Analysis
-
max time kernel
51s -
max time network
115s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
07-10-2022 03:00
Static task
static1
Behavioral task
behavioral1
Sample
07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe
Resource
win10-20220901-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe
-
Size
955KB
-
MD5
dffe60d13a907da6e0a60f8dace4229a
-
SHA1
c3dfbca44fe51a2cfbfc4820712990f51432508c
-
SHA256
07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4
-
SHA512
0c01ac8224096bf527583d1078aacc474eced1ffe5948e5e0ae84f5754878fa52396112e66fc98ffcb206a61d7c783168816517619259fb4691211e93c763290
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe" 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1800 2240 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4432 schtasks.exe 4992 schtasks.exe 5080 schtasks.exe 4676 schtasks.exe 4384 schtasks.exe 2748 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1136 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 66 PID 2240 wrote to memory of 1136 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 66 PID 2240 wrote to memory of 1136 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 66 PID 2240 wrote to memory of 4428 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 67 PID 2240 wrote to memory of 4428 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 67 PID 2240 wrote to memory of 4428 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 67 PID 2240 wrote to memory of 2212 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 69 PID 2240 wrote to memory of 2212 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 69 PID 2240 wrote to memory of 2212 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 69 PID 2240 wrote to memory of 2928 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 68 PID 2240 wrote to memory of 2928 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 68 PID 2240 wrote to memory of 2928 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 68 PID 2240 wrote to memory of 3328 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 70 PID 2240 wrote to memory of 3328 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 70 PID 2240 wrote to memory of 3328 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 70 PID 2240 wrote to memory of 3448 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 71 PID 2240 wrote to memory of 3448 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 71 PID 2240 wrote to memory of 3448 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 71 PID 2240 wrote to memory of 4932 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 73 PID 2240 wrote to memory of 4932 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 73 PID 2240 wrote to memory of 4932 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 73 PID 2240 wrote to memory of 1388 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 72 PID 2240 wrote to memory of 1388 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 72 PID 2240 wrote to memory of 1388 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 72 PID 2240 wrote to memory of 4476 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 87 PID 2240 wrote to memory of 4476 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 87 PID 2240 wrote to memory of 4476 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 87 PID 2240 wrote to memory of 4216 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 83 PID 2240 wrote to memory of 4216 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 83 PID 2240 wrote to memory of 4216 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 83 PID 2240 wrote to memory of 3384 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 75 PID 2240 wrote to memory of 3384 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 75 PID 2240 wrote to memory of 3384 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 75 PID 2240 wrote to memory of 520 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 76 PID 2240 wrote to memory of 520 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 76 PID 2240 wrote to memory of 520 2240 07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe 76 PID 2212 wrote to memory of 4676 2212 cmd.exe 93 PID 2212 wrote to memory of 4676 2212 cmd.exe 93 PID 2212 wrote to memory of 4676 2212 cmd.exe 93 PID 3448 wrote to memory of 5080 3448 cmd.exe 92 PID 3448 wrote to memory of 5080 3448 cmd.exe 92 PID 3448 wrote to memory of 5080 3448 cmd.exe 92 PID 4932 wrote to memory of 4432 4932 cmd.exe 90 PID 4932 wrote to memory of 4432 4932 cmd.exe 90 PID 4932 wrote to memory of 4432 4932 cmd.exe 90 PID 4428 wrote to memory of 4992 4428 cmd.exe 91 PID 4428 wrote to memory of 4992 4428 cmd.exe 91 PID 4428 wrote to memory of 4992 4428 cmd.exe 91 PID 1388 wrote to memory of 4384 1388 cmd.exe 94 PID 1388 wrote to memory of 4384 1388 cmd.exe 94 PID 1388 wrote to memory of 4384 1388 cmd.exe 94 PID 3384 wrote to memory of 2748 3384 cmd.exe 95 PID 3384 wrote to memory of 2748 3384 cmd.exe 95 PID 3384 wrote to memory of 2748 3384 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"2⤵PID:1136
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"3⤵
- Creates scheduled task(s)
PID:4992
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"2⤵PID:2928
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"3⤵
- Creates scheduled task(s)
PID:4676
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"2⤵PID:3328
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"3⤵
- Creates scheduled task(s)
PID:5080
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"3⤵
- Creates scheduled task(s)
PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"3⤵
- Creates scheduled task(s)
PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3931" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3931" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"3⤵
- Creates scheduled task(s)
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3929" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"2⤵PID:520
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3081" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"2⤵PID:4216
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1397" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"2⤵PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 14042⤵
- Program crash
PID:1800
-