Analysis
-
max time kernel
51s -
max time network
115s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
07/09/2022, 00:31
Static task
static1
Behavioral task
behavioral1
Sample
228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe
Resource
win10-20220901-en
6 signatures
150 seconds
General
-
Target
228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe
-
Size
877KB
-
MD5
b4ec487caee99a1567d939776de4c0c1
-
SHA1
1d930b2db25054b0c74a4afcc00ff5a8597982a1
-
SHA256
228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090
-
SHA512
ffa5177b142456b35040bdc0c95fc21c006e34cd098b4200be05feeb05a5bc2951b87e81a50d754852227498af50eeb23961e52ce9c060499a00d43ddb827e8f
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe" 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4412 2172 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3224 schtasks.exe 3768 schtasks.exe 3868 schtasks.exe 5080 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2172 wrote to memory of 5036 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 66 PID 2172 wrote to memory of 5036 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 66 PID 2172 wrote to memory of 5036 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 66 PID 2172 wrote to memory of 1384 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 67 PID 2172 wrote to memory of 1384 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 67 PID 2172 wrote to memory of 1384 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 67 PID 2172 wrote to memory of 4372 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 68 PID 2172 wrote to memory of 4372 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 68 PID 2172 wrote to memory of 4372 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 68 PID 2172 wrote to memory of 5116 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 69 PID 2172 wrote to memory of 5116 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 69 PID 2172 wrote to memory of 5116 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 69 PID 2172 wrote to memory of 4264 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 75 PID 2172 wrote to memory of 4264 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 75 PID 2172 wrote to memory of 4264 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 75 PID 2172 wrote to memory of 3472 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 74 PID 2172 wrote to memory of 3472 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 74 PID 2172 wrote to memory of 3472 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 74 PID 2172 wrote to memory of 4932 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 73 PID 2172 wrote to memory of 4932 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 73 PID 2172 wrote to memory of 4932 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 73 PID 2172 wrote to memory of 1360 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 88 PID 2172 wrote to memory of 1360 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 88 PID 2172 wrote to memory of 1360 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 88 PID 2172 wrote to memory of 3020 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 76 PID 2172 wrote to memory of 3020 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 76 PID 2172 wrote to memory of 3020 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 76 PID 2172 wrote to memory of 4208 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 77 PID 2172 wrote to memory of 4208 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 77 PID 2172 wrote to memory of 4208 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 77 PID 2172 wrote to memory of 4224 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 78 PID 2172 wrote to memory of 4224 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 78 PID 2172 wrote to memory of 4224 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 78 PID 2172 wrote to memory of 4204 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 79 PID 2172 wrote to memory of 4204 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 79 PID 2172 wrote to memory of 4204 2172 228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe 79 PID 5036 wrote to memory of 3224 5036 cmd.exe 91 PID 5036 wrote to memory of 3224 5036 cmd.exe 91 PID 5036 wrote to memory of 3224 5036 cmd.exe 91 PID 1384 wrote to memory of 3868 1384 cmd.exe 89 PID 1384 wrote to memory of 3868 1384 cmd.exe 89 PID 1384 wrote to memory of 3868 1384 cmd.exe 89 PID 4372 wrote to memory of 5080 4372 cmd.exe 90 PID 4372 wrote to memory of 5080 4372 cmd.exe 90 PID 4372 wrote to memory of 5080 4372 cmd.exe 90 PID 3020 wrote to memory of 3768 3020 cmd.exe 92 PID 3020 wrote to memory of 3768 3020 cmd.exe 92 PID 3020 wrote to memory of 3768 3020 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"3⤵
- Creates scheduled task(s)
PID:3224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"3⤵
- Creates scheduled task(s)
PID:3868
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"3⤵
- Creates scheduled task(s)
PID:5080
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"2⤵PID:5116
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"2⤵PID:4932
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"2⤵PID:3472
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"2⤵PID:4264
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1430" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1430" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"3⤵
- Creates scheduled task(s)
PID:3768
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7615" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"2⤵PID:4208
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3088" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"2⤵PID:4224
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7987" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"2⤵PID:4204
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\228c35d2031e9178fd3633df2ff3c614af8a431e8c0f404eeceeb372a1323090.exe"2⤵PID:1360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 13202⤵
- Program crash
PID:4412
-