Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2022 09:00
Static task
static1
Behavioral task
behavioral1
Sample
54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe
-
Size
962KB
-
MD5
70c712254c238fcd1005c79ad7f09ac1
-
SHA1
f5bc7f68644ede6fbdceb77528e2c2f894a6420b
-
SHA256
54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa
-
SHA512
9f6a2ece42356fa340c1a29728b88a7e3afec2cc2fcab120e58998e84615aef8ac653507d2d27a2e6ca4565d0b4ea78b5ae9cf0b72de81b5911b0aaa371164a5
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe" 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2248 5072 WerFault.exe 79 -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4268 schtasks.exe 1876 schtasks.exe 3508 schtasks.exe 116 schtasks.exe 2752 schtasks.exe 1644 schtasks.exe 2220 schtasks.exe 4196 schtasks.exe 2412 schtasks.exe 2692 schtasks.exe 3452 schtasks.exe 3500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 488 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 81 PID 5072 wrote to memory of 488 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 81 PID 5072 wrote to memory of 488 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 81 PID 5072 wrote to memory of 2632 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 82 PID 5072 wrote to memory of 2632 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 82 PID 5072 wrote to memory of 2632 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 82 PID 5072 wrote to memory of 2404 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 107 PID 5072 wrote to memory of 2404 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 107 PID 5072 wrote to memory of 2404 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 107 PID 5072 wrote to memory of 2080 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 84 PID 5072 wrote to memory of 2080 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 84 PID 5072 wrote to memory of 2080 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 84 PID 5072 wrote to memory of 4356 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 105 PID 5072 wrote to memory of 4356 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 105 PID 5072 wrote to memory of 4356 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 105 PID 5072 wrote to memory of 5040 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 86 PID 5072 wrote to memory of 5040 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 86 PID 5072 wrote to memory of 5040 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 86 PID 5072 wrote to memory of 1660 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 101 PID 5072 wrote to memory of 1660 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 101 PID 5072 wrote to memory of 1660 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 101 PID 5072 wrote to memory of 4944 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 100 PID 5072 wrote to memory of 4944 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 100 PID 5072 wrote to memory of 4944 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 100 PID 5072 wrote to memory of 4184 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 99 PID 5072 wrote to memory of 4184 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 99 PID 5072 wrote to memory of 4184 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 99 PID 5072 wrote to memory of 1992 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 98 PID 5072 wrote to memory of 1992 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 98 PID 5072 wrote to memory of 1992 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 98 PID 5072 wrote to memory of 1848 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 92 PID 5072 wrote to memory of 1848 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 92 PID 5072 wrote to memory of 1848 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 92 PID 5072 wrote to memory of 3196 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 93 PID 5072 wrote to memory of 3196 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 93 PID 5072 wrote to memory of 3196 5072 54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe 93 PID 488 wrote to memory of 116 488 cmd.exe 94 PID 488 wrote to memory of 116 488 cmd.exe 94 PID 488 wrote to memory of 116 488 cmd.exe 94 PID 1848 wrote to memory of 2752 1848 cmd.exe 104 PID 1848 wrote to memory of 2752 1848 cmd.exe 104 PID 1848 wrote to memory of 2752 1848 cmd.exe 104 PID 1992 wrote to memory of 2692 1992 cmd.exe 103 PID 1992 wrote to memory of 2692 1992 cmd.exe 103 PID 1992 wrote to memory of 2692 1992 cmd.exe 103 PID 4184 wrote to memory of 3500 4184 cmd.exe 113 PID 4184 wrote to memory of 3500 4184 cmd.exe 113 PID 4184 wrote to memory of 3500 4184 cmd.exe 113 PID 2080 wrote to memory of 3452 2080 cmd.exe 108 PID 2080 wrote to memory of 3452 2080 cmd.exe 108 PID 2080 wrote to memory of 3452 2080 cmd.exe 108 PID 2632 wrote to memory of 3508 2632 cmd.exe 112 PID 2632 wrote to memory of 3508 2632 cmd.exe 112 PID 2632 wrote to memory of 3508 2632 cmd.exe 112 PID 4944 wrote to memory of 1644 4944 cmd.exe 109 PID 4944 wrote to memory of 1644 4944 cmd.exe 109 PID 4944 wrote to memory of 1644 4944 cmd.exe 109 PID 1660 wrote to memory of 1876 1660 cmd.exe 111 PID 1660 wrote to memory of 1876 1660 cmd.exe 111 PID 1660 wrote to memory of 1876 1660 cmd.exe 111 PID 2404 wrote to memory of 4268 2404 cmd.exe 110 PID 2404 wrote to memory of 4268 2404 cmd.exe 110 PID 2404 wrote to memory of 4268 2404 cmd.exe 110 PID 4356 wrote to memory of 4196 4356 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"3⤵
- Creates scheduled task(s)
PID:116
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"3⤵
- Creates scheduled task(s)
PID:3508
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"3⤵
- Creates scheduled task(s)
PID:3452
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"2⤵PID:5040
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"3⤵
- Creates scheduled task(s)
PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6486" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6486" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"3⤵
- Creates scheduled task(s)
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6800" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"2⤵PID:3196
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6800" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"3⤵
- Creates scheduled task(s)
PID:2412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk2729" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk2729" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"3⤵
- Creates scheduled task(s)
PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7840" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7840" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"3⤵
- Creates scheduled task(s)
PID:3500
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"3⤵
- Creates scheduled task(s)
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"3⤵
- Creates scheduled task(s)
PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"3⤵
- Creates scheduled task(s)
PID:4196
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\54857d3b928e7d2eaa425a5b88e5d9e25f539e4262ed7ce01aa2e6f19f2468fa.exe"3⤵
- Creates scheduled task(s)
PID:4268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 13642⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5072 -ip 50721⤵PID:1952