Analysis
-
max time kernel
51s -
max time network
114s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/10/2022, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe
-
Size
956KB
-
MD5
93c64085cb59b61018f8fc24b8b1794b
-
SHA1
9fd2e10490755311ea5c468a0db5d1aac95505dd
-
SHA256
ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba
-
SHA512
d7d38917d828471e933334d3b3f9ab0ec7592ff8f74e4e424b90a3cb93563f00643bd2448e1490a32ac1e99a6ea2310899cd4277909f8077d2b2a82398fbedc0
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe" ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1564 2972 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4300 schtasks.exe 4216 schtasks.exe 3468 schtasks.exe 4860 schtasks.exe 3220 schtasks.exe 4896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2212 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 66 PID 2972 wrote to memory of 2212 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 66 PID 2972 wrote to memory of 2212 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 66 PID 2972 wrote to memory of 1700 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 67 PID 2972 wrote to memory of 1700 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 67 PID 2972 wrote to memory of 1700 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 67 PID 2972 wrote to memory of 5116 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 68 PID 2972 wrote to memory of 5116 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 68 PID 2972 wrote to memory of 5116 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 68 PID 2972 wrote to memory of 4148 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 69 PID 2972 wrote to memory of 4148 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 69 PID 2972 wrote to memory of 4148 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 69 PID 2972 wrote to memory of 4172 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 91 PID 2972 wrote to memory of 4172 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 91 PID 2972 wrote to memory of 4172 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 91 PID 2972 wrote to memory of 4528 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 70 PID 2972 wrote to memory of 4528 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 70 PID 2972 wrote to memory of 4528 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 70 PID 2972 wrote to memory of 4616 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 90 PID 2972 wrote to memory of 4616 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 90 PID 2972 wrote to memory of 4616 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 90 PID 2972 wrote to memory of 3908 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 71 PID 2972 wrote to memory of 3908 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 71 PID 2972 wrote to memory of 3908 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 71 PID 2972 wrote to memory of 2700 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 72 PID 2972 wrote to memory of 2700 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 72 PID 2972 wrote to memory of 2700 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 72 PID 2972 wrote to memory of 1164 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 73 PID 2972 wrote to memory of 1164 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 73 PID 2972 wrote to memory of 1164 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 73 PID 2972 wrote to memory of 3380 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 74 PID 2972 wrote to memory of 3380 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 74 PID 2972 wrote to memory of 3380 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 74 PID 2972 wrote to memory of 4204 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 78 PID 2972 wrote to memory of 4204 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 78 PID 2972 wrote to memory of 4204 2972 ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe 78 PID 5116 wrote to memory of 4216 5116 cmd.exe 87 PID 5116 wrote to memory of 4216 5116 cmd.exe 87 PID 5116 wrote to memory of 4216 5116 cmd.exe 87 PID 4148 wrote to memory of 4860 4148 cmd.exe 89 PID 4148 wrote to memory of 4860 4148 cmd.exe 89 PID 4148 wrote to memory of 4860 4148 cmd.exe 89 PID 2212 wrote to memory of 3468 2212 cmd.exe 88 PID 2212 wrote to memory of 3468 2212 cmd.exe 88 PID 2212 wrote to memory of 3468 2212 cmd.exe 88 PID 4172 wrote to memory of 4896 4172 cmd.exe 93 PID 4172 wrote to memory of 4896 4172 cmd.exe 93 PID 4172 wrote to memory of 4896 4172 cmd.exe 93 PID 4528 wrote to memory of 3220 4528 cmd.exe 92 PID 4528 wrote to memory of 3220 4528 cmd.exe 92 PID 4528 wrote to memory of 3220 4528 cmd.exe 92 PID 3380 wrote to memory of 4300 3380 cmd.exe 94 PID 3380 wrote to memory of 4300 3380 cmd.exe 94 PID 3380 wrote to memory of 4300 3380 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"3⤵
- Creates scheduled task(s)
PID:3468
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"2⤵PID:1700
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"3⤵
- Creates scheduled task(s)
PID:4216
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"3⤵
- Creates scheduled task(s)
PID:4860
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"3⤵
- Creates scheduled task(s)
PID:3220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"2⤵PID:3908
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5385" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"2⤵PID:2700
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6159" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"2⤵PID:1164
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4283" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4283" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"3⤵
- Creates scheduled task(s)
PID:4300
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk1233" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"2⤵PID:4204
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"2⤵PID:4616
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\ec7e113a56413507df56977f91c8d5c65797b8d35e9d1774d9d8963a29dad6ba.exe"3⤵
- Creates scheduled task(s)
PID:4896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 13162⤵
- Program crash
PID:1564
-