Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
117s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2022, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe
Resource
win10-20220812-en
General
-
Target
a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe
-
Size
904KB
-
MD5
e8cd8f47e3ff1b70318d14646845c808
-
SHA1
1928177e019a197ca198705f11dd65cf3331fb3d
-
SHA256
a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94
-
SHA512
a8235dd12cb1ebe0d455db0776bab05c8763984e2eedf15ed81d79ac2e9dbc29c9c321a4c88bba59e904d753a54fb44e7cbd5e340bc32931952eb05faae78c3d
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe" a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3916 4152 WerFault.exe 66 -
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4980 schtasks.exe 4736 schtasks.exe 3012 schtasks.exe 3296 schtasks.exe 4724 schtasks.exe 4976 schtasks.exe 3252 schtasks.exe 4712 schtasks.exe 3176 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4152 wrote to memory of 5068 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 67 PID 4152 wrote to memory of 5068 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 67 PID 4152 wrote to memory of 5068 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 67 PID 4152 wrote to memory of 3500 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 68 PID 4152 wrote to memory of 3500 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 68 PID 4152 wrote to memory of 3500 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 68 PID 4152 wrote to memory of 3780 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 69 PID 4152 wrote to memory of 3780 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 69 PID 4152 wrote to memory of 3780 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 69 PID 4152 wrote to memory of 4636 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 70 PID 4152 wrote to memory of 4636 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 70 PID 4152 wrote to memory of 4636 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 70 PID 4152 wrote to memory of 1104 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 89 PID 4152 wrote to memory of 1104 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 89 PID 4152 wrote to memory of 1104 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 89 PID 4152 wrote to memory of 2528 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 71 PID 4152 wrote to memory of 2528 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 71 PID 4152 wrote to memory of 2528 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 71 PID 4152 wrote to memory of 3652 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 86 PID 4152 wrote to memory of 3652 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 86 PID 4152 wrote to memory of 3652 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 86 PID 4152 wrote to memory of 1508 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 85 PID 4152 wrote to memory of 1508 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 85 PID 4152 wrote to memory of 1508 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 85 PID 4152 wrote to memory of 4012 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 84 PID 4152 wrote to memory of 4012 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 84 PID 4152 wrote to memory of 4012 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 84 PID 4152 wrote to memory of 4652 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 74 PID 4152 wrote to memory of 4652 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 74 PID 4152 wrote to memory of 4652 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 74 PID 4152 wrote to memory of 3996 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 75 PID 4152 wrote to memory of 3996 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 75 PID 4152 wrote to memory of 3996 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 75 PID 4152 wrote to memory of 4216 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 76 PID 4152 wrote to memory of 4216 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 76 PID 4152 wrote to memory of 4216 4152 a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe 76 PID 3780 wrote to memory of 3296 3780 cmd.exe 98 PID 3780 wrote to memory of 3296 3780 cmd.exe 98 PID 3780 wrote to memory of 3296 3780 cmd.exe 98 PID 4636 wrote to memory of 3176 4636 cmd.exe 96 PID 4636 wrote to memory of 3176 4636 cmd.exe 96 PID 4636 wrote to memory of 3176 4636 cmd.exe 96 PID 4012 wrote to memory of 3012 4012 cmd.exe 97 PID 4012 wrote to memory of 3012 4012 cmd.exe 97 PID 4012 wrote to memory of 3012 4012 cmd.exe 97 PID 2528 wrote to memory of 4712 2528 cmd.exe 95 PID 2528 wrote to memory of 4712 2528 cmd.exe 95 PID 2528 wrote to memory of 4712 2528 cmd.exe 95 PID 1104 wrote to memory of 3252 1104 cmd.exe 94 PID 1104 wrote to memory of 3252 1104 cmd.exe 94 PID 1104 wrote to memory of 3252 1104 cmd.exe 94 PID 3652 wrote to memory of 4736 3652 cmd.exe 91 PID 3652 wrote to memory of 4736 3652 cmd.exe 91 PID 3652 wrote to memory of 4736 3652 cmd.exe 91 PID 4652 wrote to memory of 4724 4652 cmd.exe 92 PID 4652 wrote to memory of 4724 4652 cmd.exe 92 PID 4652 wrote to memory of 4724 4652 cmd.exe 92 PID 5068 wrote to memory of 4980 5068 cmd.exe 90 PID 5068 wrote to memory of 4980 5068 cmd.exe 90 PID 5068 wrote to memory of 4980 5068 cmd.exe 90 PID 3996 wrote to memory of 4976 3996 cmd.exe 93 PID 3996 wrote to memory of 4976 3996 cmd.exe 93 PID 3996 wrote to memory of 4976 3996 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"3⤵
- Creates scheduled task(s)
PID:4980
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"2⤵PID:3500
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"3⤵
- Creates scheduled task(s)
PID:3296
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"3⤵
- Creates scheduled task(s)
PID:3176
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"3⤵
- Creates scheduled task(s)
PID:4712
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7381" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7381" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"3⤵
- Creates scheduled task(s)
PID:4724
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4530" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4530" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"3⤵
- Creates scheduled task(s)
PID:4976
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4836" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"2⤵PID:4216
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk392" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk392" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"3⤵
- Creates scheduled task(s)
PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"2⤵PID:1508
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"3⤵
- Creates scheduled task(s)
PID:4736
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\a5b4a9e07712ee5b7c67061e57e3a1496ee5370009323752c855ce9fe3d26c94.exe"3⤵
- Creates scheduled task(s)
PID:3252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 13202⤵
- Program crash
PID:3916
-