Analysis
-
max time kernel
109s -
max time network
117s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
26/09/2022, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe
-
Size
927KB
-
MD5
84b47858205c7c5c980babe75ac7fea0
-
SHA1
41ddba8c41789bdf4d9286298b4819a5d7317c15
-
SHA256
c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf
-
SHA512
852e59c20a3a0603b2ba0ccd3c88a31194e4d0972bddec168615453a780a46cbaf72e80aa0737e024a22ac65b4c6695ba6818caba0b31e2f87424ec2ce5ffd00
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe" c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 856 2300 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4784 schtasks.exe 4236 schtasks.exe 4748 schtasks.exe 3476 schtasks.exe 4224 schtasks.exe 4752 schtasks.exe 3972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2300 wrote to memory of 5072 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 66 PID 2300 wrote to memory of 5072 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 66 PID 2300 wrote to memory of 5072 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 66 PID 2300 wrote to memory of 5108 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 67 PID 2300 wrote to memory of 5108 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 67 PID 2300 wrote to memory of 5108 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 67 PID 2300 wrote to memory of 1412 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 74 PID 2300 wrote to memory of 1412 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 74 PID 2300 wrote to memory of 1412 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 74 PID 2300 wrote to memory of 3312 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 73 PID 2300 wrote to memory of 3312 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 73 PID 2300 wrote to memory of 3312 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 73 PID 2300 wrote to memory of 956 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 68 PID 2300 wrote to memory of 956 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 68 PID 2300 wrote to memory of 956 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 68 PID 2300 wrote to memory of 1944 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 71 PID 2300 wrote to memory of 1944 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 71 PID 2300 wrote to memory of 1944 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 71 PID 2300 wrote to memory of 3068 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 70 PID 2300 wrote to memory of 3068 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 70 PID 2300 wrote to memory of 3068 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 70 PID 2300 wrote to memory of 3360 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 95 PID 2300 wrote to memory of 3360 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 95 PID 2300 wrote to memory of 3360 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 95 PID 2300 wrote to memory of 4112 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 75 PID 2300 wrote to memory of 4112 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 75 PID 2300 wrote to memory of 4112 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 75 PID 2300 wrote to memory of 1660 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 76 PID 2300 wrote to memory of 1660 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 76 PID 2300 wrote to memory of 1660 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 76 PID 2300 wrote to memory of 1012 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 85 PID 2300 wrote to memory of 1012 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 85 PID 2300 wrote to memory of 1012 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 85 PID 2300 wrote to memory of 4140 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 84 PID 2300 wrote to memory of 4140 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 84 PID 2300 wrote to memory of 4140 2300 c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe 84 PID 4112 wrote to memory of 4224 4112 cmd.exe 92 PID 4112 wrote to memory of 4224 4112 cmd.exe 92 PID 4112 wrote to memory of 4224 4112 cmd.exe 92 PID 1012 wrote to memory of 4784 1012 cmd.exe 88 PID 1012 wrote to memory of 4784 1012 cmd.exe 88 PID 1012 wrote to memory of 4784 1012 cmd.exe 88 PID 5072 wrote to memory of 3476 5072 cmd.exe 91 PID 5072 wrote to memory of 3476 5072 cmd.exe 91 PID 5072 wrote to memory of 3476 5072 cmd.exe 91 PID 956 wrote to memory of 4752 956 cmd.exe 93 PID 956 wrote to memory of 4752 956 cmd.exe 93 PID 956 wrote to memory of 4752 956 cmd.exe 93 PID 4140 wrote to memory of 4748 4140 cmd.exe 90 PID 4140 wrote to memory of 4748 4140 cmd.exe 90 PID 4140 wrote to memory of 4748 4140 cmd.exe 90 PID 1412 wrote to memory of 4236 1412 cmd.exe 89 PID 1412 wrote to memory of 4236 1412 cmd.exe 89 PID 1412 wrote to memory of 4236 1412 cmd.exe 89 PID 1660 wrote to memory of 3972 1660 cmd.exe 96 PID 1660 wrote to memory of 3972 1660 cmd.exe 96 PID 1660 wrote to memory of 3972 1660 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"3⤵
- Creates scheduled task(s)
PID:3476
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"2⤵PID:5108
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"3⤵
- Creates scheduled task(s)
PID:4752
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"2⤵PID:3068
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"2⤵PID:1944
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"2⤵PID:3312
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"3⤵
- Creates scheduled task(s)
PID:4236
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3743" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3743" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"3⤵
- Creates scheduled task(s)
PID:4224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9825" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9825" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"3⤵
- Creates scheduled task(s)
PID:3972
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6712" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6712" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"3⤵
- Creates scheduled task(s)
PID:4748
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk379" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk379" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"3⤵
- Creates scheduled task(s)
PID:4784
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\c9df20f58e7826e18179170361502b4edf66ebc3057604ee2e3994e5983062cf.exe"2⤵PID:3360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 13962⤵
- Program crash
PID:856
-