Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 17:13 UTC
Static task
static1
Behavioral task
behavioral1
Sample
9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe
Resource
win10v2004-20220812-en
General
-
Target
9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe
-
Size
46KB
-
MD5
059132220573a0a7b40771fd98741f60
-
SHA1
677b871b691a8bf8b4992a369bb23a2c77e6e8db
-
SHA256
9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199
-
SHA512
0cf095fd2134547c525dd17e05debbc1b49e9b25e6de14c8cec113ab5b3915c10460d1eeda5b39b0bf474d2be05ebc75feb42052c8c1c9539c58f923fb92714d
-
SSDEEP
768:VG3emjLYAhSn98/KWb5NtaR06hUaGYs3yo66oQ8+fJaG:VGOmAN9cK8taRFtG5xa
Malware Config
Signatures
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "169" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 4044 Process not Found 2152 Process not Found 4964 Process not Found 2904 Process not Found 2596 Process not Found 4256 Process not Found 4260 Process not Found 4304 Process not Found 3516 Process not Found 4236 Process not Found 4548 Process not Found 1048 Process not Found 3744 Process not Found 5056 Process not Found 4856 Process not Found 3364 Process not Found 4700 Process not Found 3600 Process not Found 3880 Process not Found 3688 Process not Found 1496 Process not Found 1200 Process not Found 1928 Process not Found 3428 Process not Found 4580 Process not Found 3348 Process not Found 1788 Process not Found 1916 Process not Found 1852 Process not Found 2112 Process not Found 4496 Process not Found 3832 Process not Found 2296 Process not Found 4968 Process not Found 4804 Process not Found 4620 Process not Found 4180 Process not Found 440 Process not Found 2772 Process not Found 4224 Process not Found 1376 Process not Found 3776 Process not Found 3940 Process not Found 3096 Process not Found 5020 Process not Found 2160 Process not Found 4244 Process not Found 1436 Process not Found 1908 Process not Found 2444 Process not Found 1308 Process not Found 3692 Process not Found 2996 Process not Found 1968 Process not Found 4112 Process not Found 1700 Process not Found 3492 Process not Found 3636 Process not Found 5112 Process not Found 3356 Process not Found 4376 Process not Found 4436 Process not Found 1520 Process not Found 936 Process not Found -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2988 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 796 wrote to memory of 600 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 5 PID 796 wrote to memory of 600 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 5 PID 796 wrote to memory of 600 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 5 PID 796 wrote to memory of 600 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 5 PID 796 wrote to memory of 600 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 5 PID 796 wrote to memory of 600 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 5 PID 796 wrote to memory of 656 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 3 PID 796 wrote to memory of 656 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 3 PID 796 wrote to memory of 656 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 3 PID 796 wrote to memory of 656 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 3 PID 796 wrote to memory of 656 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 3 PID 796 wrote to memory of 656 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 3 PID 796 wrote to memory of 760 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 8 PID 796 wrote to memory of 760 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 8 PID 796 wrote to memory of 760 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 8 PID 796 wrote to memory of 760 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 8 PID 796 wrote to memory of 760 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 8 PID 796 wrote to memory of 760 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 8 PID 796 wrote to memory of 768 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 79 PID 796 wrote to memory of 768 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 79 PID 796 wrote to memory of 768 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 79 PID 796 wrote to memory of 768 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 79 PID 796 wrote to memory of 768 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 79 PID 796 wrote to memory of 768 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 79 PID 796 wrote to memory of 776 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 78 PID 796 wrote to memory of 776 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 78 PID 796 wrote to memory of 776 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 78 PID 796 wrote to memory of 776 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 78 PID 796 wrote to memory of 776 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 78 PID 796 wrote to memory of 776 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 78 PID 796 wrote to memory of 888 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 77 PID 796 wrote to memory of 888 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 77 PID 796 wrote to memory of 888 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 77 PID 796 wrote to memory of 888 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 77 PID 796 wrote to memory of 888 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 77 PID 796 wrote to memory of 888 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 77 PID 796 wrote to memory of 940 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 76 PID 796 wrote to memory of 940 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 76 PID 796 wrote to memory of 940 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 76 PID 796 wrote to memory of 940 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 76 PID 796 wrote to memory of 940 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 76 PID 796 wrote to memory of 940 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 76 PID 796 wrote to memory of 1016 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 75 PID 796 wrote to memory of 1016 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 75 PID 796 wrote to memory of 1016 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 75 PID 796 wrote to memory of 1016 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 75 PID 796 wrote to memory of 1016 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 75 PID 796 wrote to memory of 1016 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 75 PID 796 wrote to memory of 332 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 74 PID 796 wrote to memory of 332 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 74 PID 796 wrote to memory of 332 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 74 PID 796 wrote to memory of 332 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 74 PID 796 wrote to memory of 332 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 74 PID 796 wrote to memory of 332 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 74 PID 796 wrote to memory of 736 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 73 PID 796 wrote to memory of 736 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 73 PID 796 wrote to memory of 736 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 73 PID 796 wrote to memory of 736 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 73 PID 796 wrote to memory of 736 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 73 PID 796 wrote to memory of 736 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 73 PID 796 wrote to memory of 644 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 72 PID 796 wrote to memory of 644 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 72 PID 796 wrote to memory of 644 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 72 PID 796 wrote to memory of 644 796 9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe 72
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:656
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:600
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1016
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:768
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39f0055 /state1:0x41c64e6d2⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2988
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1184
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1624
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1900
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3404
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3484
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2448
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:8
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:2332
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:1300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4168
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3864
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:5068
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3668
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3340
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:752
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe"C:\Users\Admin\AppData\Local\Temp\9d38e91757b5aae61ee2197747010adb9c650f4ff82eb8bc5cb9d246d124d199.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2164
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2576
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2568
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2392
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2336
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2304
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2064
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:1440
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1892
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1820
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1352
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1288
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:644
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:776