Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
28/09/2022, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe
-
Size
933KB
-
MD5
e746c354e6361cd13548b06c55044301
-
SHA1
8ac55c469284f3c24790d2e8444776601c948862
-
SHA256
2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a
-
SHA512
a316bc2789e6ecd07a965d2f7f66866ff2d3600356528dc312b31deb2a95da8d568205d6c3573959a704de6e64b1968fd596df4054e5d89cbcf2f2b54adad987
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe" 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2588 3512 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3264 schtasks.exe 3140 schtasks.exe 4992 schtasks.exe 3772 schtasks.exe 4868 schtasks.exe 2500 schtasks.exe 4624 schtasks.exe 4292 schtasks.exe 4368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3512 wrote to memory of 356 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 66 PID 3512 wrote to memory of 356 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 66 PID 3512 wrote to memory of 356 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 66 PID 3512 wrote to memory of 4104 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 67 PID 3512 wrote to memory of 4104 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 67 PID 3512 wrote to memory of 4104 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 67 PID 3512 wrote to memory of 4160 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 68 PID 3512 wrote to memory of 4160 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 68 PID 3512 wrote to memory of 4160 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 68 PID 3512 wrote to memory of 5048 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 80 PID 3512 wrote to memory of 5048 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 80 PID 3512 wrote to memory of 5048 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 80 PID 3512 wrote to memory of 4580 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 69 PID 3512 wrote to memory of 4580 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 69 PID 3512 wrote to memory of 4580 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 69 PID 3512 wrote to memory of 4236 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 77 PID 3512 wrote to memory of 4236 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 77 PID 3512 wrote to memory of 4236 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 77 PID 3512 wrote to memory of 948 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 70 PID 3512 wrote to memory of 948 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 70 PID 3512 wrote to memory of 948 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 70 PID 3512 wrote to memory of 2752 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 71 PID 3512 wrote to memory of 2752 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 71 PID 3512 wrote to memory of 2752 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 71 PID 3512 wrote to memory of 1260 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 72 PID 3512 wrote to memory of 1260 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 72 PID 3512 wrote to memory of 1260 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 72 PID 3512 wrote to memory of 3336 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 73 PID 3512 wrote to memory of 3336 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 73 PID 3512 wrote to memory of 3336 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 73 PID 3512 wrote to memory of 4032 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 85 PID 3512 wrote to memory of 4032 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 85 PID 3512 wrote to memory of 4032 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 85 PID 3512 wrote to memory of 4132 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 84 PID 3512 wrote to memory of 4132 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 84 PID 3512 wrote to memory of 4132 3512 2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe 84 PID 1260 wrote to memory of 4368 1260 cmd.exe 97 PID 1260 wrote to memory of 4368 1260 cmd.exe 97 PID 1260 wrote to memory of 4368 1260 cmd.exe 97 PID 4236 wrote to memory of 4624 4236 cmd.exe 96 PID 4236 wrote to memory of 4624 4236 cmd.exe 96 PID 4236 wrote to memory of 4624 4236 cmd.exe 96 PID 4580 wrote to memory of 4292 4580 cmd.exe 89 PID 4580 wrote to memory of 4292 4580 cmd.exe 89 PID 4580 wrote to memory of 4292 4580 cmd.exe 89 PID 4160 wrote to memory of 2500 4160 cmd.exe 95 PID 4160 wrote to memory of 2500 4160 cmd.exe 95 PID 4160 wrote to memory of 2500 4160 cmd.exe 95 PID 356 wrote to memory of 4868 356 cmd.exe 94 PID 356 wrote to memory of 4868 356 cmd.exe 94 PID 356 wrote to memory of 4868 356 cmd.exe 94 PID 5048 wrote to memory of 3264 5048 cmd.exe 90 PID 5048 wrote to memory of 3264 5048 cmd.exe 90 PID 5048 wrote to memory of 3264 5048 cmd.exe 90 PID 4104 wrote to memory of 3772 4104 cmd.exe 93 PID 4104 wrote to memory of 3772 4104 cmd.exe 93 PID 4104 wrote to memory of 3772 4104 cmd.exe 93 PID 948 wrote to memory of 3140 948 cmd.exe 91 PID 948 wrote to memory of 3140 948 cmd.exe 91 PID 948 wrote to memory of 3140 948 cmd.exe 91 PID 4032 wrote to memory of 4992 4032 cmd.exe 92 PID 4032 wrote to memory of 4992 4032 cmd.exe 92 PID 4032 wrote to memory of 4992 4032 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"3⤵
- Creates scheduled task(s)
PID:4868
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"3⤵
- Creates scheduled task(s)
PID:3772
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"3⤵
- Creates scheduled task(s)
PID:2500
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"3⤵
- Creates scheduled task(s)
PID:4292
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"3⤵
- Creates scheduled task(s)
PID:3140
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"2⤵PID:2752
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2484" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2484" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"3⤵
- Creates scheduled task(s)
PID:4368
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk2001" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"2⤵PID:3336
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"3⤵
- Creates scheduled task(s)
PID:4624
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"3⤵
- Creates scheduled task(s)
PID:3264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk956" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"2⤵PID:4132
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5547" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5547" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"3⤵
- Creates scheduled task(s)
PID:4992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 13202⤵
- Program crash
PID:2588
-