Analysis
-
max time kernel
2068s -
max time network
2072s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31/01/2023, 08:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://h
Resource
win10v2004-20220812-en
12 signatures
1800 seconds
General
-
Target
http://h
Score
6/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\T: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\F: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\W: mstsc.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000\Device Parameters mstsc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4788 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4140 chrome.exe 4140 chrome.exe 2268 chrome.exe 2268 chrome.exe 4728 chrome.exe 4728 chrome.exe 2096 chrome.exe 2096 chrome.exe 4692 chrome.exe 4692 chrome.exe 3620 chrome.exe 3620 chrome.exe 3624 chrome.exe 3624 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4788 mstsc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3124 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3124 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4788 mstsc.exe 3844 CredentialUIBroker.exe 4452 CredentialUIBroker.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe 4788 mstsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 4960 2268 chrome.exe 80 PID 2268 wrote to memory of 4960 2268 chrome.exe 80 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 3540 2268 chrome.exe 83 PID 2268 wrote to memory of 4140 2268 chrome.exe 84 PID 2268 wrote to memory of 4140 2268 chrome.exe 84 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85 PID 2268 wrote to memory of 3836 2268 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://h1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc5a24f50,0x7ffcc5a24f60,0x7ffcc5a24f702⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1656 /prefetch:22⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2324 /prefetch:82⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:12⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4320 /prefetch:82⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4276 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4440 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4408 /prefetch:82⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3184 /prefetch:82⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3220 /prefetch:82⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1148 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,11715676305662620420,14358185785018988851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:82⤵PID:4460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
-
C:\Windows\system32\mstsc.exe"C:\Windows\system32\mstsc.exe"1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4788
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainerFailedMip -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2672
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainerFailedMip -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4452
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x244 0x3d41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3124