Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
26-04-2021 06:06
Static task
static1
Behavioral task
behavioral1
Sample
TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr
-
Size
260KB
-
MD5
84bc6ece04588d297e5f957f8c0eed1a
-
SHA1
47b0cfaaef2a8dceeb377e822094fd8a97b6fc0b
-
SHA256
d9c227ed57ca134b518a38f74580faf7f3c5e05c5caae3ed3166641341950ee7
-
SHA512
83c546bebebe502a4239c18e29230dec4a3df29568ff97cec6b64fa00801b2572ee738b0f74d9a11f693fff34f6b23db8edbfc16a4b5baa1482ff604314600f1
Malware Config
Extracted
Family
remcos
C2
188.72.124.143:2858
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scrpid process 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr -
Suspicious use of SetThreadContext 64 IoCs
Processes:
TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scrapplaunch.exedescription pid process target process PID 1824 set thread context of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 336 set thread context of 1192 336 applaunch.exe svchost.exe PID 336 set thread context of 1756 336 applaunch.exe svchost.exe PID 336 set thread context of 1068 336 applaunch.exe svchost.exe PID 336 set thread context of 1180 336 applaunch.exe svchost.exe PID 336 set thread context of 928 336 applaunch.exe svchost.exe PID 336 set thread context of 300 336 applaunch.exe svchost.exe PID 336 set thread context of 1416 336 applaunch.exe svchost.exe PID 336 set thread context of 1648 336 applaunch.exe svchost.exe PID 336 set thread context of 1608 336 applaunch.exe svchost.exe PID 336 set thread context of 1212 336 applaunch.exe svchost.exe PID 336 set thread context of 1588 336 applaunch.exe svchost.exe PID 336 set thread context of 324 336 applaunch.exe svchost.exe PID 336 set thread context of 1092 336 applaunch.exe svchost.exe PID 336 set thread context of 1480 336 applaunch.exe svchost.exe PID 336 set thread context of 2044 336 applaunch.exe svchost.exe PID 336 set thread context of 1956 336 applaunch.exe svchost.exe PID 336 set thread context of 936 336 applaunch.exe svchost.exe PID 336 set thread context of 348 336 applaunch.exe svchost.exe PID 336 set thread context of 440 336 applaunch.exe svchost.exe PID 336 set thread context of 1800 336 applaunch.exe svchost.exe PID 336 set thread context of 1340 336 applaunch.exe svchost.exe PID 336 set thread context of 1940 336 applaunch.exe svchost.exe PID 336 set thread context of 1696 336 applaunch.exe svchost.exe PID 336 set thread context of 1136 336 applaunch.exe svchost.exe PID 336 set thread context of 896 336 applaunch.exe svchost.exe PID 336 set thread context of 1388 336 applaunch.exe svchost.exe PID 336 set thread context of 968 336 applaunch.exe svchost.exe PID 336 set thread context of 1112 336 applaunch.exe svchost.exe PID 336 set thread context of 1896 336 applaunch.exe svchost.exe PID 336 set thread context of 1672 336 applaunch.exe svchost.exe PID 336 set thread context of 1748 336 applaunch.exe svchost.exe PID 336 set thread context of 868 336 applaunch.exe svchost.exe PID 336 set thread context of 912 336 applaunch.exe svchost.exe PID 336 set thread context of 2000 336 applaunch.exe svchost.exe PID 336 set thread context of 1544 336 applaunch.exe svchost.exe PID 336 set thread context of 1548 336 applaunch.exe svchost.exe PID 336 set thread context of 1604 336 applaunch.exe svchost.exe PID 336 set thread context of 1324 336 applaunch.exe svchost.exe PID 336 set thread context of 1952 336 applaunch.exe svchost.exe PID 336 set thread context of 1912 336 applaunch.exe svchost.exe PID 336 set thread context of 1044 336 applaunch.exe svchost.exe PID 336 set thread context of 2032 336 applaunch.exe svchost.exe PID 336 set thread context of 1164 336 applaunch.exe svchost.exe PID 336 set thread context of 952 336 applaunch.exe svchost.exe PID 336 set thread context of 1528 336 applaunch.exe svchost.exe PID 336 set thread context of 1556 336 applaunch.exe svchost.exe PID 336 set thread context of 864 336 applaunch.exe svchost.exe PID 336 set thread context of 1936 336 applaunch.exe svchost.exe PID 336 set thread context of 1532 336 applaunch.exe svchost.exe PID 336 set thread context of 1832 336 applaunch.exe svchost.exe PID 336 set thread context of 108 336 applaunch.exe svchost.exe PID 336 set thread context of 1376 336 applaunch.exe svchost.exe PID 336 set thread context of 1600 336 applaunch.exe svchost.exe PID 336 set thread context of 844 336 applaunch.exe svchost.exe PID 336 set thread context of 1076 336 applaunch.exe svchost.exe PID 336 set thread context of 1580 336 applaunch.exe svchost.exe PID 336 set thread context of 2028 336 applaunch.exe svchost.exe PID 336 set thread context of 1976 336 applaunch.exe svchost.exe PID 336 set thread context of 1968 336 applaunch.exe svchost.exe PID 336 set thread context of 1680 336 applaunch.exe svchost.exe PID 336 set thread context of 1772 336 applaunch.exe svchost.exe PID 336 set thread context of 2060 336 applaunch.exe svchost.exe PID 336 set thread context of 2068 336 applaunch.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1652 1824 WerFault.exe TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 112 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scrWerFault.exepid process 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1652 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scrWerFault.exedescription pid process Token: SeDebugPrivilege 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr Token: SeDebugPrivilege 1652 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scrcmd.exeapplaunch.exedescription pid process target process PID 1824 wrote to memory of 1664 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr cmd.exe PID 1824 wrote to memory of 1664 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr cmd.exe PID 1824 wrote to memory of 1664 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr cmd.exe PID 1824 wrote to memory of 1664 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr cmd.exe PID 1664 wrote to memory of 112 1664 cmd.exe timeout.exe PID 1664 wrote to memory of 112 1664 cmd.exe timeout.exe PID 1664 wrote to memory of 112 1664 cmd.exe timeout.exe PID 1664 wrote to memory of 112 1664 cmd.exe timeout.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 1824 wrote to memory of 336 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr applaunch.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1192 336 applaunch.exe svchost.exe PID 1824 wrote to memory of 1652 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr WerFault.exe PID 1824 wrote to memory of 1652 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr WerFault.exe PID 1824 wrote to memory of 1652 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr WerFault.exe PID 1824 wrote to memory of 1652 1824 TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr WerFault.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1756 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1068 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1068 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1068 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1068 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1068 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1068 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1068 336 applaunch.exe svchost.exe PID 336 wrote to memory of 1068 336 applaunch.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr"C:\Users\Admin\AppData\Local\Temp\TPE-CHESTERFIELD, MI 48051 (DDP)駿得5008.scr" /S1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\applaunch.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1192
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1756
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1068
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1180
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:928
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:300
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1416
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1648
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1608
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1212
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1588
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:324
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1092
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1480
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:2044
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1956
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:936
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:348
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:440
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1800
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1340
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1940
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1696
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1136
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:896
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1388
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:968
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1112
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1896
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1672
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1748
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:868
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:912
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:2000
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1544
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1548
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1604
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1324
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1952
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1912
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1044
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:2032
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1164
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:952
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1528
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1556
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:864
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1936
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1532
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1832
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:108
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1376
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1600
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:844
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1076
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1580
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:2028
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1976
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1968
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1680
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:1772
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:2060
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:2068
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:2076
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:2088
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:2096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 12762⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1652