Analysis
-
max time kernel
52s -
max time network
118s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2022, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe
Resource
win10-20220901-en
6 signatures
150 seconds
General
-
Target
c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe
-
Size
905KB
-
MD5
60dbca6489b1b9e93f1b355bcd1d2ae6
-
SHA1
38857570bd5ffd1fdc432350e334b2af73ba36cc
-
SHA256
c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f
-
SHA512
24a2226b2d5bda658c66656b41e680202ed74bc137bfef6344bd65d332fb2f063a9778d8caf2eb650645f6934ccc83facfdacb58a5e599b51e5a58031eb59d69
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe" c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1132 4796 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4536 schtasks.exe 4656 schtasks.exe 4972 schtasks.exe 4036 schtasks.exe 4908 schtasks.exe 5072 schtasks.exe 4000 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4300 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 66 PID 4796 wrote to memory of 4300 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 66 PID 4796 wrote to memory of 4300 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 66 PID 4796 wrote to memory of 3480 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 67 PID 4796 wrote to memory of 3480 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 67 PID 4796 wrote to memory of 3480 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 67 PID 4796 wrote to memory of 3548 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 68 PID 4796 wrote to memory of 3548 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 68 PID 4796 wrote to memory of 3548 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 68 PID 4796 wrote to memory of 5020 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 88 PID 4796 wrote to memory of 5020 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 88 PID 4796 wrote to memory of 5020 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 88 PID 4796 wrote to memory of 1968 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 87 PID 4796 wrote to memory of 1968 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 87 PID 4796 wrote to memory of 1968 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 87 PID 4796 wrote to memory of 2712 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 86 PID 4796 wrote to memory of 2712 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 86 PID 4796 wrote to memory of 2712 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 86 PID 4796 wrote to memory of 4040 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 84 PID 4796 wrote to memory of 4040 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 84 PID 4796 wrote to memory of 4040 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 84 PID 4796 wrote to memory of 4932 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 69 PID 4796 wrote to memory of 4932 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 69 PID 4796 wrote to memory of 4932 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 69 PID 4796 wrote to memory of 1092 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 70 PID 4796 wrote to memory of 1092 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 70 PID 4796 wrote to memory of 1092 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 70 PID 4796 wrote to memory of 4364 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 82 PID 4796 wrote to memory of 4364 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 82 PID 4796 wrote to memory of 4364 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 82 PID 4796 wrote to memory of 4460 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 76 PID 4796 wrote to memory of 4460 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 76 PID 4796 wrote to memory of 4460 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 76 PID 4796 wrote to memory of 4848 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 75 PID 4796 wrote to memory of 4848 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 75 PID 4796 wrote to memory of 4848 4796 c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe 75 PID 1092 wrote to memory of 4972 1092 cmd.exe 96 PID 1092 wrote to memory of 4972 1092 cmd.exe 96 PID 1092 wrote to memory of 4972 1092 cmd.exe 96 PID 5020 wrote to memory of 4036 5020 cmd.exe 90 PID 5020 wrote to memory of 4036 5020 cmd.exe 90 PID 5020 wrote to memory of 4036 5020 cmd.exe 90 PID 4040 wrote to memory of 5072 4040 cmd.exe 92 PID 4040 wrote to memory of 5072 4040 cmd.exe 92 PID 4040 wrote to memory of 5072 4040 cmd.exe 92 PID 3548 wrote to memory of 4908 3548 cmd.exe 91 PID 3548 wrote to memory of 4908 3548 cmd.exe 91 PID 3548 wrote to memory of 4908 3548 cmd.exe 91 PID 4300 wrote to memory of 4000 4300 cmd.exe 93 PID 4300 wrote to memory of 4000 4300 cmd.exe 93 PID 4300 wrote to memory of 4000 4300 cmd.exe 93 PID 4932 wrote to memory of 4536 4932 cmd.exe 94 PID 4932 wrote to memory of 4536 4932 cmd.exe 94 PID 4932 wrote to memory of 4536 4932 cmd.exe 94 PID 4364 wrote to memory of 4656 4364 cmd.exe 95 PID 4364 wrote to memory of 4656 4364 cmd.exe 95 PID 4364 wrote to memory of 4656 4364 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"3⤵
- Creates scheduled task(s)
PID:4000
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"2⤵PID:3480
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"3⤵
- Creates scheduled task(s)
PID:4908
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"3⤵
- Creates scheduled task(s)
PID:4536
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5083" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5083" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"3⤵
- Creates scheduled task(s)
PID:4972
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk548" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"2⤵PID:4848
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1611" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"2⤵PID:4460
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8109" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8109" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"3⤵
- Creates scheduled task(s)
PID:4656
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"3⤵
- Creates scheduled task(s)
PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"2⤵PID:2712
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"2⤵PID:1968
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\c1ccdefda38e022065640ef4f6be1711fc6fe6600a79a4f54166f070a1ca731f.exe"3⤵
- Creates scheduled task(s)
PID:4036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 13202⤵
- Program crash
PID:1132
-