Analysis
-
max time kernel
92s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2022 14:14
Static task
static1
Behavioral task
behavioral1
Sample
8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe
-
Size
954KB
-
MD5
6f4ed54e31dfe16d0c858143c375a71a
-
SHA1
c09b8d2b3b28093487dd2f55704c88a14b3582b2
-
SHA256
8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f
-
SHA512
ff3998d72809222f1360ddb739052dc040bbb80ab75f466c2cea5e56cb510e9543ecad69f389fa5f602743a7f4a9e4a70b84fc287e60e329e461af06d8a1e690
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe" 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3108 4912 WerFault.exe 80 -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4468 schtasks.exe 1184 schtasks.exe 4092 schtasks.exe 916 schtasks.exe 4936 schtasks.exe 4760 schtasks.exe 1780 schtasks.exe 3996 schtasks.exe 5116 schtasks.exe 1332 schtasks.exe 3740 schtasks.exe 1272 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 1240 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 81 PID 4912 wrote to memory of 1240 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 81 PID 4912 wrote to memory of 1240 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 81 PID 4912 wrote to memory of 3248 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 82 PID 4912 wrote to memory of 3248 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 82 PID 4912 wrote to memory of 3248 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 82 PID 4912 wrote to memory of 4436 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 88 PID 4912 wrote to memory of 4436 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 88 PID 4912 wrote to memory of 4436 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 88 PID 4912 wrote to memory of 1124 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 84 PID 4912 wrote to memory of 1124 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 84 PID 4912 wrote to memory of 1124 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 84 PID 4912 wrote to memory of 2236 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 85 PID 4912 wrote to memory of 2236 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 85 PID 4912 wrote to memory of 2236 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 85 PID 4912 wrote to memory of 3220 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 105 PID 4912 wrote to memory of 3220 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 105 PID 4912 wrote to memory of 3220 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 105 PID 4912 wrote to memory of 3320 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 92 PID 4912 wrote to memory of 3320 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 92 PID 4912 wrote to memory of 3320 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 92 PID 4912 wrote to memory of 4904 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 104 PID 4912 wrote to memory of 4904 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 104 PID 4912 wrote to memory of 4904 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 104 PID 1240 wrote to memory of 1184 1240 cmd.exe 103 PID 1240 wrote to memory of 1184 1240 cmd.exe 103 PID 1240 wrote to memory of 1184 1240 cmd.exe 103 PID 4912 wrote to memory of 3820 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 94 PID 4912 wrote to memory of 3820 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 94 PID 4912 wrote to memory of 3820 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 94 PID 4912 wrote to memory of 5040 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 95 PID 4912 wrote to memory of 5040 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 95 PID 4912 wrote to memory of 5040 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 95 PID 4912 wrote to memory of 2116 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 96 PID 4912 wrote to memory of 2116 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 96 PID 4912 wrote to memory of 2116 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 96 PID 4912 wrote to memory of 3656 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 97 PID 4912 wrote to memory of 3656 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 97 PID 4912 wrote to memory of 3656 4912 8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe 97 PID 4436 wrote to memory of 916 4436 cmd.exe 107 PID 4436 wrote to memory of 916 4436 cmd.exe 107 PID 4436 wrote to memory of 916 4436 cmd.exe 107 PID 3248 wrote to memory of 4092 3248 cmd.exe 106 PID 3248 wrote to memory of 4092 3248 cmd.exe 106 PID 3248 wrote to memory of 4092 3248 cmd.exe 106 PID 5040 wrote to memory of 4468 5040 cmd.exe 111 PID 5040 wrote to memory of 4468 5040 cmd.exe 111 PID 5040 wrote to memory of 4468 5040 cmd.exe 111 PID 2236 wrote to memory of 1332 2236 cmd.exe 109 PID 2236 wrote to memory of 1332 2236 cmd.exe 109 PID 2236 wrote to memory of 1332 2236 cmd.exe 109 PID 1124 wrote to memory of 4936 1124 cmd.exe 110 PID 1124 wrote to memory of 4936 1124 cmd.exe 110 PID 1124 wrote to memory of 4936 1124 cmd.exe 110 PID 3220 wrote to memory of 5116 3220 cmd.exe 108 PID 3220 wrote to memory of 5116 3220 cmd.exe 108 PID 3220 wrote to memory of 5116 3220 cmd.exe 108 PID 3820 wrote to memory of 1272 3820 cmd.exe 113 PID 3820 wrote to memory of 1272 3820 cmd.exe 113 PID 3820 wrote to memory of 1272 3820 cmd.exe 113 PID 2116 wrote to memory of 3740 2116 cmd.exe 112 PID 2116 wrote to memory of 3740 2116 cmd.exe 112 PID 2116 wrote to memory of 3740 2116 cmd.exe 112 PID 4904 wrote to memory of 1780 4904 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"3⤵
- Creates scheduled task(s)
PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"3⤵
- Creates scheduled task(s)
PID:4092
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"3⤵
- Creates scheduled task(s)
PID:4936
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"3⤵
- Creates scheduled task(s)
PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"3⤵
- Creates scheduled task(s)
PID:916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"2⤵PID:3320
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"3⤵
- Creates scheduled task(s)
PID:4760
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2649" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2649" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"3⤵
- Creates scheduled task(s)
PID:1272
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7089" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7089" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"3⤵
- Creates scheduled task(s)
PID:4468
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4469" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4469" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"3⤵
- Creates scheduled task(s)
PID:3740
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8577" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"2⤵PID:3656
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8577" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"3⤵
- Creates scheduled task(s)
PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"3⤵
- Creates scheduled task(s)
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\8f8ae4a156a1afd65030a9a88c11f333337a03bb3b1b1ca3b8d550aeeb7b054f.exe"3⤵
- Creates scheduled task(s)
PID:5116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 10402⤵
- Program crash
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4912 -ip 49121⤵PID:308