Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
21/09/2022, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe
Resource
win10-20220812-en
General
-
Target
9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe
-
Size
914KB
-
MD5
d7f3d477ab32a7f3635c0306f5c4321b
-
SHA1
83a8f86a41fc1ea5199702216a54578920879023
-
SHA256
9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9
-
SHA512
34e7c6a1642da36ec9f3c5416b470226711f3130da7ecb499858691e8f9d68551d47986f29917013f5b8f39db74ae61787ab0bae77ed8469f2a48d876f3254d7
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe" 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 644 3876 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4776 schtasks.exe 2716 schtasks.exe 4276 schtasks.exe 3088 schtasks.exe 4652 schtasks.exe 3760 schtasks.exe 4724 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 3876 wrote to memory of 1996 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 66 PID 3876 wrote to memory of 1996 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 66 PID 3876 wrote to memory of 1996 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 66 PID 3876 wrote to memory of 4040 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 67 PID 3876 wrote to memory of 4040 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 67 PID 3876 wrote to memory of 4040 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 67 PID 3876 wrote to memory of 4060 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 68 PID 3876 wrote to memory of 4060 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 68 PID 3876 wrote to memory of 4060 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 68 PID 3876 wrote to memory of 4156 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 69 PID 3876 wrote to memory of 4156 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 69 PID 3876 wrote to memory of 4156 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 69 PID 3876 wrote to memory of 1456 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 70 PID 3876 wrote to memory of 1456 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 70 PID 3876 wrote to memory of 1456 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 70 PID 3876 wrote to memory of 3444 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 94 PID 3876 wrote to memory of 3444 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 94 PID 3876 wrote to memory of 3444 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 94 PID 3876 wrote to memory of 3584 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 72 PID 3876 wrote to memory of 3584 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 72 PID 3876 wrote to memory of 3584 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 72 PID 3876 wrote to memory of 4460 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 71 PID 3876 wrote to memory of 4460 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 71 PID 3876 wrote to memory of 4460 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 71 PID 3876 wrote to memory of 3904 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 93 PID 3876 wrote to memory of 3904 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 93 PID 3876 wrote to memory of 3904 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 93 PID 3876 wrote to memory of 4328 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 75 PID 3876 wrote to memory of 4328 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 75 PID 3876 wrote to memory of 4328 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 75 PID 3876 wrote to memory of 4036 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 76 PID 3876 wrote to memory of 4036 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 76 PID 3876 wrote to memory of 4036 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 76 PID 3876 wrote to memory of 4552 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 77 PID 3876 wrote to memory of 4552 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 77 PID 3876 wrote to memory of 4552 3876 9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe 77 PID 4328 wrote to memory of 4724 4328 cmd.exe 91 PID 4328 wrote to memory of 4724 4328 cmd.exe 91 PID 4328 wrote to memory of 4724 4328 cmd.exe 91 PID 3444 wrote to memory of 2716 3444 cmd.exe 86 PID 3444 wrote to memory of 2716 3444 cmd.exe 86 PID 3444 wrote to memory of 2716 3444 cmd.exe 86 PID 3584 wrote to memory of 3760 3584 cmd.exe 90 PID 3584 wrote to memory of 3760 3584 cmd.exe 90 PID 3584 wrote to memory of 3760 3584 cmd.exe 90 PID 1996 wrote to memory of 4652 1996 cmd.exe 89 PID 1996 wrote to memory of 4652 1996 cmd.exe 89 PID 1996 wrote to memory of 4652 1996 cmd.exe 89 PID 4156 wrote to memory of 3088 4156 cmd.exe 88 PID 4156 wrote to memory of 3088 4156 cmd.exe 88 PID 4156 wrote to memory of 3088 4156 cmd.exe 88 PID 1456 wrote to memory of 4276 1456 cmd.exe 87 PID 1456 wrote to memory of 4276 1456 cmd.exe 87 PID 1456 wrote to memory of 4276 1456 cmd.exe 87 PID 4552 wrote to memory of 4776 4552 cmd.exe 96 PID 4552 wrote to memory of 4776 4552 cmd.exe 96 PID 4552 wrote to memory of 4776 4552 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"3⤵
- Creates scheduled task(s)
PID:4652
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"2⤵PID:4040
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"2⤵PID:4060
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"3⤵
- Creates scheduled task(s)
PID:3088
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"3⤵
- Creates scheduled task(s)
PID:4276
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"2⤵PID:4460
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"3⤵
- Creates scheduled task(s)
PID:3760
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk664" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk664" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"3⤵
- Creates scheduled task(s)
PID:4724
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9225" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"2⤵PID:4036
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6205" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6205" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"3⤵
- Creates scheduled task(s)
PID:4776
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk9399" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"2⤵PID:3904
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 13162⤵
- Program crash
PID:644
-
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\9124f76bca149de07041a68d01521fa37e3f52bbd465260772153770571c52e9.exe"1⤵
- Creates scheduled task(s)
PID:2716