Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
52s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2022, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe
Resource
win10-20220901-en
General
-
Target
f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe
-
Size
906KB
-
MD5
c9a5b6880ad1e367d7c91633f8065728
-
SHA1
0cd344dec5a3b32b835a097c2001a8980820346a
-
SHA256
f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666
-
SHA512
1953188c4837d08ec8b23c0f0c1ec7df23be0af26a17dadfd8dd7aa4daad1037062b6e6d2f0d8b11e758ca64966a47f6c48a177bb1ef49b219e6d74958d21329
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe" f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4844 2692 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1500 schtasks.exe 4796 schtasks.exe 4272 schtasks.exe 5100 schtasks.exe 5028 schtasks.exe 5036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4240 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 66 PID 2692 wrote to memory of 4240 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 66 PID 2692 wrote to memory of 4240 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 66 PID 2692 wrote to memory of 4368 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 67 PID 2692 wrote to memory of 4368 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 67 PID 2692 wrote to memory of 4368 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 67 PID 2692 wrote to memory of 1268 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 68 PID 2692 wrote to memory of 1268 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 68 PID 2692 wrote to memory of 1268 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 68 PID 2692 wrote to memory of 1916 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 69 PID 2692 wrote to memory of 1916 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 69 PID 2692 wrote to memory of 1916 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 69 PID 2692 wrote to memory of 2892 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 70 PID 2692 wrote to memory of 2892 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 70 PID 2692 wrote to memory of 2892 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 70 PID 2692 wrote to memory of 3568 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 85 PID 2692 wrote to memory of 3568 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 85 PID 2692 wrote to memory of 3568 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 85 PID 2692 wrote to memory of 4260 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 71 PID 2692 wrote to memory of 4260 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 71 PID 2692 wrote to memory of 4260 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 71 PID 2692 wrote to memory of 4980 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 72 PID 2692 wrote to memory of 4980 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 72 PID 2692 wrote to memory of 4980 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 72 PID 2692 wrote to memory of 4264 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 81 PID 2692 wrote to memory of 4264 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 81 PID 2692 wrote to memory of 4264 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 81 PID 2692 wrote to memory of 4524 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 79 PID 2692 wrote to memory of 4524 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 79 PID 2692 wrote to memory of 4524 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 79 PID 2692 wrote to memory of 708 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 74 PID 2692 wrote to memory of 708 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 74 PID 2692 wrote to memory of 708 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 74 PID 2692 wrote to memory of 3148 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 75 PID 2692 wrote to memory of 3148 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 75 PID 2692 wrote to memory of 3148 2692 f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe 75 PID 1268 wrote to memory of 5100 1268 cmd.exe 90 PID 1268 wrote to memory of 5100 1268 cmd.exe 90 PID 1268 wrote to memory of 5100 1268 cmd.exe 90 PID 3568 wrote to memory of 4272 3568 cmd.exe 89 PID 3568 wrote to memory of 4272 3568 cmd.exe 89 PID 3568 wrote to memory of 4272 3568 cmd.exe 89 PID 4368 wrote to memory of 5028 4368 cmd.exe 91 PID 4368 wrote to memory of 5028 4368 cmd.exe 91 PID 4368 wrote to memory of 5028 4368 cmd.exe 91 PID 4240 wrote to memory of 5036 4240 cmd.exe 92 PID 4240 wrote to memory of 5036 4240 cmd.exe 92 PID 4240 wrote to memory of 5036 4240 cmd.exe 92 PID 4980 wrote to memory of 1500 4980 cmd.exe 93 PID 4980 wrote to memory of 1500 4980 cmd.exe 93 PID 4980 wrote to memory of 1500 4980 cmd.exe 93 PID 3148 wrote to memory of 4796 3148 cmd.exe 94 PID 3148 wrote to memory of 4796 3148 cmd.exe 94 PID 3148 wrote to memory of 4796 3148 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"3⤵
- Creates scheduled task(s)
PID:5036
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"3⤵
- Creates scheduled task(s)
PID:5028
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"3⤵
- Creates scheduled task(s)
PID:5100
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"2⤵PID:1916
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"2⤵PID:2892
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"2⤵PID:4260
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"3⤵
- Creates scheduled task(s)
PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4473" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"2⤵PID:708
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3281" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3281" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"3⤵
- Creates scheduled task(s)
PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9271" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"2⤵PID:4524
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4276" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"2⤵PID:4264
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"3⤵
- Creates scheduled task(s)
PID:4272
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 13162⤵
- Program crash
PID:4844
-