Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2022, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe
Resource
win10v2004-20220812-en
General
-
Target
436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe
-
Size
924KB
-
MD5
aa94475092653706f037643ce0213f9f
-
SHA1
014490957445aa6ca9b135bd590a1535586394f5
-
SHA256
436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40
-
SHA512
5a309fd6f83f4dc95e1e3c2073df793426d8b407f3bc38b4a38a466bcaceb13f0bfc17c661ba698c2a4b12444b16d4c02b1966172dd4aade3e5e64da0a85b6c0
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe" 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2100 868 WerFault.exe 79 -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1888 schtasks.exe 2080 schtasks.exe 3912 schtasks.exe 4264 schtasks.exe 4360 schtasks.exe 620 schtasks.exe 3736 schtasks.exe 3092 schtasks.exe 424 schtasks.exe 3884 schtasks.exe 4604 schtasks.exe 444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 868 wrote to memory of 4500 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 80 PID 868 wrote to memory of 4500 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 80 PID 868 wrote to memory of 4500 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 80 PID 868 wrote to memory of 5016 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 81 PID 868 wrote to memory of 5016 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 81 PID 868 wrote to memory of 5016 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 81 PID 868 wrote to memory of 1200 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 82 PID 868 wrote to memory of 1200 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 82 PID 868 wrote to memory of 1200 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 82 PID 868 wrote to memory of 1044 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 83 PID 868 wrote to memory of 1044 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 83 PID 868 wrote to memory of 1044 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 83 PID 868 wrote to memory of 5052 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 90 PID 868 wrote to memory of 5052 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 90 PID 868 wrote to memory of 5052 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 90 PID 868 wrote to memory of 4936 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 86 PID 868 wrote to memory of 4936 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 86 PID 868 wrote to memory of 4936 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 86 PID 868 wrote to memory of 3448 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 87 PID 868 wrote to memory of 3448 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 87 PID 868 wrote to memory of 3448 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 87 PID 868 wrote to memory of 4356 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 93 PID 868 wrote to memory of 4356 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 93 PID 868 wrote to memory of 4356 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 93 PID 868 wrote to memory of 3480 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 95 PID 868 wrote to memory of 3480 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 95 PID 868 wrote to memory of 3480 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 95 PID 868 wrote to memory of 4124 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 103 PID 868 wrote to memory of 4124 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 103 PID 868 wrote to memory of 4124 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 103 PID 868 wrote to memory of 2084 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 96 PID 868 wrote to memory of 2084 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 96 PID 868 wrote to memory of 2084 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 96 PID 868 wrote to memory of 4660 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 98 PID 868 wrote to memory of 4660 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 98 PID 868 wrote to memory of 4660 868 436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe 98 PID 3448 wrote to memory of 4604 3448 cmd.exe 112 PID 3448 wrote to memory of 4604 3448 cmd.exe 112 PID 3448 wrote to memory of 4604 3448 cmd.exe 112 PID 5052 wrote to memory of 444 5052 cmd.exe 113 PID 5052 wrote to memory of 444 5052 cmd.exe 113 PID 5052 wrote to memory of 444 5052 cmd.exe 113 PID 4500 wrote to memory of 3736 4500 cmd.exe 115 PID 4500 wrote to memory of 3736 4500 cmd.exe 115 PID 4500 wrote to memory of 3736 4500 cmd.exe 115 PID 1044 wrote to memory of 3884 1044 cmd.exe 111 PID 1044 wrote to memory of 3884 1044 cmd.exe 111 PID 1044 wrote to memory of 3884 1044 cmd.exe 111 PID 3480 wrote to memory of 620 3480 cmd.exe 114 PID 3480 wrote to memory of 620 3480 cmd.exe 114 PID 3480 wrote to memory of 620 3480 cmd.exe 114 PID 2084 wrote to memory of 1888 2084 cmd.exe 104 PID 2084 wrote to memory of 1888 2084 cmd.exe 104 PID 2084 wrote to memory of 1888 2084 cmd.exe 104 PID 4124 wrote to memory of 4360 4124 cmd.exe 110 PID 4124 wrote to memory of 4360 4124 cmd.exe 110 PID 4124 wrote to memory of 4360 4124 cmd.exe 110 PID 4660 wrote to memory of 4264 4660 cmd.exe 108 PID 4660 wrote to memory of 4264 4660 cmd.exe 108 PID 4660 wrote to memory of 4264 4660 cmd.exe 108 PID 5016 wrote to memory of 3912 5016 cmd.exe 107 PID 5016 wrote to memory of 3912 5016 cmd.exe 107 PID 5016 wrote to memory of 3912 5016 cmd.exe 107 PID 1200 wrote to memory of 3092 1200 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"3⤵
- Creates scheduled task(s)
PID:3736
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"3⤵
- Creates scheduled task(s)
PID:3912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"3⤵
- Creates scheduled task(s)
PID:3092
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"3⤵
- Creates scheduled task(s)
PID:3884
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"2⤵PID:4936
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"3⤵
- Creates scheduled task(s)
PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"3⤵
- Creates scheduled task(s)
PID:4604
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"3⤵
- Creates scheduled task(s)
PID:444
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"2⤵PID:4356
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"3⤵
- Creates scheduled task(s)
PID:424
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1561" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1561" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"3⤵
- Creates scheduled task(s)
PID:620
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8087" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8087" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"3⤵
- Creates scheduled task(s)
PID:1888
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4514" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4514" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"3⤵
- Creates scheduled task(s)
PID:4264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk230" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk230" /TR "C:\Users\Admin\AppData\Local\Temp\436d861663aa1cf1c4256245eebee60010869ceb37a2139350ec4852df9b9d40.exe"3⤵
- Creates scheduled task(s)
PID:4360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 10362⤵
- Program crash
PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 868 -ip 8681⤵PID:1048