Analysis
-
max time kernel
51s -
max time network
116s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
11/10/2022, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe
Resource
win10-20220901-en
6 signatures
150 seconds
General
-
Target
9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe
-
Size
966KB
-
MD5
746914171e3f95ac92e61a750ea189e4
-
SHA1
4fc78852214b52fb6476c7166c11f35192678a08
-
SHA256
9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91
-
SHA512
6666747129a878b3cc4ef51494a61ce2d2a2ebe62d6411ef6a355a9e480016176d6fc4c0384695308ac392369828558e5bb58f2d5db351ec3ddc5ae3fcf4ae52
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe" 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1688 2108 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4636 schtasks.exe 4888 schtasks.exe 4828 schtasks.exe 3920 schtasks.exe 4232 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2992 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 66 PID 2108 wrote to memory of 2992 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 66 PID 2108 wrote to memory of 2992 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 66 PID 2108 wrote to memory of 3580 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 67 PID 2108 wrote to memory of 3580 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 67 PID 2108 wrote to memory of 3580 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 67 PID 2108 wrote to memory of 3400 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 68 PID 2108 wrote to memory of 3400 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 68 PID 2108 wrote to memory of 3400 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 68 PID 2108 wrote to memory of 4512 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 84 PID 2108 wrote to memory of 4512 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 84 PID 2108 wrote to memory of 4512 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 84 PID 2108 wrote to memory of 4144 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 69 PID 2108 wrote to memory of 4144 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 69 PID 2108 wrote to memory of 4144 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 69 PID 2108 wrote to memory of 1308 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 83 PID 2108 wrote to memory of 1308 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 83 PID 2108 wrote to memory of 1308 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 83 PID 2108 wrote to memory of 3928 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 70 PID 2108 wrote to memory of 3928 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 70 PID 2108 wrote to memory of 3928 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 70 PID 2108 wrote to memory of 516 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 80 PID 2108 wrote to memory of 516 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 80 PID 2108 wrote to memory of 516 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 80 PID 2108 wrote to memory of 5108 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 72 PID 2108 wrote to memory of 5108 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 72 PID 2108 wrote to memory of 5108 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 72 PID 2108 wrote to memory of 5056 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 76 PID 2108 wrote to memory of 5056 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 76 PID 2108 wrote to memory of 5056 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 76 PID 2108 wrote to memory of 3940 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 75 PID 2108 wrote to memory of 3940 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 75 PID 2108 wrote to memory of 3940 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 75 PID 2108 wrote to memory of 2308 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 77 PID 2108 wrote to memory of 2308 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 77 PID 2108 wrote to memory of 2308 2108 9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe 77 PID 3580 wrote to memory of 4636 3580 cmd.exe 92 PID 3580 wrote to memory of 4636 3580 cmd.exe 92 PID 3580 wrote to memory of 4636 3580 cmd.exe 92 PID 3400 wrote to memory of 3920 3400 cmd.exe 90 PID 3400 wrote to memory of 3920 3400 cmd.exe 90 PID 3400 wrote to memory of 3920 3400 cmd.exe 90 PID 2992 wrote to memory of 4232 2992 cmd.exe 91 PID 2992 wrote to memory of 4232 2992 cmd.exe 91 PID 2992 wrote to memory of 4232 2992 cmd.exe 91 PID 4144 wrote to memory of 4888 4144 cmd.exe 93 PID 4144 wrote to memory of 4888 4144 cmd.exe 93 PID 4144 wrote to memory of 4888 4144 cmd.exe 93 PID 5056 wrote to memory of 4828 5056 cmd.exe 94 PID 5056 wrote to memory of 4828 5056 cmd.exe 94 PID 5056 wrote to memory of 4828 5056 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"3⤵
- Creates scheduled task(s)
PID:4232
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"3⤵
- Creates scheduled task(s)
PID:4636
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"3⤵
- Creates scheduled task(s)
PID:3920
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"3⤵
- Creates scheduled task(s)
PID:4888
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"2⤵PID:3928
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1135" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"2⤵PID:5108
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4983" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"2⤵PID:3940
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk2672" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk2672" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"3⤵
- Creates scheduled task(s)
PID:4828
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3693" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"2⤵PID:2308
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"2⤵PID:516
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"2⤵PID:1308
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\9717a95ca32b39f087b39137e07dde18d323097a913a2d22fc8198238b34ce91.exe"2⤵PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 13202⤵
- Program crash
PID:1688
-