Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/10/2022, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe
Resource
win10-20220812-en
General
-
Target
4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe
-
Size
939KB
-
MD5
76b89dff1b5cfc25ebca5b2bb56f659a
-
SHA1
4adbe0e66f082cccd978c3a333e2f718508e2b5e
-
SHA256
4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd
-
SHA512
21254d1eba506b9e1d88a83b27d6dbd98e460face748adbb765bff291ba923ce2132a6ca55bc3a7007c5c5cc99a015fe9e5bf2ba0d765c8757ab313af722f137
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe" 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2404 3828 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4952 schtasks.exe 3224 schtasks.exe 4704 schtasks.exe 3148 schtasks.exe 3708 schtasks.exe 2800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3828 wrote to memory of 4104 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 66 PID 3828 wrote to memory of 4104 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 66 PID 3828 wrote to memory of 4104 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 66 PID 3828 wrote to memory of 3904 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 67 PID 3828 wrote to memory of 3904 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 67 PID 3828 wrote to memory of 3904 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 67 PID 3828 wrote to memory of 4128 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 68 PID 3828 wrote to memory of 4128 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 68 PID 3828 wrote to memory of 4128 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 68 PID 3828 wrote to memory of 4532 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 69 PID 3828 wrote to memory of 4532 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 69 PID 3828 wrote to memory of 4532 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 69 PID 3828 wrote to memory of 3344 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 70 PID 3828 wrote to memory of 3344 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 70 PID 3828 wrote to memory of 3344 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 70 PID 3828 wrote to memory of 5044 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 76 PID 3828 wrote to memory of 5044 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 76 PID 3828 wrote to memory of 5044 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 76 PID 3828 wrote to memory of 3580 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 71 PID 3828 wrote to memory of 3580 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 71 PID 3828 wrote to memory of 3580 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 71 PID 3828 wrote to memory of 1368 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 74 PID 3828 wrote to memory of 1368 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 74 PID 3828 wrote to memory of 1368 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 74 PID 3828 wrote to memory of 2992 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 89 PID 3828 wrote to memory of 2992 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 89 PID 3828 wrote to memory of 2992 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 89 PID 3828 wrote to memory of 3564 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 88 PID 3828 wrote to memory of 3564 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 88 PID 3828 wrote to memory of 3564 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 88 PID 3828 wrote to memory of 3996 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 79 PID 3828 wrote to memory of 3996 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 79 PID 3828 wrote to memory of 3996 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 79 PID 3828 wrote to memory of 4280 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 80 PID 3828 wrote to memory of 4280 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 80 PID 3828 wrote to memory of 4280 3828 4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe 80 PID 5044 wrote to memory of 3224 5044 cmd.exe 93 PID 5044 wrote to memory of 3224 5044 cmd.exe 93 PID 5044 wrote to memory of 3224 5044 cmd.exe 93 PID 2992 wrote to memory of 3148 2992 cmd.exe 95 PID 2992 wrote to memory of 3148 2992 cmd.exe 95 PID 2992 wrote to memory of 3148 2992 cmd.exe 95 PID 3564 wrote to memory of 4704 3564 cmd.exe 94 PID 3564 wrote to memory of 4704 3564 cmd.exe 94 PID 3564 wrote to memory of 4704 3564 cmd.exe 94 PID 3344 wrote to memory of 3708 3344 cmd.exe 90 PID 3344 wrote to memory of 3708 3344 cmd.exe 90 PID 3344 wrote to memory of 3708 3344 cmd.exe 90 PID 4532 wrote to memory of 4952 4532 cmd.exe 92 PID 4532 wrote to memory of 4952 4532 cmd.exe 92 PID 4532 wrote to memory of 4952 4532 cmd.exe 92 PID 4104 wrote to memory of 2800 4104 cmd.exe 91 PID 4104 wrote to memory of 2800 4104 cmd.exe 91 PID 4104 wrote to memory of 2800 4104 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"3⤵
- Creates scheduled task(s)
PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"2⤵PID:3904
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"2⤵PID:4128
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"3⤵
- Creates scheduled task(s)
PID:4952
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"3⤵
- Creates scheduled task(s)
PID:3708
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"2⤵PID:3580
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"2⤵PID:1368
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"3⤵
- Creates scheduled task(s)
PID:3224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4165" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"2⤵PID:3996
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3419" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"2⤵PID:4280
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7758" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7758" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"3⤵
- Creates scheduled task(s)
PID:4704
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1525" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1525" /TR "C:\Users\Admin\AppData\Local\Temp\4d09f294d9caf3ce9abac8470f0a9fe214b411290060ce8f93976942641439fd.exe"3⤵
- Creates scheduled task(s)
PID:3148
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 13162⤵
- Program crash
PID:2404
-