Analysis
-
max time kernel
51s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2022, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe
-
Size
904KB
-
MD5
be5796557f7323b5d6f75cc7645851a1
-
SHA1
4ece7fe8cba6bd471df1a75d6bc3bf7607b7884d
-
SHA256
f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10
-
SHA512
952c2430be0caaa69d449f58793192df9932cba36dcaa95c4dea813078c579186728f6df43364854c0c91ce2c47c774d0605795e62fb1def1cd7cd5f7b883ca1
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe" f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 96 3004 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4632 schtasks.exe 2496 schtasks.exe 3600 schtasks.exe 4604 schtasks.exe 4308 schtasks.exe 5100 schtasks.exe 3372 schtasks.exe 5076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 3004 wrote to memory of 4864 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 66 PID 3004 wrote to memory of 4864 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 66 PID 3004 wrote to memory of 4864 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 66 PID 3004 wrote to memory of 4876 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 67 PID 3004 wrote to memory of 4876 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 67 PID 3004 wrote to memory of 4876 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 67 PID 3004 wrote to memory of 4888 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 68 PID 3004 wrote to memory of 4888 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 68 PID 3004 wrote to memory of 4888 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 68 PID 3004 wrote to memory of 2344 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 69 PID 3004 wrote to memory of 2344 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 69 PID 3004 wrote to memory of 2344 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 69 PID 3004 wrote to memory of 3460 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 78 PID 3004 wrote to memory of 3460 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 78 PID 3004 wrote to memory of 3460 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 78 PID 3004 wrote to memory of 3360 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 77 PID 3004 wrote to memory of 3360 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 77 PID 3004 wrote to memory of 3360 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 77 PID 3004 wrote to memory of 2328 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 70 PID 3004 wrote to memory of 2328 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 70 PID 3004 wrote to memory of 2328 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 70 PID 3004 wrote to memory of 3852 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 71 PID 3004 wrote to memory of 3852 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 71 PID 3004 wrote to memory of 3852 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 71 PID 3004 wrote to memory of 340 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 72 PID 3004 wrote to memory of 340 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 72 PID 3004 wrote to memory of 340 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 72 PID 3004 wrote to memory of 4912 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 86 PID 3004 wrote to memory of 4912 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 86 PID 3004 wrote to memory of 4912 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 86 PID 3004 wrote to memory of 4288 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 84 PID 3004 wrote to memory of 4288 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 84 PID 3004 wrote to memory of 4288 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 84 PID 3004 wrote to memory of 3616 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 81 PID 3004 wrote to memory of 3616 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 81 PID 3004 wrote to memory of 3616 3004 f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe 81 PID 3460 wrote to memory of 4308 3460 cmd.exe 96 PID 3460 wrote to memory of 4308 3460 cmd.exe 96 PID 3460 wrote to memory of 4308 3460 cmd.exe 96 PID 4864 wrote to memory of 3600 4864 cmd.exe 94 PID 4864 wrote to memory of 3600 4864 cmd.exe 94 PID 4864 wrote to memory of 3600 4864 cmd.exe 94 PID 4876 wrote to memory of 4604 4876 cmd.exe 95 PID 4876 wrote to memory of 4604 4876 cmd.exe 95 PID 4876 wrote to memory of 4604 4876 cmd.exe 95 PID 340 wrote to memory of 2496 340 cmd.exe 93 PID 340 wrote to memory of 2496 340 cmd.exe 93 PID 340 wrote to memory of 2496 340 cmd.exe 93 PID 3616 wrote to memory of 4632 3616 cmd.exe 92 PID 3616 wrote to memory of 4632 3616 cmd.exe 92 PID 3616 wrote to memory of 4632 3616 cmd.exe 92 PID 3852 wrote to memory of 3372 3852 cmd.exe 90 PID 3852 wrote to memory of 3372 3852 cmd.exe 90 PID 3852 wrote to memory of 3372 3852 cmd.exe 90 PID 3360 wrote to memory of 5076 3360 cmd.exe 91 PID 3360 wrote to memory of 5076 3360 cmd.exe 91 PID 3360 wrote to memory of 5076 3360 cmd.exe 91 PID 4912 wrote to memory of 5100 4912 cmd.exe 97 PID 4912 wrote to memory of 5100 4912 cmd.exe 97 PID 4912 wrote to memory of 5100 4912 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"3⤵
- Creates scheduled task(s)
PID:3600
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"3⤵
- Creates scheduled task(s)
PID:4604
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"2⤵PID:4888
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"2⤵PID:2344
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"2⤵PID:2328
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"3⤵
- Creates scheduled task(s)
PID:3372
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6891" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6891" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"3⤵
- Creates scheduled task(s)
PID:2496
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"3⤵
- Creates scheduled task(s)
PID:5076
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"3⤵
- Creates scheduled task(s)
PID:4308
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2690" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2690" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"3⤵
- Creates scheduled task(s)
PID:4632
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4436" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"2⤵PID:4288
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9531" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9531" /TR "C:\Users\Admin\AppData\Local\Temp\f65799e70cfd70ffd24285b3226ecddd9b39a14391515e0325175eeab5ffea10.exe"3⤵
- Creates scheduled task(s)
PID:5100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 13162⤵
- Program crash
PID:96
-