Analysis
-
max time kernel
53s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16-09-2022 19:13
Static task
static1
Behavioral task
behavioral1
Sample
65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe
Resource
win10-20220812-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe
-
Size
900KB
-
MD5
1c3af6ad5693755eb878404a014e143f
-
SHA1
7c43d21b0b5ee303f30d3ccc9cd353849c2c9242
-
SHA256
65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673
-
SHA512
ec42a2dc82dc69c80621974ea5f51c0589a3874dfd610ec05bec5b96c08b8ac675ba784c3b56d7ed9d70e4fa4845774d8488d45a106d7f15c236caf5d96187b7
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe" 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1480 2700 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2292 schtasks.exe 3188 schtasks.exe 4304 schtasks.exe 3024 schtasks.exe 4784 schtasks.exe 3924 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2700 wrote to memory of 4752 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 66 PID 2700 wrote to memory of 4752 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 66 PID 2700 wrote to memory of 4752 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 66 PID 2700 wrote to memory of 2172 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 67 PID 2700 wrote to memory of 2172 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 67 PID 2700 wrote to memory of 2172 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 67 PID 2700 wrote to memory of 2088 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 88 PID 2700 wrote to memory of 2088 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 88 PID 2700 wrote to memory of 2088 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 88 PID 2700 wrote to memory of 4768 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 68 PID 2700 wrote to memory of 4768 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 68 PID 2700 wrote to memory of 4768 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 68 PID 2700 wrote to memory of 4832 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 69 PID 2700 wrote to memory of 4832 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 69 PID 2700 wrote to memory of 4832 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 69 PID 2700 wrote to memory of 5020 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 70 PID 2700 wrote to memory of 5020 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 70 PID 2700 wrote to memory of 5020 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 70 PID 2700 wrote to memory of 4188 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 86 PID 2700 wrote to memory of 4188 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 86 PID 2700 wrote to memory of 4188 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 86 PID 2700 wrote to memory of 3504 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 85 PID 2700 wrote to memory of 3504 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 85 PID 2700 wrote to memory of 3504 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 85 PID 2700 wrote to memory of 2672 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 71 PID 2700 wrote to memory of 2672 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 71 PID 2700 wrote to memory of 2672 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 71 PID 2700 wrote to memory of 1136 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 72 PID 2700 wrote to memory of 1136 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 72 PID 2700 wrote to memory of 1136 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 72 PID 2700 wrote to memory of 4064 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 81 PID 2700 wrote to memory of 4064 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 81 PID 2700 wrote to memory of 4064 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 81 PID 2700 wrote to memory of 3584 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 74 PID 2700 wrote to memory of 3584 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 74 PID 2700 wrote to memory of 3584 2700 65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe 74 PID 5020 wrote to memory of 4784 5020 cmd.exe 94 PID 5020 wrote to memory of 4784 5020 cmd.exe 94 PID 5020 wrote to memory of 4784 5020 cmd.exe 94 PID 4768 wrote to memory of 3924 4768 cmd.exe 89 PID 4768 wrote to memory of 3924 4768 cmd.exe 89 PID 4768 wrote to memory of 3924 4768 cmd.exe 89 PID 4832 wrote to memory of 2292 4832 cmd.exe 90 PID 4832 wrote to memory of 2292 4832 cmd.exe 90 PID 4832 wrote to memory of 2292 4832 cmd.exe 90 PID 4752 wrote to memory of 3024 4752 cmd.exe 93 PID 4752 wrote to memory of 3024 4752 cmd.exe 93 PID 4752 wrote to memory of 3024 4752 cmd.exe 93 PID 2172 wrote to memory of 3188 2172 cmd.exe 91 PID 2172 wrote to memory of 3188 2172 cmd.exe 91 PID 2172 wrote to memory of 3188 2172 cmd.exe 91 PID 4188 wrote to memory of 4304 4188 cmd.exe 92 PID 4188 wrote to memory of 4304 4188 cmd.exe 92 PID 4188 wrote to memory of 4304 4188 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"3⤵
- Creates scheduled task(s)
PID:3024
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"3⤵
- Creates scheduled task(s)
PID:3188
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"3⤵
- Creates scheduled task(s)
PID:3924
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"3⤵
- Creates scheduled task(s)
PID:2292
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"3⤵
- Creates scheduled task(s)
PID:4784
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5909" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"2⤵PID:2672
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4559" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"2⤵PID:1136
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4375" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"2⤵PID:3584
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9044" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"2⤵PID:4064
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"2⤵PID:3504
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"3⤵
- Creates scheduled task(s)
PID:4304
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\65fc9a02b5c5299c9f3085df7aa71177fb709343f7fd22e489b7b5f1bd88a673.exe"2⤵PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 13202⤵
- Program crash
PID:1480
-