Analysis
-
max time kernel
55s -
max time network
118s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06/10/2022, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe
-
Size
954KB
-
MD5
91b23564bcec90fceb6bb4c1cf656d50
-
SHA1
55b2cf2a35afb63173f18c2eda82df16219e238d
-
SHA256
f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b
-
SHA512
e0e4657d878a122ab59a71b2c5a8422759b842e7e5574ec1e5ca4559914a4671822e243f1951be6bdfd5c9fccb23677e2aad9a5b5d86ce5c371482028155c332
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe" f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1228 2584 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4464 schtasks.exe 2232 schtasks.exe 2268 schtasks.exe 4940 schtasks.exe 3220 schtasks.exe 4604 schtasks.exe 4860 schtasks.exe 3208 schtasks.exe 4480 schtasks.exe 4820 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 1976 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 66 PID 2584 wrote to memory of 1976 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 66 PID 2584 wrote to memory of 1976 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 66 PID 2584 wrote to memory of 60 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 67 PID 2584 wrote to memory of 60 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 67 PID 2584 wrote to memory of 60 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 67 PID 2584 wrote to memory of 2092 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 68 PID 2584 wrote to memory of 2092 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 68 PID 2584 wrote to memory of 2092 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 68 PID 2584 wrote to memory of 4808 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 89 PID 2584 wrote to memory of 4808 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 89 PID 2584 wrote to memory of 4808 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 89 PID 2584 wrote to memory of 392 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 69 PID 2584 wrote to memory of 392 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 69 PID 2584 wrote to memory of 392 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 69 PID 2584 wrote to memory of 1588 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 70 PID 2584 wrote to memory of 1588 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 70 PID 2584 wrote to memory of 1588 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 70 PID 2584 wrote to memory of 4148 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 87 PID 2584 wrote to memory of 4148 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 87 PID 2584 wrote to memory of 4148 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 87 PID 2584 wrote to memory of 4040 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 85 PID 2584 wrote to memory of 4040 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 85 PID 2584 wrote to memory of 4040 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 85 PID 2584 wrote to memory of 3504 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 84 PID 2584 wrote to memory of 3504 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 84 PID 2584 wrote to memory of 3504 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 84 PID 2584 wrote to memory of 3000 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 83 PID 2584 wrote to memory of 3000 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 83 PID 2584 wrote to memory of 3000 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 83 PID 2584 wrote to memory of 4044 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 81 PID 2584 wrote to memory of 4044 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 81 PID 2584 wrote to memory of 4044 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 81 PID 2584 wrote to memory of 1168 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 80 PID 2584 wrote to memory of 1168 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 80 PID 2584 wrote to memory of 1168 2584 f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe 80 PID 4148 wrote to memory of 2232 4148 cmd.exe 95 PID 4148 wrote to memory of 2232 4148 cmd.exe 95 PID 4148 wrote to memory of 2232 4148 cmd.exe 95 PID 3504 wrote to memory of 2268 3504 cmd.exe 96 PID 3504 wrote to memory of 2268 3504 cmd.exe 96 PID 3504 wrote to memory of 2268 3504 cmd.exe 96 PID 3000 wrote to memory of 4940 3000 cmd.exe 97 PID 3000 wrote to memory of 4940 3000 cmd.exe 97 PID 3000 wrote to memory of 4940 3000 cmd.exe 97 PID 1588 wrote to memory of 4464 1588 cmd.exe 94 PID 1588 wrote to memory of 4464 1588 cmd.exe 94 PID 1588 wrote to memory of 4464 1588 cmd.exe 94 PID 4040 wrote to memory of 4820 4040 cmd.exe 92 PID 4040 wrote to memory of 4820 4040 cmd.exe 92 PID 4040 wrote to memory of 4820 4040 cmd.exe 92 PID 60 wrote to memory of 4604 60 cmd.exe 90 PID 60 wrote to memory of 4604 60 cmd.exe 90 PID 60 wrote to memory of 4604 60 cmd.exe 90 PID 1976 wrote to memory of 4860 1976 cmd.exe 93 PID 2092 wrote to memory of 4480 2092 cmd.exe 91 PID 1976 wrote to memory of 4860 1976 cmd.exe 93 PID 2092 wrote to memory of 4480 2092 cmd.exe 91 PID 1976 wrote to memory of 4860 1976 cmd.exe 93 PID 2092 wrote to memory of 4480 2092 cmd.exe 91 PID 4808 wrote to memory of 3220 4808 cmd.exe 99 PID 4808 wrote to memory of 3220 4808 cmd.exe 99 PID 4808 wrote to memory of 3220 4808 cmd.exe 99 PID 4044 wrote to memory of 3208 4044 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"3⤵
- Creates scheduled task(s)
PID:4860
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"3⤵
- Creates scheduled task(s)
PID:4604
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"3⤵
- Creates scheduled task(s)
PID:4480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"2⤵PID:392
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"3⤵
- Creates scheduled task(s)
PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk817" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"2⤵PID:1168
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5855" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5855" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"3⤵
- Creates scheduled task(s)
PID:3208
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3514" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3514" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"3⤵
- Creates scheduled task(s)
PID:4940
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5234" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5234" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"3⤵
- Creates scheduled task(s)
PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"3⤵
- Creates scheduled task(s)
PID:4820
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"3⤵
- Creates scheduled task(s)
PID:2232
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\f8d5550e221ebaf307d42713343b654cfd1ef83dbf2f89f4cfccda59cffafd2b.exe"3⤵
- Creates scheduled task(s)
PID:3220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 13202⤵
- Program crash
PID:1228
-