Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
08/10/2022, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe
Resource
win10-20220812-en
General
-
Target
f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe
-
Size
959KB
-
MD5
cbc0500085652afbdff4fad4fa062359
-
SHA1
a2980547287691054a85183632526ef255990e13
-
SHA256
f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909
-
SHA512
fbd1e1d3cf7ba813bb0ae123abe66e2ac6c5c1c39f42dcd25f8ba2206e1b1e9f477f83263fc2ce0654052b4c34214ee897fa24bbe902b2cf80afb67582b9eed2
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe" f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1572 2668 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4368 schtasks.exe 4236 schtasks.exe 4264 schtasks.exe 2248 schtasks.exe 4252 schtasks.exe 2264 schtasks.exe 4456 schtasks.exe 8 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2668 wrote to memory of 4644 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 66 PID 2668 wrote to memory of 4644 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 66 PID 2668 wrote to memory of 4644 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 66 PID 2668 wrote to memory of 2136 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 67 PID 2668 wrote to memory of 2136 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 67 PID 2668 wrote to memory of 2136 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 67 PID 2668 wrote to memory of 1568 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 68 PID 2668 wrote to memory of 1568 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 68 PID 2668 wrote to memory of 1568 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 68 PID 2668 wrote to memory of 4796 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 69 PID 2668 wrote to memory of 4796 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 69 PID 2668 wrote to memory of 4796 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 69 PID 2668 wrote to memory of 4816 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 70 PID 2668 wrote to memory of 4816 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 70 PID 2668 wrote to memory of 4816 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 70 PID 2668 wrote to memory of 64 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 73 PID 2668 wrote to memory of 64 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 73 PID 2668 wrote to memory of 64 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 73 PID 2668 wrote to memory of 5080 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 89 PID 2668 wrote to memory of 5080 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 89 PID 2668 wrote to memory of 5080 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 89 PID 2668 wrote to memory of 4328 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 88 PID 2668 wrote to memory of 4328 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 88 PID 2668 wrote to memory of 4328 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 88 PID 2668 wrote to memory of 2316 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 87 PID 2668 wrote to memory of 2316 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 87 PID 2668 wrote to memory of 2316 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 87 PID 2668 wrote to memory of 4272 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 76 PID 2668 wrote to memory of 4272 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 76 PID 2668 wrote to memory of 4272 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 76 PID 2668 wrote to memory of 4340 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 84 PID 2668 wrote to memory of 4340 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 84 PID 2668 wrote to memory of 4340 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 84 PID 2668 wrote to memory of 4844 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 78 PID 2668 wrote to memory of 4844 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 78 PID 2668 wrote to memory of 4844 2668 f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe 78 PID 2316 wrote to memory of 4368 2316 cmd.exe 97 PID 2316 wrote to memory of 4368 2316 cmd.exe 97 PID 2316 wrote to memory of 4368 2316 cmd.exe 97 PID 4340 wrote to memory of 8 4340 cmd.exe 96 PID 4340 wrote to memory of 8 4340 cmd.exe 96 PID 4340 wrote to memory of 8 4340 cmd.exe 96 PID 5080 wrote to memory of 4456 5080 cmd.exe 95 PID 5080 wrote to memory of 4456 5080 cmd.exe 95 PID 5080 wrote to memory of 4456 5080 cmd.exe 95 PID 64 wrote to memory of 4252 64 cmd.exe 93 PID 64 wrote to memory of 4252 64 cmd.exe 93 PID 64 wrote to memory of 4252 64 cmd.exe 93 PID 4644 wrote to memory of 2264 4644 cmd.exe 94 PID 4644 wrote to memory of 2264 4644 cmd.exe 94 PID 4644 wrote to memory of 2264 4644 cmd.exe 94 PID 4816 wrote to memory of 2248 4816 cmd.exe 92 PID 4816 wrote to memory of 2248 4816 cmd.exe 92 PID 4816 wrote to memory of 2248 4816 cmd.exe 92 PID 4272 wrote to memory of 4264 4272 cmd.exe 91 PID 4272 wrote to memory of 4264 4272 cmd.exe 91 PID 4272 wrote to memory of 4264 4272 cmd.exe 91 PID 4796 wrote to memory of 4236 4796 cmd.exe 90 PID 4796 wrote to memory of 4236 4796 cmd.exe 90 PID 4796 wrote to memory of 4236 4796 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"3⤵
- Creates scheduled task(s)
PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"2⤵PID:2136
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"2⤵PID:1568
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"3⤵
- Creates scheduled task(s)
PID:4236
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"3⤵
- Creates scheduled task(s)
PID:2248
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"3⤵
- Creates scheduled task(s)
PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8454" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8454" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"3⤵
- Creates scheduled task(s)
PID:4264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7480" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"2⤵PID:4844
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1935" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1935" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"3⤵
- Creates scheduled task(s)
PID:8
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7086" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7086" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"3⤵
- Creates scheduled task(s)
PID:4368
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"2⤵PID:4328
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\f8eb7fb3ecd598b2fe087bcbc70d813b40ee34e736f01943d924f5aa6ec12909.exe"3⤵
- Creates scheduled task(s)
PID:4456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 13202⤵
- Program crash
PID:1572
-