 PID 4852 wrote to memory of 3180 4852 cmd.exe 83 PID 4852 wrote to memory of 3180 4852 cmd.exe 83 PID 4888 wrote to memory of 3248 4888 cmd.exe 84 PID 4888 wrote to memory of 3248 4888 cmd.exe 84 PID 4888 wrote to memory of 3248 4888 cmd.exe 84 PID 4932 wrote to memory of 4244 4932 cmd.exe 95 PID 4932 wrote to memory of 4244 4932 cmd.exe 95 PID 4932 wrote to memory of 4244 4932 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"3⤵
- Creates scheduled task(s)
PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"3⤵
- Creates scheduled task(s)
PID:3180
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"3⤵
- Creates scheduled task(s)
PID:3248
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"2⤵PID:4904
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"2⤵PID:4312
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7828" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"2⤵PID:1176
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk985" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"2⤵PID:4080
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6573" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6573" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"3⤵
- Creates scheduled task(s)
PID:4244
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6484" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"2⤵PID:4304
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5048
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1112
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"2⤵PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3528 -s 13962⤵
- Program crash
PID:1636
-
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"1⤵
- Creates scheduled task(s)
PID:3164
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\c72b7cc903a5e8f1a7de7e839fa37e6fcd2b2c7fcce5b8e3bbdbb8c09345cece.exe"1⤵
- Creates scheduled task(s)
PID:692