Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
117s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
21/09/2022, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe
Resource
win10-20220812-en
General
-
Target
7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe
-
Size
913KB
-
MD5
4bbef75727ddd075c0d0f03abd185bf5
-
SHA1
983a23704d20e3eefecc905349566c1ad79d9a99
-
SHA256
7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8
-
SHA512
6e168a2d14839cf5aaf754fcefa9ce30d8dcb16dacc569dffa3092c5aab17a8c473125c93c47449c2854eb62111dc615fd34da453e9ad22ede98294e53b1a399
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe" 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 164 1680 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 384 schtasks.exe 820 schtasks.exe 4876 schtasks.exe 3248 schtasks.exe 3760 schtasks.exe 4852 schtasks.exe 4896 schtasks.exe 2220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1680 wrote to memory of 4568 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 66 PID 1680 wrote to memory of 4568 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 66 PID 1680 wrote to memory of 4568 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 66 PID 1680 wrote to memory of 4584 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 67 PID 1680 wrote to memory of 4584 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 67 PID 1680 wrote to memory of 4584 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 67 PID 1680 wrote to memory of 4664 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 68 PID 1680 wrote to memory of 4664 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 68 PID 1680 wrote to memory of 4664 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 68 PID 1680 wrote to memory of 4832 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 69 PID 1680 wrote to memory of 4832 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 69 PID 1680 wrote to memory of 4832 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 69 PID 1680 wrote to memory of 1960 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 81 PID 1680 wrote to memory of 1960 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 81 PID 1680 wrote to memory of 1960 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 81 PID 1680 wrote to memory of 1964 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 80 PID 1680 wrote to memory of 1964 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 80 PID 1680 wrote to memory of 1964 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 80 PID 1680 wrote to memory of 5080 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 70 PID 1680 wrote to memory of 5080 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 70 PID 1680 wrote to memory of 5080 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 70 PID 1680 wrote to memory of 3356 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 71 PID 1680 wrote to memory of 3356 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 71 PID 1680 wrote to memory of 3356 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 71 PID 1680 wrote to memory of 5044 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 72 PID 1680 wrote to memory of 5044 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 72 PID 1680 wrote to memory of 5044 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 72 PID 1680 wrote to memory of 5116 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 77 PID 1680 wrote to memory of 5116 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 77 PID 1680 wrote to memory of 5116 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 77 PID 1680 wrote to memory of 3548 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 78 PID 1680 wrote to memory of 3548 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 78 PID 1680 wrote to memory of 3548 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 78 PID 1680 wrote to memory of 4404 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 82 PID 1680 wrote to memory of 4404 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 82 PID 1680 wrote to memory of 4404 1680 7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe 82 PID 3356 wrote to memory of 820 3356 cmd.exe 97 PID 3356 wrote to memory of 820 3356 cmd.exe 97 PID 3356 wrote to memory of 820 3356 cmd.exe 97 PID 4404 wrote to memory of 384 4404 cmd.exe 96 PID 4404 wrote to memory of 384 4404 cmd.exe 96 PID 4404 wrote to memory of 384 4404 cmd.exe 96 PID 4568 wrote to memory of 4876 4568 cmd.exe 90 PID 4568 wrote to memory of 4876 4568 cmd.exe 90 PID 4568 wrote to memory of 4876 4568 cmd.exe 90 PID 3548 wrote to memory of 2220 3548 cmd.exe 95 PID 3548 wrote to memory of 2220 3548 cmd.exe 95 PID 3548 wrote to memory of 2220 3548 cmd.exe 95 PID 5080 wrote to memory of 4896 5080 cmd.exe 94 PID 5080 wrote to memory of 4896 5080 cmd.exe 94 PID 5080 wrote to memory of 4896 5080 cmd.exe 94 PID 4584 wrote to memory of 4852 4584 cmd.exe 93 PID 4584 wrote to memory of 4852 4584 cmd.exe 93 PID 4584 wrote to memory of 4852 4584 cmd.exe 93 PID 1964 wrote to memory of 3760 1964 cmd.exe 92 PID 1964 wrote to memory of 3760 1964 cmd.exe 92 PID 1964 wrote to memory of 3760 1964 cmd.exe 92 PID 4832 wrote to memory of 3248 4832 cmd.exe 91 PID 4832 wrote to memory of 3248 4832 cmd.exe 91 PID 4832 wrote to memory of 3248 4832 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"3⤵
- Creates scheduled task(s)
PID:4876
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"3⤵
- Creates scheduled task(s)
PID:4852
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"2⤵PID:4664
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"3⤵
- Creates scheduled task(s)
PID:3248
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"3⤵
- Creates scheduled task(s)
PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"3⤵
- Creates scheduled task(s)
PID:820
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1451" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"2⤵PID:5044
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk404" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"2⤵PID:5116
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2333" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2333" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"3⤵
- Creates scheduled task(s)
PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"3⤵
- Creates scheduled task(s)
PID:3760
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"2⤵PID:1960
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk1730" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk1730" /TR "C:\Users\Admin\AppData\Local\Temp\7ce855c932038658fb7516c2c0631d9d473d06e4fadb1789c635d309c6ee34e8.exe"3⤵
- Creates scheduled task(s)
PID:384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 13922⤵
- Program crash
PID:164
-