Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2022, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe
Resource
win10-20220812-en
General
-
Target
c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe
-
Size
906KB
-
MD5
8589d057c83fdf6a889352aff0998c93
-
SHA1
0b38ee61f53061ed16994df1175d5a504f2e9850
-
SHA256
c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920
-
SHA512
6c0c0dcbe2b5820c7010cf7ecec9c813fc02693527fefd07f2ef1b1eec876759e280ba323ebf8c506c9f2ed5985038270db537126a2e3ab01ecd8559b171d627
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe" c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4856 2512 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4424 schtasks.exe 4836 schtasks.exe 4844 schtasks.exe 4180 schtasks.exe 4184 schtasks.exe 1804 schtasks.exe 3720 schtasks.exe 4252 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2512 wrote to memory of 4000 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 66 PID 2512 wrote to memory of 4000 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 66 PID 2512 wrote to memory of 4000 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 66 PID 2512 wrote to memory of 3412 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 67 PID 2512 wrote to memory of 3412 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 67 PID 2512 wrote to memory of 3412 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 67 PID 2512 wrote to memory of 3308 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 68 PID 2512 wrote to memory of 3308 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 68 PID 2512 wrote to memory of 3308 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 68 PID 2512 wrote to memory of 3580 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 74 PID 2512 wrote to memory of 3580 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 74 PID 2512 wrote to memory of 3580 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 74 PID 2512 wrote to memory of 4576 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 73 PID 2512 wrote to memory of 4576 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 73 PID 2512 wrote to memory of 4576 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 73 PID 2512 wrote to memory of 1100 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 69 PID 2512 wrote to memory of 1100 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 69 PID 2512 wrote to memory of 1100 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 69 PID 2512 wrote to memory of 2412 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 72 PID 2512 wrote to memory of 2412 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 72 PID 2512 wrote to memory of 2412 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 72 PID 2512 wrote to memory of 3472 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 75 PID 2512 wrote to memory of 3472 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 75 PID 2512 wrote to memory of 3472 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 75 PID 2512 wrote to memory of 4060 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 77 PID 2512 wrote to memory of 4060 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 77 PID 2512 wrote to memory of 4060 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 77 PID 2512 wrote to memory of 4556 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 79 PID 2512 wrote to memory of 4556 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 79 PID 2512 wrote to memory of 4556 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 79 PID 2512 wrote to memory of 1016 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 80 PID 2512 wrote to memory of 1016 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 80 PID 2512 wrote to memory of 1016 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 80 PID 2512 wrote to memory of 4768 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 81 PID 2512 wrote to memory of 4768 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 81 PID 2512 wrote to memory of 4768 2512 c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe 81 PID 3580 wrote to memory of 4184 3580 cmd.exe 97 PID 3580 wrote to memory of 4184 3580 cmd.exe 97 PID 3580 wrote to memory of 4184 3580 cmd.exe 97 PID 4768 wrote to memory of 4844 4768 cmd.exe 95 PID 4768 wrote to memory of 4844 4768 cmd.exe 95 PID 4768 wrote to memory of 4844 4768 cmd.exe 95 PID 4000 wrote to memory of 4180 4000 cmd.exe 96 PID 4000 wrote to memory of 4180 4000 cmd.exe 96 PID 4000 wrote to memory of 4180 4000 cmd.exe 96 PID 4576 wrote to memory of 4836 4576 cmd.exe 94 PID 4576 wrote to memory of 4836 4576 cmd.exe 94 PID 4576 wrote to memory of 4836 4576 cmd.exe 94 PID 1100 wrote to memory of 4424 1100 cmd.exe 93 PID 1100 wrote to memory of 4424 1100 cmd.exe 93 PID 1100 wrote to memory of 4424 1100 cmd.exe 93 PID 1016 wrote to memory of 4252 1016 cmd.exe 92 PID 1016 wrote to memory of 4252 1016 cmd.exe 92 PID 1016 wrote to memory of 4252 1016 cmd.exe 92 PID 4060 wrote to memory of 1804 4060 cmd.exe 90 PID 4060 wrote to memory of 1804 4060 cmd.exe 90 PID 4060 wrote to memory of 1804 4060 cmd.exe 90 PID 2412 wrote to memory of 3720 2412 cmd.exe 91 PID 2412 wrote to memory of 3720 2412 cmd.exe 91 PID 2412 wrote to memory of 3720 2412 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"3⤵
- Creates scheduled task(s)
PID:4180
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"2⤵PID:3412
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"2⤵PID:3308
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"3⤵
- Creates scheduled task(s)
PID:4424
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"3⤵
- Creates scheduled task(s)
PID:3720
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"3⤵
- Creates scheduled task(s)
PID:4836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"3⤵
- Creates scheduled task(s)
PID:4184
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"2⤵PID:3472
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2837" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2837" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"3⤵
- Creates scheduled task(s)
PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk145" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"2⤵PID:4556
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1584" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1584" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"3⤵
- Creates scheduled task(s)
PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7123" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7123" /TR "C:\Users\Admin\AppData\Local\Temp\c546314674785a472c61490c05146ec7cf76a74e8d335dfdaa77fb71697b7920.exe"3⤵
- Creates scheduled task(s)
PID:4844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 13842⤵
- Program crash
PID:4856
-