Analysis
-
max time kernel
53s -
max time network
112s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07-10-2022 08:48
Static task
static1
Behavioral task
behavioral1
Sample
937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe
Resource
win10-20220812-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe
-
Size
956KB
-
MD5
5fe3f3268761b4cdc205f460ef8957f5
-
SHA1
f033d2a2541f29d6fe57fe15ad48a74057bb62c1
-
SHA256
937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d
-
SHA512
67cd48733255fdf9d466ed9940edb098ae9c058b1d6d3e3fd0d3bca1b0abaf099cca1ea8ad4863f7b8c30498aa34f0bf5b44f6a3a929a9ae8c0230ab75be122f
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe" 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 608 4220 WerFault.exe 66 -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4764 schtasks.exe 4156 schtasks.exe 444 schtasks.exe 4880 schtasks.exe 4124 schtasks.exe 4132 schtasks.exe 4168 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 4220 wrote to memory of 3412 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 67 PID 4220 wrote to memory of 3412 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 67 PID 4220 wrote to memory of 3412 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 67 PID 4220 wrote to memory of 3528 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 68 PID 4220 wrote to memory of 3528 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 68 PID 4220 wrote to memory of 3528 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 68 PID 4220 wrote to memory of 3460 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 69 PID 4220 wrote to memory of 3460 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 69 PID 4220 wrote to memory of 3460 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 69 PID 4220 wrote to memory of 4280 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 70 PID 4220 wrote to memory of 4280 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 70 PID 4220 wrote to memory of 4280 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 70 PID 4220 wrote to memory of 4312 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 71 PID 4220 wrote to memory of 4312 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 71 PID 4220 wrote to memory of 4312 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 71 PID 4220 wrote to memory of 1444 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 92 PID 4220 wrote to memory of 1444 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 92 PID 4220 wrote to memory of 1444 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 92 PID 4220 wrote to memory of 2912 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 88 PID 4220 wrote to memory of 2912 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 88 PID 4220 wrote to memory of 2912 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 88 PID 4220 wrote to memory of 4828 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 87 PID 4220 wrote to memory of 4828 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 87 PID 4220 wrote to memory of 4828 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 87 PID 4220 wrote to memory of 1512 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 80 PID 4220 wrote to memory of 1512 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 80 PID 4220 wrote to memory of 1512 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 80 PID 4220 wrote to memory of 3920 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 74 PID 4220 wrote to memory of 3920 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 74 PID 4220 wrote to memory of 3920 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 74 PID 4220 wrote to memory of 4592 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 78 PID 4220 wrote to memory of 4592 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 78 PID 4220 wrote to memory of 4592 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 78 PID 4220 wrote to memory of 4636 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 76 PID 4220 wrote to memory of 4636 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 76 PID 4220 wrote to memory of 4636 4220 937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe 76 PID 4280 wrote to memory of 4132 4280 cmd.exe 90 PID 4280 wrote to memory of 4132 4280 cmd.exe 90 PID 4280 wrote to memory of 4132 4280 cmd.exe 90 PID 2912 wrote to memory of 4124 2912 cmd.exe 89 PID 2912 wrote to memory of 4124 2912 cmd.exe 89 PID 2912 wrote to memory of 4124 2912 cmd.exe 89 PID 3412 wrote to memory of 4168 3412 cmd.exe 93 PID 3412 wrote to memory of 4168 3412 cmd.exe 93 PID 3412 wrote to memory of 4168 3412 cmd.exe 93 PID 3460 wrote to memory of 4764 3460 cmd.exe 94 PID 3460 wrote to memory of 4764 3460 cmd.exe 94 PID 3460 wrote to memory of 4764 3460 cmd.exe 94 PID 4828 wrote to memory of 4156 4828 cmd.exe 95 PID 4828 wrote to memory of 4156 4828 cmd.exe 95 PID 4828 wrote to memory of 4156 4828 cmd.exe 95 PID 1444 wrote to memory of 444 1444 cmd.exe 96 PID 1444 wrote to memory of 444 1444 cmd.exe 96 PID 1444 wrote to memory of 444 1444 cmd.exe 96 PID 4636 wrote to memory of 4880 4636 cmd.exe 97 PID 4636 wrote to memory of 4880 4636 cmd.exe 97 PID 4636 wrote to memory of 4880 4636 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"3⤵
- Creates scheduled task(s)
PID:4168
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"2⤵PID:3528
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"3⤵
- Creates scheduled task(s)
PID:4764
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"3⤵
- Creates scheduled task(s)
PID:4132
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"2⤵PID:4312
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9880" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"2⤵PID:3920
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7122" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7122" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"3⤵
- Creates scheduled task(s)
PID:4880
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2928" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"2⤵PID:4592
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6672" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"2⤵PID:1512
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"3⤵
- Creates scheduled task(s)
PID:4156
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"3⤵
- Creates scheduled task(s)
PID:4124
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\937f5f81b0dffec4cc369339213322df382dcf597a970516645aa50bf654118d.exe"3⤵
- Creates scheduled task(s)
PID:444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 13842⤵
- Program crash
PID:608
-