Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
04/10/2022, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe
Resource
win10-20220901-en
6 signatures
150 seconds
General
-
Target
33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe
-
Size
949KB
-
MD5
aa54103b3b7aa1f2537ff97c331cf8bf
-
SHA1
84b93b3a06072883dd0dcc06731eaf9046bfa403
-
SHA256
33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58
-
SHA512
822fece46dc9536076f1597fbbbb61a27fd48c4775a5a7de25298c2276b55f683ebfe1903f3ba5e488503d4b87de09fd16921b1f771b49d84857be98de2b8f4d
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe" 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1528 3500 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4168 schtasks.exe 4524 schtasks.exe 4560 schtasks.exe 4160 schtasks.exe 4772 schtasks.exe 4816 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3500 wrote to memory of 440 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 66 PID 3500 wrote to memory of 440 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 66 PID 3500 wrote to memory of 440 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 66 PID 3500 wrote to memory of 704 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 67 PID 3500 wrote to memory of 704 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 67 PID 3500 wrote to memory of 704 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 67 PID 3500 wrote to memory of 4080 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 69 PID 3500 wrote to memory of 4080 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 69 PID 3500 wrote to memory of 4080 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 69 PID 3500 wrote to memory of 1940 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 68 PID 3500 wrote to memory of 1940 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 68 PID 3500 wrote to memory of 1940 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 68 PID 3500 wrote to memory of 3484 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 80 PID 3500 wrote to memory of 3484 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 80 PID 3500 wrote to memory of 3484 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 80 PID 3500 wrote to memory of 4368 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 78 PID 3500 wrote to memory of 4368 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 78 PID 3500 wrote to memory of 4368 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 78 PID 3500 wrote to memory of 4588 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 76 PID 3500 wrote to memory of 4588 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 76 PID 3500 wrote to memory of 4588 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 76 PID 3500 wrote to memory of 5044 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 75 PID 3500 wrote to memory of 5044 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 75 PID 3500 wrote to memory of 5044 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 75 PID 3500 wrote to memory of 1184 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 70 PID 3500 wrote to memory of 1184 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 70 PID 3500 wrote to memory of 1184 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 70 PID 3500 wrote to memory of 4628 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 71 PID 3500 wrote to memory of 4628 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 71 PID 3500 wrote to memory of 4628 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 71 PID 3500 wrote to memory of 4748 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 81 PID 3500 wrote to memory of 4748 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 81 PID 3500 wrote to memory of 4748 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 81 PID 3500 wrote to memory of 5092 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 83 PID 3500 wrote to memory of 5092 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 83 PID 3500 wrote to memory of 5092 3500 33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe 83 PID 704 wrote to memory of 4160 704 cmd.exe 93 PID 704 wrote to memory of 4160 704 cmd.exe 93 PID 704 wrote to memory of 4160 704 cmd.exe 93 PID 4368 wrote to memory of 4168 4368 cmd.exe 90 PID 4368 wrote to memory of 4168 4368 cmd.exe 90 PID 4368 wrote to memory of 4168 4368 cmd.exe 90 PID 4080 wrote to memory of 4560 4080 cmd.exe 92 PID 4080 wrote to memory of 4560 4080 cmd.exe 92 PID 4080 wrote to memory of 4560 4080 cmd.exe 92 PID 440 wrote to memory of 4524 440 cmd.exe 91 PID 440 wrote to memory of 4524 440 cmd.exe 91 PID 440 wrote to memory of 4524 440 cmd.exe 91 PID 3484 wrote to memory of 4772 3484 cmd.exe 94 PID 3484 wrote to memory of 4772 3484 cmd.exe 94 PID 3484 wrote to memory of 4772 3484 cmd.exe 94 PID 1184 wrote to memory of 4816 1184 cmd.exe 95 PID 1184 wrote to memory of 4816 1184 cmd.exe 95 PID 1184 wrote to memory of 4816 1184 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"3⤵
- Creates scheduled task(s)
PID:4524
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"3⤵
- Creates scheduled task(s)
PID:4160
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"2⤵PID:1940
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"3⤵
- Creates scheduled task(s)
PID:4560
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3207" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3207" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"3⤵
- Creates scheduled task(s)
PID:4816
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk2441" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"2⤵PID:4628
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"2⤵PID:5044
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"2⤵PID:4588
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"3⤵
- Creates scheduled task(s)
PID:4168
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"3⤵
- Creates scheduled task(s)
PID:4772
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1521" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"2⤵PID:4748
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3107" /TR "C:\Users\Admin\AppData\Local\Temp\33b386a60b7d2079b9a31b3122433057f49604275762685af4e0b2bdd095fe58.exe"2⤵PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 13202⤵
- Program crash
PID:1528
-