Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
14/09/2022, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe
-
Size
895KB
-
MD5
a161b40e4442303831dac6e8bfd21570
-
SHA1
bfa7542a4b67bec4310e7a42f4ccc7e3219d1db8
-
SHA256
12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11
-
SHA512
d8da2ee9796ab27002147127499cd5a91b46dc2f3bb14e0b097d3e2beede5d31f1fe6a7ca345d30947983374bf969dc034776899f47653cad5231e357ef87d63
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe" 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 892 4324 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4740 schtasks.exe 4224 schtasks.exe 648 schtasks.exe 4860 schtasks.exe 3236 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 4324 wrote to memory of 4820 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 66 PID 4324 wrote to memory of 4820 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 66 PID 4324 wrote to memory of 4820 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 66 PID 4324 wrote to memory of 3528 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 67 PID 4324 wrote to memory of 3528 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 67 PID 4324 wrote to memory of 3528 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 67 PID 4324 wrote to memory of 3700 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 68 PID 4324 wrote to memory of 3700 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 68 PID 4324 wrote to memory of 3700 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 68 PID 4324 wrote to memory of 4572 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 69 PID 4324 wrote to memory of 4572 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 69 PID 4324 wrote to memory of 4572 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 69 PID 4324 wrote to memory of 4584 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 70 PID 4324 wrote to memory of 4584 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 70 PID 4324 wrote to memory of 4584 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 70 PID 4324 wrote to memory of 3056 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 71 PID 4324 wrote to memory of 3056 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 71 PID 4324 wrote to memory of 3056 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 71 PID 4324 wrote to memory of 968 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 72 PID 4324 wrote to memory of 968 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 72 PID 4324 wrote to memory of 968 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 72 PID 4324 wrote to memory of 3376 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 73 PID 4324 wrote to memory of 3376 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 73 PID 4324 wrote to memory of 3376 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 73 PID 4324 wrote to memory of 3516 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 76 PID 4324 wrote to memory of 3516 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 76 PID 4324 wrote to memory of 3516 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 76 PID 4324 wrote to memory of 4392 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 86 PID 4324 wrote to memory of 4392 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 86 PID 4324 wrote to memory of 4392 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 86 PID 4324 wrote to memory of 4300 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 80 PID 4324 wrote to memory of 4300 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 80 PID 4324 wrote to memory of 4300 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 80 PID 4324 wrote to memory of 4908 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 81 PID 4324 wrote to memory of 4908 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 81 PID 4324 wrote to memory of 4908 4324 12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe 81 PID 3700 wrote to memory of 4740 3700 cmd.exe 92 PID 3700 wrote to memory of 4740 3700 cmd.exe 92 PID 3700 wrote to memory of 4740 3700 cmd.exe 92 PID 4572 wrote to memory of 4860 4572 cmd.exe 90 PID 4572 wrote to memory of 4860 4572 cmd.exe 90 PID 4572 wrote to memory of 4860 4572 cmd.exe 90 PID 4820 wrote to memory of 3236 4820 cmd.exe 91 PID 4820 wrote to memory of 3236 4820 cmd.exe 91 PID 4820 wrote to memory of 3236 4820 cmd.exe 91 PID 4584 wrote to memory of 4224 4584 cmd.exe 93 PID 4584 wrote to memory of 4224 4584 cmd.exe 93 PID 4584 wrote to memory of 4224 4584 cmd.exe 93 PID 4392 wrote to memory of 648 4392 cmd.exe 94 PID 4392 wrote to memory of 648 4392 cmd.exe 94 PID 4392 wrote to memory of 648 4392 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"3⤵
- Creates scheduled task(s)
PID:3236
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"2⤵PID:3528
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"3⤵
- Creates scheduled task(s)
PID:4740
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"3⤵
- Creates scheduled task(s)
PID:4860
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"3⤵
- Creates scheduled task(s)
PID:4224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"2⤵PID:3056
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"2⤵PID:968
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"2⤵PID:3376
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1918" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"2⤵PID:3516
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8112" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"2⤵PID:4300
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk182" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"2⤵PID:4908
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk782" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk782" /TR "C:\Users\Admin\AppData\Local\Temp\12039dde18ec90a46500adc1de9567c893e19dbc0f7b22d9b1486bf211286c11.exe"3⤵
- Creates scheduled task(s)
PID:648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 13162⤵
- Program crash
PID:892
-