Analysis
-
max time kernel
77s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11/10/2022, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe
-
Size
967KB
-
MD5
5e8d16a197490bd5770c889a010dc506
-
SHA1
75409aea12f77e1f61e2761575d81d6e9e84b2b2
-
SHA256
ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f
-
SHA512
d5034bf6f96696ff64cff620aec85de90d1c988d06da5ebe40ce1a8d2d32e7527f6b1edd6b3f2f57bc40bd0ff87aed40b65c9a21f25c6cb118ee5b5a6bfb0170
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe" ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 624 3060 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4236 schtasks.exe 4220 schtasks.exe 4544 schtasks.exe 696 schtasks.exe 4252 schtasks.exe 4196 schtasks.exe 3080 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 3060 wrote to memory of 4904 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 66 PID 3060 wrote to memory of 4904 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 66 PID 3060 wrote to memory of 4904 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 66 PID 3060 wrote to memory of 5088 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 67 PID 3060 wrote to memory of 5088 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 67 PID 3060 wrote to memory of 5088 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 67 PID 3060 wrote to memory of 4244 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 68 PID 3060 wrote to memory of 4244 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 68 PID 3060 wrote to memory of 4244 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 68 PID 3060 wrote to memory of 4288 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 70 PID 3060 wrote to memory of 4288 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 70 PID 3060 wrote to memory of 4288 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 70 PID 3060 wrote to memory of 4408 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 69 PID 3060 wrote to memory of 4408 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 69 PID 3060 wrote to memory of 4408 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 69 PID 3060 wrote to memory of 4076 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 80 PID 3060 wrote to memory of 4076 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 80 PID 3060 wrote to memory of 4076 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 80 PID 3060 wrote to memory of 3428 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 71 PID 3060 wrote to memory of 3428 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 71 PID 3060 wrote to memory of 3428 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 71 PID 3060 wrote to memory of 1892 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 72 PID 3060 wrote to memory of 1892 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 72 PID 3060 wrote to memory of 1892 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 72 PID 3060 wrote to memory of 1200 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 73 PID 3060 wrote to memory of 1200 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 73 PID 3060 wrote to memory of 1200 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 73 PID 3060 wrote to memory of 4384 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 76 PID 3060 wrote to memory of 4384 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 76 PID 3060 wrote to memory of 4384 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 76 PID 3060 wrote to memory of 4940 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 81 PID 3060 wrote to memory of 4940 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 81 PID 3060 wrote to memory of 4940 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 81 PID 3060 wrote to memory of 3476 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 82 PID 3060 wrote to memory of 3476 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 82 PID 3060 wrote to memory of 3476 3060 ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe 82 PID 1200 wrote to memory of 4544 1200 cmd.exe 92 PID 1200 wrote to memory of 4544 1200 cmd.exe 92 PID 1200 wrote to memory of 4544 1200 cmd.exe 92 PID 4384 wrote to memory of 4236 4384 cmd.exe 90 PID 4384 wrote to memory of 4236 4384 cmd.exe 90 PID 4384 wrote to memory of 4236 4384 cmd.exe 90 PID 4408 wrote to memory of 4220 4408 cmd.exe 91 PID 4408 wrote to memory of 4220 4408 cmd.exe 91 PID 4408 wrote to memory of 4220 4408 cmd.exe 91 PID 4904 wrote to memory of 4252 4904 cmd.exe 94 PID 4904 wrote to memory of 4252 4904 cmd.exe 94 PID 4904 wrote to memory of 4252 4904 cmd.exe 94 PID 3428 wrote to memory of 696 3428 cmd.exe 93 PID 3428 wrote to memory of 696 3428 cmd.exe 93 PID 3428 wrote to memory of 696 3428 cmd.exe 93 PID 3476 wrote to memory of 4196 3476 cmd.exe 95 PID 3476 wrote to memory of 4196 3476 cmd.exe 95 PID 3476 wrote to memory of 4196 3476 cmd.exe 95 PID 4940 wrote to memory of 3080 4940 cmd.exe 96 PID 4940 wrote to memory of 3080 4940 cmd.exe 96 PID 4940 wrote to memory of 3080 4940 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"3⤵
- Creates scheduled task(s)
PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"2⤵PID:5088
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"2⤵PID:4244
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"3⤵
- Creates scheduled task(s)
PID:4220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"2⤵PID:4288
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"3⤵
- Creates scheduled task(s)
PID:696
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"2⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2179" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2179" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"3⤵
- Creates scheduled task(s)
PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6013" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6013" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"3⤵
- Creates scheduled task(s)
PID:4236
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"2⤵PID:4076
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8110" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8110" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"3⤵
- Creates scheduled task(s)
PID:3080
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3235" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3235" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"3⤵
- Creates scheduled task(s)
PID:4196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 13842⤵
- Program crash
PID:624
-