Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
19/01/2022, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe
Resource
win7-en-20211208
General
-
Target
d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe
-
Size
6.3MB
-
MD5
d8f03daa4389b4e6ce37a3d3664e74f5
-
SHA1
9f044353923afec678d50777e8dc2e18a4b5ce21
-
SHA256
d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6
-
SHA512
4ea37e044be69b88c53f7bdecd0eb5c431fc3f112bd1cfd53942463756cd3187a3a5a2ead9a4ea82f6fc323213a17b9231d6ce9493f68cfe71aac250121a99f9
Malware Config
Extracted
cryptbot
veowvf15.top
morysl01.top
-
payload_url
http://tyngle01.top/download.php?file=lv.exe
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral2/files/0x000600000001e741-160.dat family_babadeda -
Executes dropped EXE 1 IoCs
pid Process 2928 syncapp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation syncapp.exe -
Loads dropped DLL 12 IoCs
pid Process 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe 1984 MsiExec.exe 1984 MsiExec.exe 3936 MsiExec.exe 3936 MsiExec.exe 3936 MsiExec.exe 3936 MsiExec.exe 3936 MsiExec.exe 3936 MsiExec.exe 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe 2928 syncapp.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\F: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\I: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\W: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\Z: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\X: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\Y: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\O: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\Q: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\M: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\H: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\T: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\S: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\L: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\J: d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIA674.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAE83.tmp msiexec.exe File created C:\Windows\Installer\1cd97e8.msi msiexec.exe File opened for modification C:\Windows\Installer\1cd97e8.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIA1CB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA297.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA5B7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA3F0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA4AD.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{41FE8904-EAB3-489E-ADD8-A651DB615D1E} msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 syncapp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString syncapp.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2036 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3632 msiexec.exe 3632 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 3632 msiexec.exe Token: SeCreateTokenPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeAssignPrimaryTokenPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeLockMemoryPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeIncreaseQuotaPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeMachineAccountPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeTcbPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeSecurityPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeTakeOwnershipPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeLoadDriverPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeSystemProfilePrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeSystemtimePrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeProfSingleProcessPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeIncBasePriorityPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeCreatePagefilePrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeCreatePermanentPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeBackupPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeRestorePrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeShutdownPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeDebugPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeAuditPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeSystemEnvironmentPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeChangeNotifyPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeRemoteShutdownPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeUndockPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeSyncAgentPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeEnableDelegationPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeManageVolumePrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeImpersonatePrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeCreateGlobalPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeCreateTokenPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeAssignPrimaryTokenPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeLockMemoryPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeIncreaseQuotaPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeMachineAccountPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeTcbPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeSecurityPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeTakeOwnershipPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeLoadDriverPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeSystemProfilePrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeSystemtimePrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeProfSingleProcessPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeIncBasePriorityPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeCreatePagefilePrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeCreatePermanentPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeBackupPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeRestorePrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeShutdownPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeDebugPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeAuditPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeSystemEnvironmentPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeChangeNotifyPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeRemoteShutdownPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeUndockPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeSyncAgentPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeEnableDelegationPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeManageVolumePrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeImpersonatePrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeCreateGlobalPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeCreateTokenPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeAssignPrimaryTokenPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeLockMemoryPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeIncreaseQuotaPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe Token: SeMachineAccountPrivilege 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3828 msiexec.exe 3828 msiexec.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3632 wrote to memory of 1984 3632 msiexec.exe 56 PID 3632 wrote to memory of 1984 3632 msiexec.exe 56 PID 3632 wrote to memory of 1984 3632 msiexec.exe 56 PID 524 wrote to memory of 3828 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe 58 PID 524 wrote to memory of 3828 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe 58 PID 524 wrote to memory of 3828 524 d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe 58 PID 3632 wrote to memory of 3936 3632 msiexec.exe 59 PID 3632 wrote to memory of 3936 3632 msiexec.exe 59 PID 3632 wrote to memory of 3936 3632 msiexec.exe 59 PID 3632 wrote to memory of 2928 3632 msiexec.exe 62 PID 3632 wrote to memory of 2928 3632 msiexec.exe 62 PID 3632 wrote to memory of 2928 3632 msiexec.exe 62 PID 2928 wrote to memory of 636 2928 syncapp.exe 66 PID 2928 wrote to memory of 636 2928 syncapp.exe 66 PID 2928 wrote to memory of 636 2928 syncapp.exe 66 PID 636 wrote to memory of 2036 636 cmd.exe 68 PID 636 wrote to memory of 2036 636 cmd.exe 68 PID 636 wrote to memory of 2036 636 cmd.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe"C:\Users\Admin\AppData\Local\Temp\d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Fieldston Software\Extended Voul Painter 3.2.1.6\install\B615D1E\adv2.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1642579787 " AI_EUIMSI=""2⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:3828
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0DF6B08F74B38C02E9C09EF8AEBCCA2D C2⤵
- Loads dropped DLL
PID:1984
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1EAF16CBB6AFF6D3C1B50B3A12707D152⤵
- Loads dropped DLL
PID:3936
-
-
C:\Users\Admin\AppData\Roaming\Fieldston Software\Extended Voul Painter\syncapp.exe"C:\Users\Admin\AppData\Roaming\Fieldston Software\Extended Voul Painter\syncapp.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\XKtGwQDe & timeout 4 & del /f /q "C:\Users\Admin\AppData\Roaming\Fieldston Software\Extended Voul Painter\syncapp.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- Delays execution with timeout.exe
PID:2036
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService1⤵PID:1044