Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
77s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2022, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe
Resource
win10v2004-20220901-en
General
-
Target
5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe
-
Size
935KB
-
MD5
11495f93502943a0130e251f445bb75d
-
SHA1
6b2edb4a7965a8a28462dd4188ceda027323cd2a
-
SHA256
5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6
-
SHA512
56d9ec06cc685d88859ffee6910cbc16a6a6af927da8ccc4be1d200b4245d5980c9bd0f30915a75d1f93a2452d59c13ac47f60730a20a69fd2cc3be3f901ffb2
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe" 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 824 4924 WerFault.exe 81 -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4948 schtasks.exe 4368 schtasks.exe 3256 schtasks.exe 1732 schtasks.exe 2820 schtasks.exe 4568 schtasks.exe 1800 schtasks.exe 1064 schtasks.exe 5096 schtasks.exe 3712 schtasks.exe 1156 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 2164 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 83 PID 4924 wrote to memory of 2164 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 83 PID 4924 wrote to memory of 2164 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 83 PID 4924 wrote to memory of 1496 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 84 PID 4924 wrote to memory of 1496 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 84 PID 4924 wrote to memory of 1496 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 84 PID 4924 wrote to memory of 1872 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 106 PID 4924 wrote to memory of 1872 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 106 PID 4924 wrote to memory of 1872 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 106 PID 4924 wrote to memory of 3664 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 87 PID 4924 wrote to memory of 3664 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 87 PID 4924 wrote to memory of 3664 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 87 PID 4924 wrote to memory of 4864 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 88 PID 4924 wrote to memory of 4864 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 88 PID 4924 wrote to memory of 4864 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 88 PID 4924 wrote to memory of 4684 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 89 PID 4924 wrote to memory of 4684 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 89 PID 4924 wrote to memory of 4684 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 89 PID 4924 wrote to memory of 3040 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 104 PID 4924 wrote to memory of 3040 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 104 PID 4924 wrote to memory of 3040 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 104 PID 4924 wrote to memory of 3652 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 103 PID 4924 wrote to memory of 3652 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 103 PID 4924 wrote to memory of 3652 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 103 PID 4924 wrote to memory of 256 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 94 PID 4924 wrote to memory of 256 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 94 PID 4924 wrote to memory of 256 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 94 PID 4924 wrote to memory of 4752 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 95 PID 4924 wrote to memory of 4752 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 95 PID 4924 wrote to memory of 4752 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 95 PID 4924 wrote to memory of 4080 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 96 PID 4924 wrote to memory of 4080 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 96 PID 4924 wrote to memory of 4080 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 96 PID 4924 wrote to memory of 1216 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 97 PID 4924 wrote to memory of 1216 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 97 PID 4924 wrote to memory of 1216 4924 5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe 97 PID 1496 wrote to memory of 4368 1496 cmd.exe 107 PID 1496 wrote to memory of 4368 1496 cmd.exe 107 PID 1496 wrote to memory of 4368 1496 cmd.exe 107 PID 1872 wrote to memory of 1800 1872 cmd.exe 109 PID 1872 wrote to memory of 1800 1872 cmd.exe 109 PID 1872 wrote to memory of 1800 1872 cmd.exe 109 PID 3652 wrote to memory of 3256 3652 cmd.exe 108 PID 3652 wrote to memory of 3256 3652 cmd.exe 108 PID 3652 wrote to memory of 3256 3652 cmd.exe 108 PID 3664 wrote to memory of 5096 3664 cmd.exe 113 PID 3664 wrote to memory of 5096 3664 cmd.exe 113 PID 3664 wrote to memory of 5096 3664 cmd.exe 113 PID 4864 wrote to memory of 1064 4864 cmd.exe 110 PID 4864 wrote to memory of 1064 4864 cmd.exe 110 PID 4864 wrote to memory of 1064 4864 cmd.exe 110 PID 4684 wrote to memory of 1732 4684 cmd.exe 111 PID 4684 wrote to memory of 1732 4684 cmd.exe 111 PID 4684 wrote to memory of 1732 4684 cmd.exe 111 PID 3040 wrote to memory of 2820 3040 cmd.exe 112 PID 3040 wrote to memory of 2820 3040 cmd.exe 112 PID 3040 wrote to memory of 2820 3040 cmd.exe 112 PID 256 wrote to memory of 3712 256 cmd.exe 114 PID 256 wrote to memory of 3712 256 cmd.exe 114 PID 256 wrote to memory of 3712 256 cmd.exe 114 PID 1216 wrote to memory of 4568 1216 cmd.exe 115 PID 1216 wrote to memory of 4568 1216 cmd.exe 115 PID 1216 wrote to memory of 4568 1216 cmd.exe 115 PID 4752 wrote to memory of 1156 4752 cmd.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"2⤵PID:2164
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"3⤵
- Creates scheduled task(s)
PID:4368
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"3⤵
- Creates scheduled task(s)
PID:5096
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"3⤵
- Creates scheduled task(s)
PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"3⤵
- Creates scheduled task(s)
PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5955" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:256 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5955" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"3⤵
- Creates scheduled task(s)
PID:3712
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6016" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6016" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"3⤵
- Creates scheduled task(s)
PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk7064" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"2⤵PID:4080
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk7064" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"3⤵
- Creates scheduled task(s)
PID:4948
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5932" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5932" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"3⤵
- Creates scheduled task(s)
PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"3⤵
- Creates scheduled task(s)
PID:3256
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"3⤵
- Creates scheduled task(s)
PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\5acbe98780d0d94ba972bc63f9a175821b53d07f9b4634c88c0f0da2e96b70e6.exe"3⤵
- Creates scheduled task(s)
PID:1800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 11002⤵
- Program crash
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4924 -ip 49241⤵PID:2644