Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
08/10/2022, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe
-
Size
959KB
-
MD5
699b605073b7429a87217e979bc0595a
-
SHA1
3bebc7b769fa5ce8097af99810403f12b1bd6e16
-
SHA256
22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412
-
SHA512
61b77a0edcc9d16a8d9803c6813019cb56b84ed56e72f8ee5db0c916c59596bea5806f422284c0e0560e30eb35271c857582c2935fe5987cbeee3631f402ea7d
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe" 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 96 1892 WerFault.exe 66 -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3656 schtasks.exe 4468 schtasks.exe 4672 schtasks.exe 4656 schtasks.exe 4600 schtasks.exe 4608 schtasks.exe 4592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1892 wrote to memory of 5092 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 67 PID 1892 wrote to memory of 5092 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 67 PID 1892 wrote to memory of 5092 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 67 PID 1892 wrote to memory of 4112 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 68 PID 1892 wrote to memory of 4112 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 68 PID 1892 wrote to memory of 4112 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 68 PID 1892 wrote to memory of 2216 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 69 PID 1892 wrote to memory of 2216 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 69 PID 1892 wrote to memory of 2216 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 69 PID 1892 wrote to memory of 4480 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 70 PID 1892 wrote to memory of 4480 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 70 PID 1892 wrote to memory of 4480 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 70 PID 1892 wrote to memory of 4560 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 86 PID 1892 wrote to memory of 4560 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 86 PID 1892 wrote to memory of 4560 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 86 PID 1892 wrote to memory of 3668 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 84 PID 1892 wrote to memory of 3668 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 84 PID 1892 wrote to memory of 3668 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 84 PID 1892 wrote to memory of 3568 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 71 PID 1892 wrote to memory of 3568 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 71 PID 1892 wrote to memory of 3568 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 71 PID 1892 wrote to memory of 4088 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 82 PID 1892 wrote to memory of 4088 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 82 PID 1892 wrote to memory of 4088 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 82 PID 1892 wrote to memory of 4092 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 81 PID 1892 wrote to memory of 4092 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 81 PID 1892 wrote to memory of 4092 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 81 PID 1892 wrote to memory of 4128 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 80 PID 1892 wrote to memory of 4128 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 80 PID 1892 wrote to memory of 4128 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 80 PID 1892 wrote to memory of 1944 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 78 PID 1892 wrote to memory of 1944 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 78 PID 1892 wrote to memory of 1944 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 78 PID 1892 wrote to memory of 4140 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 77 PID 1892 wrote to memory of 4140 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 77 PID 1892 wrote to memory of 4140 1892 22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe 77 PID 4088 wrote to memory of 4592 4088 cmd.exe 96 PID 4088 wrote to memory of 4592 4088 cmd.exe 96 PID 4088 wrote to memory of 4592 4088 cmd.exe 96 PID 4092 wrote to memory of 4608 4092 cmd.exe 95 PID 4092 wrote to memory of 4608 4092 cmd.exe 95 PID 4092 wrote to memory of 4608 4092 cmd.exe 95 PID 3668 wrote to memory of 4600 3668 cmd.exe 94 PID 3668 wrote to memory of 4600 3668 cmd.exe 94 PID 3668 wrote to memory of 4600 3668 cmd.exe 94 PID 4480 wrote to memory of 4656 4480 cmd.exe 93 PID 4480 wrote to memory of 4656 4480 cmd.exe 93 PID 4480 wrote to memory of 4656 4480 cmd.exe 93 PID 2216 wrote to memory of 3656 2216 cmd.exe 90 PID 2216 wrote to memory of 3656 2216 cmd.exe 90 PID 2216 wrote to memory of 3656 2216 cmd.exe 90 PID 4560 wrote to memory of 4468 4560 cmd.exe 91 PID 4560 wrote to memory of 4468 4560 cmd.exe 91 PID 4560 wrote to memory of 4468 4560 cmd.exe 91 PID 3568 wrote to memory of 4672 3568 cmd.exe 92 PID 3568 wrote to memory of 4672 3568 cmd.exe 92 PID 3568 wrote to memory of 4672 3568 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"2⤵PID:5092
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"2⤵PID:4112
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"3⤵
- Creates scheduled task(s)
PID:3656
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"3⤵
- Creates scheduled task(s)
PID:4656
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"3⤵
- Creates scheduled task(s)
PID:4672
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8803" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"2⤵PID:4140
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9618" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"2⤵PID:1944
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5664" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"2⤵PID:4128
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2398" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2398" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"3⤵
- Creates scheduled task(s)
PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"3⤵
- Creates scheduled task(s)
PID:4592
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"3⤵
- Creates scheduled task(s)
PID:4600
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\22e485e5fdcf561309989235dcaceab2374d5d7fd380b3b70e8d2222b112a412.exe"3⤵
- Creates scheduled task(s)
PID:4468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 13962⤵
- Program crash
PID:96
-