Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
117s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/10/2022, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe
Resource
win10-20220812-en
General
-
Target
41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe
-
Size
957KB
-
MD5
57c6347bf75cfd7e13913d556156f1f4
-
SHA1
76843e2aa3bc79964d5c672b9fd32f4d9fa0ea02
-
SHA256
41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18
-
SHA512
c2b0eed40f8a43f9577a2687fa15f2c612547471410db066bd810270b0a131dcfbb007e0d4e22606234641b5011133ef96217b7d923d0c44241bab934e8724f0
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe" 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3764 2656 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4824 schtasks.exe 4080 schtasks.exe 2272 schtasks.exe 3992 schtasks.exe 3412 schtasks.exe 2240 schtasks.exe 4464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2656 wrote to memory of 1828 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 66 PID 2656 wrote to memory of 1828 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 66 PID 2656 wrote to memory of 1828 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 66 PID 2656 wrote to memory of 1972 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 67 PID 2656 wrote to memory of 1972 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 67 PID 2656 wrote to memory of 1972 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 67 PID 2656 wrote to memory of 4744 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 68 PID 2656 wrote to memory of 4744 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 68 PID 2656 wrote to memory of 4744 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 68 PID 2656 wrote to memory of 4816 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 69 PID 2656 wrote to memory of 4816 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 69 PID 2656 wrote to memory of 4816 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 69 PID 2656 wrote to memory of 2236 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 70 PID 2656 wrote to memory of 2236 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 70 PID 2656 wrote to memory of 2236 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 70 PID 2656 wrote to memory of 4876 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 74 PID 2656 wrote to memory of 4876 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 74 PID 2656 wrote to memory of 4876 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 74 PID 2656 wrote to memory of 2344 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 73 PID 2656 wrote to memory of 2344 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 73 PID 2656 wrote to memory of 2344 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 73 PID 2656 wrote to memory of 4328 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 87 PID 2656 wrote to memory of 4328 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 87 PID 2656 wrote to memory of 4328 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 87 PID 2656 wrote to memory of 1284 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 75 PID 2656 wrote to memory of 1284 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 75 PID 2656 wrote to memory of 1284 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 75 PID 2656 wrote to memory of 3000 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 76 PID 2656 wrote to memory of 3000 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 76 PID 2656 wrote to memory of 3000 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 76 PID 2656 wrote to memory of 4332 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 77 PID 2656 wrote to memory of 4332 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 77 PID 2656 wrote to memory of 4332 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 77 PID 2656 wrote to memory of 4936 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 82 PID 2656 wrote to memory of 4936 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 82 PID 2656 wrote to memory of 4936 2656 41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe 82 PID 1828 wrote to memory of 2272 1828 cmd.exe 94 PID 1828 wrote to memory of 2272 1828 cmd.exe 94 PID 1828 wrote to memory of 2272 1828 cmd.exe 94 PID 1284 wrote to memory of 4080 1284 cmd.exe 93 PID 1284 wrote to memory of 4080 1284 cmd.exe 93 PID 1284 wrote to memory of 4080 1284 cmd.exe 93 PID 4876 wrote to memory of 3412 4876 cmd.exe 89 PID 4876 wrote to memory of 3412 4876 cmd.exe 89 PID 4876 wrote to memory of 3412 4876 cmd.exe 89 PID 1972 wrote to memory of 4824 1972 cmd.exe 92 PID 1972 wrote to memory of 4824 1972 cmd.exe 92 PID 1972 wrote to memory of 4824 1972 cmd.exe 92 PID 4816 wrote to memory of 4464 4816 cmd.exe 91 PID 4816 wrote to memory of 4464 4816 cmd.exe 91 PID 4816 wrote to memory of 4464 4816 cmd.exe 91 PID 4744 wrote to memory of 2240 4744 cmd.exe 90 PID 4744 wrote to memory of 2240 4744 cmd.exe 90 PID 4744 wrote to memory of 2240 4744 cmd.exe 90 PID 3000 wrote to memory of 3992 3000 cmd.exe 95 PID 3000 wrote to memory of 3992 3000 cmd.exe 95 PID 3000 wrote to memory of 3992 3000 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"3⤵
- Creates scheduled task(s)
PID:2272
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"3⤵
- Creates scheduled task(s)
PID:4824
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"3⤵
- Creates scheduled task(s)
PID:2240
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"3⤵
- Creates scheduled task(s)
PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"2⤵PID:2236
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"2⤵PID:2344
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"3⤵
- Creates scheduled task(s)
PID:3412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk9346" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk9346" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"3⤵
- Creates scheduled task(s)
PID:4080
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6101" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6101" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"3⤵
- Creates scheduled task(s)
PID:3992
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6638" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"2⤵PID:4332
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8257" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"2⤵PID:4936
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\41ec9389301bbc23ab249252adfdf415f4cd452ec368caa83fe403b54b6eed18.exe"2⤵PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 13202⤵
- Program crash
PID:3764
-