Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 11:14
Behavioral task
behavioral1
Sample
c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe
Resource
win10v2004-20221111-en
General
-
Target
c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe
-
Size
388KB
-
MD5
f889a57591697bde1036a231a29c3207
-
SHA1
3ba251d27b16bde14c3776d879db5b50166bb72e
-
SHA256
c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae
-
SHA512
460f6a087fca6a4d5c594a357ca53502748aad7b73e2d50cbf804ff72cadaa3772c467b5547f8f6c3093265f6082eb09063ce3606f5c26bce4900d5efedf7b09
-
SSDEEP
6144:CYZTNk3D6LyUXwLLk+cR3qh0GQ43VJRD0ew+/hOvK2o4nFOrz0Ypzu/S8+k7B7:CSNC80I+cR3R03VseXOvc4krwSzW+kt7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe chrome.exe" c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral2/memory/712-132-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral2/memory/712-133-0x00000000036D0000-0x00000000046FA000-memory.dmp upx behavioral2/memory/712-134-0x00000000036D0000-0x00000000046FA000-memory.dmp upx behavioral2/memory/712-135-0x00000000036D0000-0x00000000046FA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\chrome.exe" c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\u: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\v: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\y: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\f: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\n: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\s: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\x: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\e: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\h: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\m: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\p: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\r: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\z: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\i: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\j: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\k: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\l: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\o: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\q: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\t: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\w: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\a: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\b: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened (read-only) \??\g: c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\d:\autorun.inf c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\CHROME.EXE c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File created C:\Windows\SysWOW64\chrome.exe c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened for modification C:\Windows\SysWOW64\chrome.exe c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened for modification C:\Windows\SysWOW64\autorun.ini c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File created C:\Windows\chrome.exe c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe File opened for modification C:\Windows\chrome.exe c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://h1.ripway.com/poojasharma/index.html" c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "http://h1.ripway.com/poojasharma/index.html" c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://h1.ripway.com/poojasharma/index.html" c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://h1.ripway.com/poojasharma/index.html" c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://h1.ripway.com/poojasharma/index.html" c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe Token: SeDebugPrivilege 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 712 wrote to memory of 784 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 9 PID 712 wrote to memory of 792 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 14 PID 712 wrote to memory of 1016 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 10 PID 712 wrote to memory of 2524 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 43 PID 712 wrote to memory of 2536 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 59 PID 712 wrote to memory of 2636 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 57 PID 712 wrote to memory of 740 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 54 PID 712 wrote to memory of 3100 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 53 PID 712 wrote to memory of 3304 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 52 PID 712 wrote to memory of 3396 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 49 PID 712 wrote to memory of 3460 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 50 PID 712 wrote to memory of 3548 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 51 PID 712 wrote to memory of 3700 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 60 PID 712 wrote to memory of 4540 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 63 PID 712 wrote to memory of 4320 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 78 PID 712 wrote to memory of 376 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 75 PID 712 wrote to memory of 2752 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 76 PID 712 wrote to memory of 784 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 9 PID 712 wrote to memory of 792 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 14 PID 712 wrote to memory of 1016 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 10 PID 712 wrote to memory of 2524 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 43 PID 712 wrote to memory of 2536 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 59 PID 712 wrote to memory of 2636 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 57 PID 712 wrote to memory of 740 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 54 PID 712 wrote to memory of 3100 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 53 PID 712 wrote to memory of 3304 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 52 PID 712 wrote to memory of 3396 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 49 PID 712 wrote to memory of 3460 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 50 PID 712 wrote to memory of 3548 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 51 PID 712 wrote to memory of 3700 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 60 PID 712 wrote to memory of 4540 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 63 PID 712 wrote to memory of 4320 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 78 PID 712 wrote to memory of 376 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 75 PID 712 wrote to memory of 2752 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 76 PID 712 wrote to memory of 4172 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 86 PID 712 wrote to memory of 4172 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 86 PID 712 wrote to memory of 4172 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 86 PID 712 wrote to memory of 784 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 9 PID 712 wrote to memory of 792 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 14 PID 712 wrote to memory of 1016 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 10 PID 712 wrote to memory of 2524 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 43 PID 712 wrote to memory of 2536 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 59 PID 712 wrote to memory of 2636 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 57 PID 712 wrote to memory of 740 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 54 PID 712 wrote to memory of 3100 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 53 PID 712 wrote to memory of 3304 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 52 PID 712 wrote to memory of 3396 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 49 PID 712 wrote to memory of 3460 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 50 PID 712 wrote to memory of 3548 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 51 PID 712 wrote to memory of 3700 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 60 PID 712 wrote to memory of 4540 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 63 PID 712 wrote to memory of 4320 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 78 PID 712 wrote to memory of 376 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 75 PID 712 wrote to memory of 2752 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 76 PID 712 wrote to memory of 4172 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 86 PID 712 wrote to memory of 4172 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 86 PID 712 wrote to memory of 3532 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 87 PID 712 wrote to memory of 784 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 9 PID 712 wrote to memory of 792 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 14 PID 712 wrote to memory of 1016 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 10 PID 712 wrote to memory of 2524 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 43 PID 712 wrote to memory of 2536 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 59 PID 712 wrote to memory of 2636 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 57 PID 712 wrote to memory of 740 712 c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe 54 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1016
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2524
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3396
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3460
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3548
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3100
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe"C:\Users\Admin\AppData\Local\Temp\c4916e4e8c3618bf1ca62a5f00bd2f1ad6ac65b0fb3166ff683c447b527a0bae.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes3⤵PID:4172
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3532
-
-
C:\Windows\SysWOW64\at.exeAT /delete /yes4⤵PID:4348
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:4192
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:4564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\chrome.exe3⤵PID:1848
-
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\chrome.exe4⤵PID:2216
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:3116
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:3052
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:1140
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:2668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f3⤵PID:1084
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1620
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\system volume information" /e /g "Admin":f4⤵PID:2312
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:4712
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:4596
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:1656
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:3880
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:3412
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:1536
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:4692
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:3012
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:1776
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:3652
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:3532
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2536
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3700
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4540
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:376
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2752
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4320
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:3144
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:836