Analysis
-
max time kernel
163s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe
Resource
win10v2004-20220812-en
General
-
Target
b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe
-
Size
27KB
-
MD5
6b3d7530443bcb5f6fd81bca82cefbde
-
SHA1
4771f2b694034375a107927ed3efbc7ac6d6cdde
-
SHA256
b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0
-
SHA512
08b5a75bc2b9b5c599ffb4c447dd71018beea75f4d5043a9b2306436e0bcfde157d1504e1e476160ba24671069297d0d1a77d1c131c99577b6b72000db6e54e4
-
SSDEEP
384:yBwNzpKTd/clWC9SOBmDZlOXDK/4ytB46o:yB4KThclBXRuw246o
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 760 svchost.exe 1396 svchost.exe 856 svchost.exe 1176 svchost.exe 1328 svchost.exe 1660 svchost.exe 672 svchost.exe 1732 svchost.exe 2008 svchost.exe 1944 svchost.exe 1612 svchost.exe 1704 svchost.exe 1488 svchost.exe 1796 svchost.exe 1632 svchost.exe 816 svchost.exe 1688 svchost.exe 1692 svchost.exe 1556 svchost.exe 2040 svchost.exe 1756 svchost.exe 1572 svchost.exe 2036 svchost.exe 1764 svchost.exe 1532 svchost.exe 1880 svchost.exe 1672 svchost.exe 1044 svchost.exe 1916 svchost.exe 1016 svchost.exe 396 svchost.exe 1932 svchost.exe 884 svchost.exe 1480 svchost.exe 1716 svchost.exe 320 svchost.exe 1792 svchost.exe 616 svchost.exe 1880 svchost.exe 456 svchost.exe 1044 svchost.exe 1928 svchost.exe 1360 svchost.exe 2024 svchost.exe 1576 svchost.exe 268 svchost.exe 1148 svchost.exe 1772 svchost.exe 1764 svchost.exe 768 svchost.exe 1540 svchost.exe 1468 svchost.exe 240 svchost.exe 1848 svchost.exe 792 svchost.exe 900 svchost.exe 2020 svchost.exe 1452 svchost.exe 2032 svchost.exe 1480 svchost.exe 1372 svchost.exe 1532 svchost.exe 1632 svchost.exe 1528 svchost.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1120 b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe Token: SeDebugPrivilege 760 svchost.exe Token: SeDebugPrivilege 1396 svchost.exe Token: SeDebugPrivilege 856 svchost.exe Token: SeDebugPrivilege 1176 svchost.exe Token: SeDebugPrivilege 1328 svchost.exe Token: SeDebugPrivilege 1660 svchost.exe Token: SeDebugPrivilege 672 svchost.exe Token: SeDebugPrivilege 1732 svchost.exe Token: SeDebugPrivilege 2008 svchost.exe Token: SeDebugPrivilege 1944 svchost.exe Token: SeDebugPrivilege 1612 svchost.exe Token: SeDebugPrivilege 1704 svchost.exe Token: SeDebugPrivilege 1488 svchost.exe Token: SeDebugPrivilege 1796 svchost.exe Token: SeDebugPrivilege 1632 svchost.exe Token: SeDebugPrivilege 816 svchost.exe Token: SeDebugPrivilege 1688 svchost.exe Token: SeDebugPrivilege 1692 svchost.exe Token: SeDebugPrivilege 1556 svchost.exe Token: SeDebugPrivilege 2040 svchost.exe Token: SeDebugPrivilege 1756 svchost.exe Token: SeDebugPrivilege 1572 svchost.exe Token: SeDebugPrivilege 2036 svchost.exe Token: SeDebugPrivilege 1764 svchost.exe Token: SeDebugPrivilege 1532 svchost.exe Token: SeDebugPrivilege 1880 svchost.exe Token: SeDebugPrivilege 1672 svchost.exe Token: SeDebugPrivilege 1044 svchost.exe Token: SeDebugPrivilege 1916 svchost.exe Token: SeDebugPrivilege 1016 svchost.exe Token: SeDebugPrivilege 396 svchost.exe Token: SeDebugPrivilege 1932 svchost.exe Token: SeDebugPrivilege 884 svchost.exe Token: SeDebugPrivilege 1480 svchost.exe Token: SeDebugPrivilege 1716 svchost.exe Token: SeDebugPrivilege 320 svchost.exe Token: SeDebugPrivilege 1792 svchost.exe Token: SeDebugPrivilege 616 svchost.exe Token: SeDebugPrivilege 1880 svchost.exe Token: SeDebugPrivilege 456 svchost.exe Token: SeDebugPrivilege 1044 svchost.exe Token: SeDebugPrivilege 1928 svchost.exe Token: SeDebugPrivilege 1360 svchost.exe Token: SeDebugPrivilege 2024 svchost.exe Token: SeDebugPrivilege 1576 svchost.exe Token: SeDebugPrivilege 268 svchost.exe Token: SeDebugPrivilege 1148 svchost.exe Token: SeDebugPrivilege 1772 svchost.exe Token: SeDebugPrivilege 1764 svchost.exe Token: SeDebugPrivilege 768 svchost.exe Token: SeDebugPrivilege 1540 svchost.exe Token: SeDebugPrivilege 1468 svchost.exe Token: SeDebugPrivilege 240 svchost.exe Token: SeDebugPrivilege 1848 svchost.exe Token: SeDebugPrivilege 792 svchost.exe Token: SeDebugPrivilege 900 svchost.exe Token: SeDebugPrivilege 2020 svchost.exe Token: SeDebugPrivilege 1452 svchost.exe Token: SeDebugPrivilege 2032 svchost.exe Token: SeDebugPrivilege 1480 svchost.exe Token: SeDebugPrivilege 1372 svchost.exe Token: SeDebugPrivilege 1532 svchost.exe Token: SeDebugPrivilege 1632 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1120 wrote to memory of 760 1120 b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe 28 PID 1120 wrote to memory of 760 1120 b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe 28 PID 1120 wrote to memory of 760 1120 b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe 28 PID 1120 wrote to memory of 760 1120 b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe 28 PID 760 wrote to memory of 1396 760 svchost.exe 29 PID 760 wrote to memory of 1396 760 svchost.exe 29 PID 760 wrote to memory of 1396 760 svchost.exe 29 PID 760 wrote to memory of 1396 760 svchost.exe 29 PID 1396 wrote to memory of 856 1396 svchost.exe 30 PID 1396 wrote to memory of 856 1396 svchost.exe 30 PID 1396 wrote to memory of 856 1396 svchost.exe 30 PID 1396 wrote to memory of 856 1396 svchost.exe 30 PID 856 wrote to memory of 1176 856 svchost.exe 31 PID 856 wrote to memory of 1176 856 svchost.exe 31 PID 856 wrote to memory of 1176 856 svchost.exe 31 PID 856 wrote to memory of 1176 856 svchost.exe 31 PID 1176 wrote to memory of 1328 1176 svchost.exe 32 PID 1176 wrote to memory of 1328 1176 svchost.exe 32 PID 1176 wrote to memory of 1328 1176 svchost.exe 32 PID 1176 wrote to memory of 1328 1176 svchost.exe 32 PID 1328 wrote to memory of 1660 1328 svchost.exe 33 PID 1328 wrote to memory of 1660 1328 svchost.exe 33 PID 1328 wrote to memory of 1660 1328 svchost.exe 33 PID 1328 wrote to memory of 1660 1328 svchost.exe 33 PID 1660 wrote to memory of 672 1660 svchost.exe 34 PID 1660 wrote to memory of 672 1660 svchost.exe 34 PID 1660 wrote to memory of 672 1660 svchost.exe 34 PID 1660 wrote to memory of 672 1660 svchost.exe 34 PID 672 wrote to memory of 1732 672 svchost.exe 35 PID 672 wrote to memory of 1732 672 svchost.exe 35 PID 672 wrote to memory of 1732 672 svchost.exe 35 PID 672 wrote to memory of 1732 672 svchost.exe 35 PID 1732 wrote to memory of 2008 1732 svchost.exe 36 PID 1732 wrote to memory of 2008 1732 svchost.exe 36 PID 1732 wrote to memory of 2008 1732 svchost.exe 36 PID 1732 wrote to memory of 2008 1732 svchost.exe 36 PID 2008 wrote to memory of 1944 2008 svchost.exe 37 PID 2008 wrote to memory of 1944 2008 svchost.exe 37 PID 2008 wrote to memory of 1944 2008 svchost.exe 37 PID 2008 wrote to memory of 1944 2008 svchost.exe 37 PID 1944 wrote to memory of 1612 1944 svchost.exe 38 PID 1944 wrote to memory of 1612 1944 svchost.exe 38 PID 1944 wrote to memory of 1612 1944 svchost.exe 38 PID 1944 wrote to memory of 1612 1944 svchost.exe 38 PID 1612 wrote to memory of 1704 1612 svchost.exe 39 PID 1612 wrote to memory of 1704 1612 svchost.exe 39 PID 1612 wrote to memory of 1704 1612 svchost.exe 39 PID 1612 wrote to memory of 1704 1612 svchost.exe 39 PID 1704 wrote to memory of 1488 1704 svchost.exe 40 PID 1704 wrote to memory of 1488 1704 svchost.exe 40 PID 1704 wrote to memory of 1488 1704 svchost.exe 40 PID 1704 wrote to memory of 1488 1704 svchost.exe 40 PID 1488 wrote to memory of 1796 1488 svchost.exe 41 PID 1488 wrote to memory of 1796 1488 svchost.exe 41 PID 1488 wrote to memory of 1796 1488 svchost.exe 41 PID 1488 wrote to memory of 1796 1488 svchost.exe 41 PID 1796 wrote to memory of 1632 1796 svchost.exe 42 PID 1796 wrote to memory of 1632 1796 svchost.exe 42 PID 1796 wrote to memory of 1632 1796 svchost.exe 42 PID 1796 wrote to memory of 1632 1796 svchost.exe 42 PID 1632 wrote to memory of 816 1632 svchost.exe 43 PID 1632 wrote to memory of 816 1632 svchost.exe 43 PID 1632 wrote to memory of 816 1632 svchost.exe 43 PID 1632 wrote to memory of 816 1632 svchost.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe"C:\Users\Admin\AppData\Local\Temp\b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:816 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1688 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1692 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"20⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1556 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"22⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1756 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"23⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1572 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1764 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"27⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1880 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"29⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1044 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1916 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1016 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:396 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"34⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"35⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:320 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"38⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"39⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:616 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"40⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1880 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"41⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:456 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1044 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"43⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1928 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1360 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"45⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:268 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"48⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1148 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1772 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1764 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:768 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:240 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1848 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"56⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:792 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"57⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:900 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"60⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"62⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1372 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"63⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"64⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"65⤵
- Executes dropped EXE
PID:1528 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"66⤵
- Drops file in Windows directory
PID:1328 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"67⤵
- Drops file in Windows directory
PID:920 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"68⤵
- Drops file in Windows directory
PID:1948 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"69⤵PID:1608
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"70⤵
- Drops file in Windows directory
PID:2008 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"71⤵PID:1752
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"72⤵
- Drops file in Windows directory
PID:860 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"73⤵
- Drops file in Windows directory
PID:884 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"74⤵PID:628
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"75⤵PID:1800
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"76⤵PID:1372
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"77⤵
- Drops file in Windows directory
PID:1532 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"78⤵
- Drops file in Windows directory
PID:1728 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"79⤵PID:964
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"80⤵
- Drops file in Windows directory
PID:1984 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"81⤵PID:920
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"82⤵PID:1104
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"83⤵PID:1928
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"84⤵PID:828
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"85⤵PID:1932
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"86⤵
- Drops file in Windows directory
PID:472 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"87⤵PID:760
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"88⤵PID:1908
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"89⤵PID:1800
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"90⤵PID:820
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"91⤵PID:1796
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"92⤵PID:1660
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"93⤵PID:1528
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"94⤵PID:672
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"95⤵PID:1848
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"96⤵
- Drops file in Windows directory
PID:1524 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"97⤵PID:660
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"98⤵PID:1576
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"99⤵
- Drops file in Windows directory
PID:1120 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"100⤵PID:524
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"101⤵
- Drops file in Windows directory
PID:340 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"102⤵PID:436
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"103⤵PID:1800
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"104⤵PID:1620
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"105⤵
- Drops file in Windows directory
PID:1796 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"106⤵PID:1792
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"107⤵
- Drops file in Windows directory
PID:964 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"108⤵PID:672
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"109⤵PID:1848
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"110⤵PID:2040
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"111⤵PID:796
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"112⤵PID:1356
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"113⤵PID:596
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"114⤵PID:1396
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"115⤵PID:1744
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"116⤵PID:1788
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"117⤵PID:1952
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"118⤵PID:1492
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"119⤵PID:1556
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"120⤵PID:1948
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"121⤵PID:920
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"122⤵PID:992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-