Analysis
-
max time kernel
52s -
max time network
117s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
03/10/2022, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe
Resource
win10-20220901-en
6 signatures
150 seconds
General
-
Target
66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe
-
Size
946KB
-
MD5
1f1e106345ff2a55e372111fc578a594
-
SHA1
24d86e53a79562ffd292e299ab0381927d09503c
-
SHA256
66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c
-
SHA512
dbca84886120358a46cc035397a3823c84b03550c11e0e783e83fa3240523aa2d14dafc24c5becda7f3b430e7b6171d8baeb68005b747733214c845908142e38
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe" 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1240 4744 WerFault.exe 66 -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3252 schtasks.exe 3076 schtasks.exe 4800 schtasks.exe 4676 schtasks.exe 4828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 4744 wrote to memory of 3040 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 67 PID 4744 wrote to memory of 3040 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 67 PID 4744 wrote to memory of 3040 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 67 PID 4744 wrote to memory of 4324 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 68 PID 4744 wrote to memory of 4324 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 68 PID 4744 wrote to memory of 4324 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 68 PID 4744 wrote to memory of 3356 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 69 PID 4744 wrote to memory of 3356 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 69 PID 4744 wrote to memory of 3356 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 69 PID 4744 wrote to memory of 4316 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 70 PID 4744 wrote to memory of 4316 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 70 PID 4744 wrote to memory of 4316 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 70 PID 4744 wrote to memory of 4988 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 92 PID 4744 wrote to memory of 4988 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 92 PID 4744 wrote to memory of 4988 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 92 PID 4744 wrote to memory of 5016 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 91 PID 4744 wrote to memory of 5016 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 91 PID 4744 wrote to memory of 5016 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 91 PID 4744 wrote to memory of 1340 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 90 PID 4744 wrote to memory of 1340 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 90 PID 4744 wrote to memory of 1340 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 90 PID 4744 wrote to memory of 2272 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 88 PID 4744 wrote to memory of 2272 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 88 PID 4744 wrote to memory of 2272 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 88 PID 4744 wrote to memory of 3436 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 87 PID 4744 wrote to memory of 3436 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 87 PID 4744 wrote to memory of 3436 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 87 PID 4744 wrote to memory of 784 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 73 PID 4744 wrote to memory of 784 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 73 PID 4744 wrote to memory of 784 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 73 PID 4744 wrote to memory of 4260 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 84 PID 4744 wrote to memory of 4260 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 84 PID 4744 wrote to memory of 4260 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 84 PID 4744 wrote to memory of 4496 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 79 PID 4744 wrote to memory of 4496 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 79 PID 4744 wrote to memory of 4496 4744 66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe 79 PID 3356 wrote to memory of 3252 3356 cmd.exe 81 PID 3356 wrote to memory of 3252 3356 cmd.exe 81 PID 3356 wrote to memory of 3252 3356 cmd.exe 81 PID 2272 wrote to memory of 3076 2272 cmd.exe 82 PID 2272 wrote to memory of 3076 2272 cmd.exe 82 PID 2272 wrote to memory of 3076 2272 cmd.exe 82 PID 3040 wrote to memory of 4800 3040 cmd.exe 83 PID 3040 wrote to memory of 4800 3040 cmd.exe 83 PID 3040 wrote to memory of 4800 3040 cmd.exe 83 PID 5016 wrote to memory of 4676 5016 cmd.exe 93 PID 5016 wrote to memory of 4676 5016 cmd.exe 93 PID 5016 wrote to memory of 4676 5016 cmd.exe 93 PID 3436 wrote to memory of 4828 3436 cmd.exe 94 PID 3436 wrote to memory of 4828 3436 cmd.exe 94 PID 3436 wrote to memory of 4828 3436 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"3⤵
- Creates scheduled task(s)
PID:4800
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"2⤵PID:4324
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"3⤵
- Creates scheduled task(s)
PID:3252
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"2⤵PID:4316
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk1773" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"2⤵PID:784
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8264" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"2⤵PID:4496
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1824" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"2⤵PID:4260
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4331" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4331" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"3⤵
- Creates scheduled task(s)
PID:4828
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2272
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"2⤵PID:1340
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"3⤵
- Creates scheduled task(s)
PID:4676
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"2⤵PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 13642⤵
- Program crash
PID:1240
-
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\66c28aaad971027042eb30cc00086b42193c397ba843454a38f5e1bbc2fb4b1c.exe"1⤵
- Creates scheduled task(s)
PID:3076