Analysis
-
max time kernel
57s -
max time network
120s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
27/09/2022, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe
Resource
win10-20220812-en
6 signatures
150 seconds
General
-
Target
287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe
-
Size
928KB
-
MD5
372de8a615bc51bf9e487308d5762b47
-
SHA1
bb018ad86753656b1d8e70588ef6feca97d90c5c
-
SHA256
287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858
-
SHA512
d365d265a3b2a066fb5a7bd26abbea6b24de7b429cb0f5375bb1af8bfd951401da2cdc51d91da3dcffdb83a7049e6f04a32bdf48afd54b21e8a9567668e61d9e
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe" 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2304 2584 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4840 schtasks.exe 4552 schtasks.exe 3916 schtasks.exe 2240 schtasks.exe 4824 schtasks.exe 3992 schtasks.exe 1932 schtasks.exe 4464 schtasks.exe 4084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2584 wrote to memory of 1976 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 66 PID 2584 wrote to memory of 1976 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 66 PID 2584 wrote to memory of 1976 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 66 PID 2584 wrote to memory of 60 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 67 PID 2584 wrote to memory of 60 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 67 PID 2584 wrote to memory of 60 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 67 PID 2584 wrote to memory of 2092 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 68 PID 2584 wrote to memory of 2092 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 68 PID 2584 wrote to memory of 2092 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 68 PID 2584 wrote to memory of 4812 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 69 PID 2584 wrote to memory of 4812 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 69 PID 2584 wrote to memory of 4812 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 69 PID 2584 wrote to memory of 392 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 70 PID 2584 wrote to memory of 392 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 70 PID 2584 wrote to memory of 392 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 70 PID 2584 wrote to memory of 1588 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 71 PID 2584 wrote to memory of 1588 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 71 PID 2584 wrote to memory of 1588 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 71 PID 2584 wrote to memory of 5060 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 72 PID 2584 wrote to memory of 5060 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 72 PID 2584 wrote to memory of 5060 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 72 PID 2584 wrote to memory of 4280 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 74 PID 2584 wrote to memory of 4280 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 74 PID 2584 wrote to memory of 4280 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 74 PID 2584 wrote to memory of 3316 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 75 PID 2584 wrote to memory of 3316 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 75 PID 2584 wrote to memory of 3316 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 75 PID 2584 wrote to memory of 2340 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 76 PID 2584 wrote to memory of 2340 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 76 PID 2584 wrote to memory of 2340 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 76 PID 2584 wrote to memory of 4060 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 87 PID 2584 wrote to memory of 4060 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 87 PID 2584 wrote to memory of 4060 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 87 PID 2584 wrote to memory of 1324 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 86 PID 2584 wrote to memory of 1324 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 86 PID 2584 wrote to memory of 1324 2584 287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe 86 PID 4060 wrote to memory of 4840 4060 cmd.exe 97 PID 4060 wrote to memory of 4840 4060 cmd.exe 97 PID 4060 wrote to memory of 4840 4060 cmd.exe 97 PID 1976 wrote to memory of 4084 1976 cmd.exe 98 PID 1976 wrote to memory of 4084 1976 cmd.exe 98 PID 1976 wrote to memory of 4084 1976 cmd.exe 98 PID 2092 wrote to memory of 4824 2092 cmd.exe 96 PID 2092 wrote to memory of 4824 2092 cmd.exe 96 PID 2092 wrote to memory of 4824 2092 cmd.exe 96 PID 2340 wrote to memory of 4464 2340 cmd.exe 95 PID 2340 wrote to memory of 4464 2340 cmd.exe 95 PID 2340 wrote to memory of 4464 2340 cmd.exe 95 PID 3316 wrote to memory of 2240 3316 cmd.exe 94 PID 3316 wrote to memory of 2240 3316 cmd.exe 94 PID 3316 wrote to memory of 2240 3316 cmd.exe 94 PID 1588 wrote to memory of 3916 1588 cmd.exe 93 PID 1588 wrote to memory of 3916 1588 cmd.exe 93 PID 1588 wrote to memory of 3916 1588 cmd.exe 93 PID 60 wrote to memory of 1932 60 cmd.exe 92 PID 60 wrote to memory of 1932 60 cmd.exe 92 PID 60 wrote to memory of 1932 60 cmd.exe 92 PID 5060 wrote to memory of 4552 5060 cmd.exe 90 PID 5060 wrote to memory of 4552 5060 cmd.exe 90 PID 5060 wrote to memory of 4552 5060 cmd.exe 90 PID 4812 wrote to memory of 3992 4812 cmd.exe 91 PID 4812 wrote to memory of 3992 4812 cmd.exe 91 PID 4812 wrote to memory of 3992 4812 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"3⤵
- Creates scheduled task(s)
PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"3⤵
- Creates scheduled task(s)
PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"3⤵
- Creates scheduled task(s)
PID:4824
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"3⤵
- Creates scheduled task(s)
PID:3992
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"2⤵PID:392
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"3⤵
- Creates scheduled task(s)
PID:3916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"3⤵
- Creates scheduled task(s)
PID:4552
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"2⤵PID:4280
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2312" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2312" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"3⤵
- Creates scheduled task(s)
PID:2240
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6567" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6567" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"3⤵
- Creates scheduled task(s)
PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6798" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"2⤵PID:1324
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk7874" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk7874" /TR "C:\Users\Admin\AppData\Local\Temp\287a64885bad51063a95951a803f03f08e5641eaf49fc06c65fe751f5642a858.exe"3⤵
- Creates scheduled task(s)
PID:4840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 13162⤵
- Program crash
PID:2304
-