Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09/09/2022, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe
-
Size
885KB
-
MD5
ae244f9bdc49d7d2f29f19e6bfe4718d
-
SHA1
3b3c3910ad759ecc4681ed9f62f884dc9e477c68
-
SHA256
85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc
-
SHA512
46b7436eb810edcb80cf9b0912d66bc286022798c18fdcd0951f5a05b8a6fcc6fd3cc84119ef061a2222330cf61cb0bb1d38801dac7cbc870e78ede236f4c4a6
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe" 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1296 1892 WerFault.exe 66 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4844 schtasks.exe 700 schtasks.exe 4612 schtasks.exe 4664 schtasks.exe 4252 schtasks.exe 4912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1892 wrote to memory of 5064 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 67 PID 1892 wrote to memory of 5064 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 67 PID 1892 wrote to memory of 5064 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 67 PID 1892 wrote to memory of 5072 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 68 PID 1892 wrote to memory of 5072 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 68 PID 1892 wrote to memory of 5072 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 68 PID 1892 wrote to memory of 4100 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 69 PID 1892 wrote to memory of 4100 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 69 PID 1892 wrote to memory of 4100 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 69 PID 1892 wrote to memory of 2120 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 70 PID 1892 wrote to memory of 2120 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 70 PID 1892 wrote to memory of 2120 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 70 PID 1892 wrote to memory of 4544 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 71 PID 1892 wrote to memory of 4544 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 71 PID 1892 wrote to memory of 4544 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 71 PID 1892 wrote to memory of 3368 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 88 PID 1892 wrote to memory of 3368 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 88 PID 1892 wrote to memory of 3368 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 88 PID 1892 wrote to memory of 1068 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 87 PID 1892 wrote to memory of 1068 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 87 PID 1892 wrote to memory of 1068 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 87 PID 1892 wrote to memory of 2892 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 73 PID 1892 wrote to memory of 2892 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 73 PID 1892 wrote to memory of 2892 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 73 PID 1892 wrote to memory of 3432 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 74 PID 1892 wrote to memory of 3432 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 74 PID 1892 wrote to memory of 3432 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 74 PID 1892 wrote to memory of 3980 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 75 PID 1892 wrote to memory of 3980 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 75 PID 1892 wrote to memory of 3980 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 75 PID 1892 wrote to memory of 4624 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 79 PID 1892 wrote to memory of 4624 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 79 PID 1892 wrote to memory of 4624 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 79 PID 1892 wrote to memory of 4512 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 80 PID 1892 wrote to memory of 4512 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 80 PID 1892 wrote to memory of 4512 1892 85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe 80 PID 4544 wrote to memory of 4252 4544 cmd.exe 92 PID 4544 wrote to memory of 4252 4544 cmd.exe 92 PID 4544 wrote to memory of 4252 4544 cmd.exe 92 PID 2120 wrote to memory of 700 2120 cmd.exe 89 PID 2120 wrote to memory of 700 2120 cmd.exe 89 PID 2120 wrote to memory of 700 2120 cmd.exe 89 PID 5072 wrote to memory of 4612 5072 cmd.exe 90 PID 5072 wrote to memory of 4612 5072 cmd.exe 90 PID 5072 wrote to memory of 4612 5072 cmd.exe 90 PID 5064 wrote to memory of 4664 5064 cmd.exe 91 PID 5064 wrote to memory of 4664 5064 cmd.exe 91 PID 5064 wrote to memory of 4664 5064 cmd.exe 91 PID 3368 wrote to memory of 4844 3368 cmd.exe 94 PID 3368 wrote to memory of 4844 3368 cmd.exe 94 PID 3368 wrote to memory of 4844 3368 cmd.exe 94 PID 2892 wrote to memory of 4912 2892 cmd.exe 93 PID 2892 wrote to memory of 4912 2892 cmd.exe 93 PID 2892 wrote to memory of 4912 2892 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"3⤵
- Creates scheduled task(s)
PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"3⤵
- Creates scheduled task(s)
PID:4612
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"2⤵PID:4100
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"3⤵
- Creates scheduled task(s)
PID:700
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"3⤵
- Creates scheduled task(s)
PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"3⤵
- Creates scheduled task(s)
PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk8777" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"2⤵PID:3432
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4183" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"2⤵PID:3980
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8623" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"2⤵PID:4624
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk594" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"2⤵PID:4512
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"2⤵PID:1068
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\85923f0635a960a794529425ba0dfbd7a010bab3228de3e81aa97abb94e3dacc.exe"3⤵
- Creates scheduled task(s)
PID:4844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 13202⤵
- Program crash
PID:1296
-