Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe
Resource
win10v2004-20220812-en
General
-
Target
da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe
-
Size
949KB
-
MD5
b2607b586adc81fd37e98abb74db732b
-
SHA1
8d044a76a2ee2f39a99a572f90dabf62a4a5804a
-
SHA256
da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702
-
SHA512
0c2e7876e573ac63248fa47ae30e20764c3a1a073607ea4b1c15bf3625845e822cfbca339a0d0f8015aae27e32593cd69643e858fb27997e625b211e6946fb22
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe" da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2408 5064 WerFault.exe 80 -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2928 schtasks.exe 3188 schtasks.exe 2348 schtasks.exe 560 schtasks.exe 5028 schtasks.exe 2376 schtasks.exe 2980 schtasks.exe 632 schtasks.exe 5060 schtasks.exe 3676 schtasks.exe 3000 schtasks.exe 2728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 1232 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 81 PID 5064 wrote to memory of 1232 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 81 PID 5064 wrote to memory of 1232 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 81 PID 5064 wrote to memory of 4724 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 82 PID 5064 wrote to memory of 4724 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 82 PID 5064 wrote to memory of 4724 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 82 PID 5064 wrote to memory of 816 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 83 PID 5064 wrote to memory of 816 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 83 PID 5064 wrote to memory of 816 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 83 PID 5064 wrote to memory of 1192 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 84 PID 5064 wrote to memory of 1192 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 84 PID 5064 wrote to memory of 1192 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 84 PID 5064 wrote to memory of 1680 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 85 PID 5064 wrote to memory of 1680 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 85 PID 5064 wrote to memory of 1680 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 85 PID 5064 wrote to memory of 1488 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 99 PID 5064 wrote to memory of 1488 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 99 PID 5064 wrote to memory of 1488 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 99 PID 5064 wrote to memory of 2068 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 98 PID 5064 wrote to memory of 2068 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 98 PID 5064 wrote to memory of 2068 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 98 PID 5064 wrote to memory of 1896 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 97 PID 5064 wrote to memory of 1896 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 97 PID 5064 wrote to memory of 1896 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 97 PID 5064 wrote to memory of 2384 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 88 PID 5064 wrote to memory of 2384 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 88 PID 5064 wrote to memory of 2384 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 88 PID 5064 wrote to memory of 228 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 95 PID 5064 wrote to memory of 228 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 95 PID 5064 wrote to memory of 228 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 95 PID 5064 wrote to memory of 3776 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 100 PID 5064 wrote to memory of 3776 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 100 PID 5064 wrote to memory of 3776 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 100 PID 5064 wrote to memory of 3112 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 101 PID 5064 wrote to memory of 3112 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 101 PID 5064 wrote to memory of 3112 5064 da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe 101 PID 2068 wrote to memory of 5028 2068 cmd.exe 115 PID 2068 wrote to memory of 5028 2068 cmd.exe 115 PID 2068 wrote to memory of 5028 2068 cmd.exe 115 PID 4724 wrote to memory of 2928 4724 cmd.exe 116 PID 4724 wrote to memory of 2928 4724 cmd.exe 116 PID 4724 wrote to memory of 2928 4724 cmd.exe 116 PID 1232 wrote to memory of 2376 1232 cmd.exe 112 PID 1232 wrote to memory of 2376 1232 cmd.exe 112 PID 1232 wrote to memory of 2376 1232 cmd.exe 112 PID 2384 wrote to memory of 632 2384 cmd.exe 114 PID 2384 wrote to memory of 632 2384 cmd.exe 114 PID 2384 wrote to memory of 632 2384 cmd.exe 114 PID 3776 wrote to memory of 2980 3776 cmd.exe 113 PID 3776 wrote to memory of 2980 3776 cmd.exe 113 PID 3776 wrote to memory of 2980 3776 cmd.exe 113 PID 816 wrote to memory of 560 816 cmd.exe 111 PID 816 wrote to memory of 560 816 cmd.exe 111 PID 816 wrote to memory of 560 816 cmd.exe 111 PID 1488 wrote to memory of 2728 1488 cmd.exe 110 PID 1488 wrote to memory of 2728 1488 cmd.exe 110 PID 1488 wrote to memory of 2728 1488 cmd.exe 110 PID 1896 wrote to memory of 3000 1896 cmd.exe 109 PID 1896 wrote to memory of 3000 1896 cmd.exe 109 PID 1896 wrote to memory of 3000 1896 cmd.exe 109 PID 1192 wrote to memory of 5060 1192 cmd.exe 106 PID 1192 wrote to memory of 5060 1192 cmd.exe 106 PID 1192 wrote to memory of 5060 1192 cmd.exe 106 PID 3112 wrote to memory of 3188 3112 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"3⤵
- Creates scheduled task(s)
PID:2376
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"3⤵
- Creates scheduled task(s)
PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"3⤵
- Creates scheduled task(s)
PID:560
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"3⤵
- Creates scheduled task(s)
PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"2⤵PID:1680
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"3⤵
- Creates scheduled task(s)
PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2656" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2656" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"3⤵
- Creates scheduled task(s)
PID:632
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk905" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"2⤵PID:228
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk905" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"3⤵
- Creates scheduled task(s)
PID:3676
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"3⤵
- Creates scheduled task(s)
PID:3000
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"3⤵
- Creates scheduled task(s)
PID:5028
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"3⤵
- Creates scheduled task(s)
PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8763" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8763" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"3⤵
- Creates scheduled task(s)
PID:2980
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9685" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9685" /TR "C:\Users\Admin\AppData\Local\Temp\da949e0f143b574f2db8aa8958b8698f03d6bf784315fd3c2e0ae686ff51c702.exe"3⤵
- Creates scheduled task(s)
PID:3188
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 11082⤵
- Program crash
PID:2408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5064 -ip 50641⤵PID:2972