Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
24/09/2022, 08:40
Static task
static1
Behavioral task
behavioral1
Sample
8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe
Resource
win10-20220812-en
General
-
Target
8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe
-
Size
921KB
-
MD5
6894e8f8466172330fc63177cd5a89da
-
SHA1
2ff76d80d42e35577d1311a9c646123af51cd7e2
-
SHA256
8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51
-
SHA512
b634f63589988cd69a8b34280372846be8a332c31799b1e006cc88c799b4f994dac0d47e349914959343fbd465d0bccfbd6446a41ef277a3ab4a1aaa51d09bd5
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe" 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 504 2696 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4300 schtasks.exe 4232 schtasks.exe 3768 schtasks.exe 3820 schtasks.exe 3968 schtasks.exe 3900 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2696 wrote to memory of 4704 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 66 PID 2696 wrote to memory of 4704 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 66 PID 2696 wrote to memory of 4704 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 66 PID 2696 wrote to memory of 4760 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 67 PID 2696 wrote to memory of 4760 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 67 PID 2696 wrote to memory of 4760 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 67 PID 2696 wrote to memory of 4740 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 68 PID 2696 wrote to memory of 4740 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 68 PID 2696 wrote to memory of 4740 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 68 PID 2696 wrote to memory of 4788 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 69 PID 2696 wrote to memory of 4788 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 69 PID 2696 wrote to memory of 4788 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 69 PID 2696 wrote to memory of 5068 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 70 PID 2696 wrote to memory of 5068 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 70 PID 2696 wrote to memory of 5068 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 70 PID 2696 wrote to memory of 5096 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 89 PID 2696 wrote to memory of 5096 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 89 PID 2696 wrote to memory of 5096 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 89 PID 2696 wrote to memory of 5020 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 88 PID 2696 wrote to memory of 5020 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 88 PID 2696 wrote to memory of 5020 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 88 PID 2696 wrote to memory of 2880 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 85 PID 2696 wrote to memory of 2880 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 85 PID 2696 wrote to memory of 2880 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 85 PID 2696 wrote to memory of 4112 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 71 PID 2696 wrote to memory of 4112 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 71 PID 2696 wrote to memory of 4112 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 71 PID 2696 wrote to memory of 4056 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 80 PID 2696 wrote to memory of 4056 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 80 PID 2696 wrote to memory of 4056 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 80 PID 2696 wrote to memory of 4800 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 78 PID 2696 wrote to memory of 4800 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 78 PID 2696 wrote to memory of 4800 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 78 PID 2696 wrote to memory of 2040 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 73 PID 2696 wrote to memory of 2040 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 73 PID 2696 wrote to memory of 2040 2696 8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe 73 PID 5020 wrote to memory of 4232 5020 cmd.exe 93 PID 5020 wrote to memory of 4232 5020 cmd.exe 93 PID 5020 wrote to memory of 4232 5020 cmd.exe 93 PID 5068 wrote to memory of 4300 5068 cmd.exe 92 PID 5068 wrote to memory of 4300 5068 cmd.exe 92 PID 5068 wrote to memory of 4300 5068 cmd.exe 92 PID 4740 wrote to memory of 3900 4740 cmd.exe 91 PID 4740 wrote to memory of 3900 4740 cmd.exe 91 PID 4740 wrote to memory of 3900 4740 cmd.exe 91 PID 4760 wrote to memory of 3968 4760 cmd.exe 90 PID 4760 wrote to memory of 3968 4760 cmd.exe 90 PID 4760 wrote to memory of 3968 4760 cmd.exe 90 PID 4788 wrote to memory of 3820 4788 cmd.exe 95 PID 4788 wrote to memory of 3820 4788 cmd.exe 95 PID 4788 wrote to memory of 3820 4788 cmd.exe 95 PID 4800 wrote to memory of 3768 4800 cmd.exe 94 PID 4800 wrote to memory of 3768 4800 cmd.exe 94 PID 4800 wrote to memory of 3768 4800 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"2⤵PID:4704
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"3⤵
- Creates scheduled task(s)
PID:3968
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"3⤵
- Creates scheduled task(s)
PID:3900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"3⤵
- Creates scheduled task(s)
PID:3820
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"3⤵
- Creates scheduled task(s)
PID:4300
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk8941" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"2⤵PID:4112
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk1179" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"2⤵PID:2040
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2779" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2779" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"3⤵
- Creates scheduled task(s)
PID:3768
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk1332" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"2⤵PID:4056
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"2⤵PID:2880
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"3⤵
- Creates scheduled task(s)
PID:4232
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\8aaf2b808000a4fcf88a11ebfc23234e893b9a5cfefacd9b561fb54e89ec4b51.exe"2⤵PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 13202⤵
- Program crash
PID:504
-