Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/10/2022, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe
Resource
win10-20220812-en
General
-
Target
498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe
-
Size
941KB
-
MD5
ed16085fe2b532ade59becf785eb6b4f
-
SHA1
f4161d933fe8fd13ee6b793064e3b0b0d85fef06
-
SHA256
498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733
-
SHA512
662811e32eeaeae27a47362ee42dd305cf39b22fdf4239bfb80a3c987de9fc8112e55c6a679190022d6f38471bddcb076fe1d2340f32607f6ad2f2faf6bdf867
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe" 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 96 2676 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4636 schtasks.exe 3000 schtasks.exe 4892 schtasks.exe 4900 schtasks.exe 4564 schtasks.exe 3220 schtasks.exe 4844 schtasks.exe 4848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2676 wrote to memory of 4620 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 66 PID 2676 wrote to memory of 4620 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 66 PID 2676 wrote to memory of 4620 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 66 PID 2676 wrote to memory of 5048 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 67 PID 2676 wrote to memory of 5048 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 67 PID 2676 wrote to memory of 5048 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 67 PID 2676 wrote to memory of 5112 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 68 PID 2676 wrote to memory of 5112 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 68 PID 2676 wrote to memory of 5112 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 68 PID 2676 wrote to memory of 1540 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 89 PID 2676 wrote to memory of 1540 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 89 PID 2676 wrote to memory of 1540 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 89 PID 2676 wrote to memory of 1916 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 88 PID 2676 wrote to memory of 1916 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 88 PID 2676 wrote to memory of 1916 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 88 PID 2676 wrote to memory of 2616 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 86 PID 2676 wrote to memory of 2616 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 86 PID 2676 wrote to memory of 2616 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 86 PID 2676 wrote to memory of 924 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 84 PID 2676 wrote to memory of 924 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 84 PID 2676 wrote to memory of 924 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 84 PID 2676 wrote to memory of 2188 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 83 PID 2676 wrote to memory of 2188 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 83 PID 2676 wrote to memory of 2188 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 83 PID 2676 wrote to memory of 3876 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 70 PID 2676 wrote to memory of 3876 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 70 PID 2676 wrote to memory of 3876 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 70 PID 2676 wrote to memory of 4212 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 79 PID 2676 wrote to memory of 4212 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 79 PID 2676 wrote to memory of 4212 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 79 PID 2676 wrote to memory of 4124 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 71 PID 2676 wrote to memory of 4124 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 71 PID 2676 wrote to memory of 4124 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 71 PID 2676 wrote to memory of 4732 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 77 PID 2676 wrote to memory of 4732 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 77 PID 2676 wrote to memory of 4732 2676 498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe 77 PID 3876 wrote to memory of 4848 3876 cmd.exe 90 PID 3876 wrote to memory of 4848 3876 cmd.exe 90 PID 3876 wrote to memory of 4848 3876 cmd.exe 90 PID 2616 wrote to memory of 4844 2616 cmd.exe 97 PID 2616 wrote to memory of 4844 2616 cmd.exe 97 PID 2616 wrote to memory of 4844 2616 cmd.exe 97 PID 2188 wrote to memory of 3220 2188 cmd.exe 96 PID 2188 wrote to memory of 3220 2188 cmd.exe 96 PID 2188 wrote to memory of 3220 2188 cmd.exe 96 PID 4732 wrote to memory of 4636 4732 cmd.exe 91 PID 4732 wrote to memory of 4636 4732 cmd.exe 91 PID 4732 wrote to memory of 4636 4732 cmd.exe 91 PID 5048 wrote to memory of 4564 5048 cmd.exe 95 PID 5048 wrote to memory of 4564 5048 cmd.exe 95 PID 5048 wrote to memory of 4564 5048 cmd.exe 95 PID 4620 wrote to memory of 3000 4620 cmd.exe 92 PID 4620 wrote to memory of 3000 4620 cmd.exe 92 PID 4620 wrote to memory of 3000 4620 cmd.exe 92 PID 4124 wrote to memory of 4900 4124 cmd.exe 94 PID 4124 wrote to memory of 4900 4124 cmd.exe 94 PID 4124 wrote to memory of 4900 4124 cmd.exe 94 PID 4212 wrote to memory of 4892 4212 cmd.exe 93 PID 4212 wrote to memory of 4892 4212 cmd.exe 93 PID 4212 wrote to memory of 4892 4212 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"3⤵
- Creates scheduled task(s)
PID:3000
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"3⤵
- Creates scheduled task(s)
PID:4564
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"2⤵PID:5112
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk9213" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk9213" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"3⤵
- Creates scheduled task(s)
PID:4848
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6874" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6874" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"3⤵
- Creates scheduled task(s)
PID:4900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4695" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4695" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"3⤵
- Creates scheduled task(s)
PID:4636
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5547" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5547" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"3⤵
- Creates scheduled task(s)
PID:4892
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"3⤵
- Creates scheduled task(s)
PID:3220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"2⤵PID:924
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"3⤵
- Creates scheduled task(s)
PID:4844
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"2⤵PID:1916
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\498f0fa8629dc630c1f46c31b6dc18b01ac6cf2b761ce810946622e0f24fa733.exe"2⤵PID:1540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 13202⤵
- Program crash
PID:96
-