Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
11-09-2022 02:25
Static task
static1
Behavioral task
behavioral1
Sample
60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe
Resource
win10-20220901-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe
-
Size
889KB
-
MD5
6270aa578eeaeb170ab639d23e06c869
-
SHA1
1ad71d26c2dc48bd79a5d9f3d3dc7fc6fb23dcfb
-
SHA256
60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2
-
SHA512
bcd7e9da9bf9700e89da0ef7ddcd679084f9335c24c2200ec95fd557d2e6a47f5d64730e14380efa305231d63a21102fdf8e7fbcb6fe34057cf0b1b9c1d60963
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe" 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2108 3260 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4856 schtasks.exe 3068 schtasks.exe 4700 schtasks.exe 1924 schtasks.exe 4168 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 3260 wrote to memory of 3104 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 66 PID 3260 wrote to memory of 3104 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 66 PID 3260 wrote to memory of 3104 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 66 PID 3260 wrote to memory of 528 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 67 PID 3260 wrote to memory of 528 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 67 PID 3260 wrote to memory of 528 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 67 PID 3260 wrote to memory of 824 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 71 PID 3260 wrote to memory of 824 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 71 PID 3260 wrote to memory of 824 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 71 PID 3260 wrote to memory of 4080 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 68 PID 3260 wrote to memory of 4080 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 68 PID 3260 wrote to memory of 4080 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 68 PID 3260 wrote to memory of 4400 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 70 PID 3260 wrote to memory of 4400 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 70 PID 3260 wrote to memory of 4400 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 70 PID 3260 wrote to memory of 2364 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 69 PID 3260 wrote to memory of 2364 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 69 PID 3260 wrote to memory of 2364 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 69 PID 3260 wrote to memory of 4384 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 72 PID 3260 wrote to memory of 4384 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 72 PID 3260 wrote to memory of 4384 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 72 PID 3260 wrote to memory of 4364 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 84 PID 3260 wrote to memory of 4364 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 84 PID 3260 wrote to memory of 4364 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 84 PID 3260 wrote to memory of 5048 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 82 PID 3260 wrote to memory of 5048 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 82 PID 3260 wrote to memory of 5048 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 82 PID 3260 wrote to memory of 4632 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 80 PID 3260 wrote to memory of 4632 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 80 PID 3260 wrote to memory of 4632 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 80 PID 3260 wrote to memory of 4584 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 78 PID 3260 wrote to memory of 4584 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 78 PID 3260 wrote to memory of 4584 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 78 PID 3260 wrote to memory of 4256 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 77 PID 3260 wrote to memory of 4256 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 77 PID 3260 wrote to memory of 4256 3260 60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe 77 PID 2364 wrote to memory of 4856 2364 cmd.exe 91 PID 2364 wrote to memory of 4856 2364 cmd.exe 91 PID 2364 wrote to memory of 4856 2364 cmd.exe 91 PID 4400 wrote to memory of 4168 4400 cmd.exe 90 PID 4400 wrote to memory of 4168 4400 cmd.exe 90 PID 4400 wrote to memory of 4168 4400 cmd.exe 90 PID 824 wrote to memory of 3068 824 cmd.exe 92 PID 824 wrote to memory of 3068 824 cmd.exe 92 PID 824 wrote to memory of 3068 824 cmd.exe 92 PID 4364 wrote to memory of 1924 4364 cmd.exe 94 PID 4364 wrote to memory of 1924 4364 cmd.exe 94 PID 4364 wrote to memory of 1924 4364 cmd.exe 94 PID 4384 wrote to memory of 4700 4384 cmd.exe 93 PID 4384 wrote to memory of 4700 4384 cmd.exe 93 PID 4384 wrote to memory of 4700 4384 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"2⤵PID:3104
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"2⤵PID:528
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"2⤵PID:4080
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"3⤵
- Creates scheduled task(s)
PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"3⤵
- Creates scheduled task(s)
PID:4168
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"3⤵
- Creates scheduled task(s)
PID:3068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"3⤵
- Creates scheduled task(s)
PID:4700
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3280" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"2⤵PID:4256
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5167" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"2⤵PID:4584
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6189" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"2⤵PID:4632
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6512" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"2⤵PID:5048
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\60e16614070e2a53011c94a03f39f7d0b9a11cfbb13770b7fd2f6057ea4886e2.exe"3⤵
- Creates scheduled task(s)
PID:1924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 13842⤵
- Program crash
PID:2108
-