Analysis
-
max time kernel
50s -
max time network
114s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
09/10/2022, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe
Resource
win10-20220901-en
6 signatures
150 seconds
General
-
Target
8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe
-
Size
961KB
-
MD5
56f42b09437abd1b96a051763cd1a38b
-
SHA1
12f80f39ca515e6bb6bff62dbe9210f3071311e2
-
SHA256
8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54
-
SHA512
3047b0f91d43ada5f5b3f3a83a3f038a2ffcb5d8068f70d754c6d149b0cae007eaeadb373538d7c3ea0f705a4431e12e2f8bd556bc61acb6a7f426a6c9e3d363
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe" 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 640 2492 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5044 schtasks.exe 4976 schtasks.exe 5064 schtasks.exe 4004 schtasks.exe 4676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2492 wrote to memory of 4048 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 66 PID 2492 wrote to memory of 4048 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 66 PID 2492 wrote to memory of 4048 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 66 PID 2492 wrote to memory of 4276 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 67 PID 2492 wrote to memory of 4276 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 67 PID 2492 wrote to memory of 4276 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 67 PID 2492 wrote to memory of 3344 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 68 PID 2492 wrote to memory of 3344 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 68 PID 2492 wrote to memory of 3344 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 68 PID 2492 wrote to memory of 3548 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 69 PID 2492 wrote to memory of 3548 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 69 PID 2492 wrote to memory of 3548 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 69 PID 2492 wrote to memory of 932 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 93 PID 2492 wrote to memory of 932 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 93 PID 2492 wrote to memory of 932 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 93 PID 2492 wrote to memory of 2224 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 70 PID 2492 wrote to memory of 2224 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 70 PID 2492 wrote to memory of 2224 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 70 PID 2492 wrote to memory of 3044 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 71 PID 2492 wrote to memory of 3044 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 71 PID 2492 wrote to memory of 3044 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 71 PID 2492 wrote to memory of 3472 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 72 PID 2492 wrote to memory of 3472 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 72 PID 2492 wrote to memory of 3472 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 72 PID 2492 wrote to memory of 4328 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 73 PID 2492 wrote to memory of 4328 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 73 PID 2492 wrote to memory of 4328 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 73 PID 2492 wrote to memory of 4352 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 74 PID 2492 wrote to memory of 4352 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 74 PID 2492 wrote to memory of 4352 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 74 PID 2492 wrote to memory of 4448 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 75 PID 2492 wrote to memory of 4448 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 75 PID 2492 wrote to memory of 4448 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 75 PID 2492 wrote to memory of 4456 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 83 PID 2492 wrote to memory of 4456 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 83 PID 2492 wrote to memory of 4456 2492 8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe 83 PID 3548 wrote to memory of 5044 3548 cmd.exe 84 PID 3548 wrote to memory of 5044 3548 cmd.exe 84 PID 3548 wrote to memory of 5044 3548 cmd.exe 84 PID 2224 wrote to memory of 4976 2224 cmd.exe 88 PID 2224 wrote to memory of 4976 2224 cmd.exe 88 PID 2224 wrote to memory of 4976 2224 cmd.exe 88 PID 4048 wrote to memory of 5064 4048 cmd.exe 90 PID 4048 wrote to memory of 5064 4048 cmd.exe 90 PID 4048 wrote to memory of 5064 4048 cmd.exe 90 PID 3044 wrote to memory of 4004 3044 cmd.exe 91 PID 3044 wrote to memory of 4004 3044 cmd.exe 91 PID 3044 wrote to memory of 4004 3044 cmd.exe 91 PID 4352 wrote to memory of 4676 4352 cmd.exe 94 PID 4352 wrote to memory of 4676 4352 cmd.exe 94 PID 4352 wrote to memory of 4676 4352 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"3⤵
- Creates scheduled task(s)
PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"2⤵PID:4276
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"2⤵PID:3344
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"3⤵
- Creates scheduled task(s)
PID:5044
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"3⤵
- Creates scheduled task(s)
PID:4976
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"3⤵
- Creates scheduled task(s)
PID:4004
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"2⤵PID:3472
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6609" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"2⤵PID:4328
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4271" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4271" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"3⤵
- Creates scheduled task(s)
PID:4676
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1008" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"2⤵PID:4448
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5748" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"2⤵PID:4456
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\8db0499ff2cf7ba5683e74f89597bfd9c8ba3bc49e84cc039be78de2005f6d54.exe"2⤵PID:932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 13162⤵
- Program crash
PID:640
-