Analysis
-
max time kernel
55s -
max time network
119s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-10-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe
Resource
win10-20220812-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe
-
Size
953KB
-
MD5
e1d9d1bf8730046d3a75b4cc2bb3a1be
-
SHA1
ac3d8dc31c5ed5cb5fcd4560660637983f134e0b
-
SHA256
2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a
-
SHA512
1536f3eaa92eeaeb104a97e9fcfb2da033bea161d053352c7020bb05aea8cee7396ee342d09e394653fb738852857776d4a568b7807cd93b97f9f820641dd1b1
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe" 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3320 2340 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4240 schtasks.exe 4236 schtasks.exe 3412 schtasks.exe 3716 schtasks.exe 3680 schtasks.exe 3256 schtasks.exe 4160 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2340 wrote to memory of 5020 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 66 PID 2340 wrote to memory of 5020 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 66 PID 2340 wrote to memory of 5020 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 66 PID 2340 wrote to memory of 5076 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 67 PID 2340 wrote to memory of 5076 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 67 PID 2340 wrote to memory of 5076 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 67 PID 2340 wrote to memory of 3780 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 68 PID 2340 wrote to memory of 3780 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 68 PID 2340 wrote to memory of 3780 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 68 PID 2340 wrote to memory of 1936 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 69 PID 2340 wrote to memory of 1936 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 69 PID 2340 wrote to memory of 1936 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 69 PID 2340 wrote to memory of 3444 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 81 PID 2340 wrote to memory of 3444 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 81 PID 2340 wrote to memory of 3444 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 81 PID 2340 wrote to memory of 4480 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 80 PID 2340 wrote to memory of 4480 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 80 PID 2340 wrote to memory of 4480 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 80 PID 2340 wrote to memory of 3508 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 78 PID 2340 wrote to memory of 3508 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 78 PID 2340 wrote to memory of 3508 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 78 PID 2340 wrote to memory of 1984 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 76 PID 2340 wrote to memory of 1984 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 76 PID 2340 wrote to memory of 1984 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 76 PID 2340 wrote to memory of 2704 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 75 PID 2340 wrote to memory of 2704 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 75 PID 2340 wrote to memory of 2704 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 75 PID 2340 wrote to memory of 3332 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 72 PID 2340 wrote to memory of 3332 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 72 PID 2340 wrote to memory of 3332 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 72 PID 2340 wrote to memory of 1512 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 73 PID 2340 wrote to memory of 1512 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 73 PID 2340 wrote to memory of 1512 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 73 PID 2340 wrote to memory of 4600 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 82 PID 2340 wrote to memory of 4600 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 82 PID 2340 wrote to memory of 4600 2340 2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe 82 PID 1512 wrote to memory of 4236 1512 cmd.exe 92 PID 4480 wrote to memory of 3716 4480 cmd.exe 94 PID 1512 wrote to memory of 4236 1512 cmd.exe 92 PID 1512 wrote to memory of 4236 1512 cmd.exe 92 PID 4480 wrote to memory of 3716 4480 cmd.exe 94 PID 4480 wrote to memory of 3716 4480 cmd.exe 94 PID 3444 wrote to memory of 3680 3444 cmd.exe 95 PID 3444 wrote to memory of 3680 3444 cmd.exe 95 PID 3444 wrote to memory of 3680 3444 cmd.exe 95 PID 1984 wrote to memory of 3412 1984 cmd.exe 93 PID 1984 wrote to memory of 3412 1984 cmd.exe 93 PID 1984 wrote to memory of 3412 1984 cmd.exe 93 PID 2704 wrote to memory of 4160 2704 cmd.exe 90 PID 2704 wrote to memory of 4160 2704 cmd.exe 90 PID 2704 wrote to memory of 4160 2704 cmd.exe 90 PID 3780 wrote to memory of 4240 3780 cmd.exe 91 PID 3780 wrote to memory of 4240 3780 cmd.exe 91 PID 3780 wrote to memory of 4240 3780 cmd.exe 91 PID 4600 wrote to memory of 3256 4600 cmd.exe 96 PID 4600 wrote to memory of 3256 4600 cmd.exe 96 PID 4600 wrote to memory of 3256 4600 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"2⤵PID:5020
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"2⤵PID:5076
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"3⤵
- Creates scheduled task(s)
PID:4240
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"2⤵PID:1936
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7907" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"2⤵PID:3332
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6221" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6221" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"3⤵
- Creates scheduled task(s)
PID:4236
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3840" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3840" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"3⤵
- Creates scheduled task(s)
PID:4160
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"3⤵
- Creates scheduled task(s)
PID:3412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"2⤵PID:3508
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"3⤵
- Creates scheduled task(s)
PID:3716
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"3⤵
- Creates scheduled task(s)
PID:3680
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9180" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9180" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"3⤵
- Creates scheduled task(s)
PID:3256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 13202⤵
- Program crash
PID:3320
-