Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
1cdcb2aa7ed94048ce05a71cbf911b33.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1cdcb2aa7ed94048ce05a71cbf911b33.exe
Resource
win10v2004-20231222-en
General
-
Target
1cdcb2aa7ed94048ce05a71cbf911b33.exe
-
Size
471KB
-
MD5
1cdcb2aa7ed94048ce05a71cbf911b33
-
SHA1
2f5d084011b7a7942bd0c90a6557397ce87f730b
-
SHA256
1fdb72c9f14350081f3717e6a70df391fa1aa5ca938c8bd82769bc0c254c17dd
-
SHA512
5f55cb852349f775cb7dcdcf5de4294c549e7b4a0d44e37f03580b91c5b4175f21c005446c16fc48fab718ac6baf46ee7b4b20236d92ef5ad772561ea91b1263
-
SSDEEP
6144:/1XacXavNFEoNkqPg5I0KVTHyPWOYMI6dn0z76fcCEmi/id6mmtCv1HC:/1Xa02H2KV+WKI6V0ZCEmi/i8m4Cg
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1628 Csrtss.exe 2784 Csrtss.exe 2788 Csrtss.exe 2720 Csrtss.exe 2752 Csrtss.exe 2608 Csrtss.exe 1988 Csrtss.exe 2572 Csrtss.exe 2656 Csrtss.exe 2916 Csrtss.exe 2628 Csrtss.exe 1692 Csrtss.exe 1756 Csrtss.exe 2524 Csrtss.exe 1196 Csrtss.exe 608 Csrtss.exe 2540 Csrtss.exe 1332 Csrtss.exe 2384 Csrtss.exe 1784 Csrtss.exe 1360 Csrtss.exe 704 Csrtss.exe 2296 Csrtss.exe 2440 Csrtss.exe 2320 Csrtss.exe 2452 Csrtss.exe 880 Csrtss.exe 2428 Csrtss.exe 1132 Csrtss.exe 1768 Csrtss.exe 1540 Csrtss.exe 1340 Csrtss.exe 1816 Csrtss.exe 1776 Csrtss.exe 916 Csrtss.exe 2028 Csrtss.exe 1724 Csrtss.exe 2832 Csrtss.exe 1164 Csrtss.exe 1804 Csrtss.exe 1744 Csrtss.exe 2460 Csrtss.exe 1588 Csrtss.exe 2132 Csrtss.exe 2948 Csrtss.exe 2072 Csrtss.exe 2728 Csrtss.exe 2812 Csrtss.exe 2784 Csrtss.exe 1796 Csrtss.exe 2856 Csrtss.exe 2596 Csrtss.exe 2648 Csrtss.exe 2620 Csrtss.exe 2640 Csrtss.exe 3044 Csrtss.exe 1652 Csrtss.exe 1916 Csrtss.exe 2676 Csrtss.exe 1020 Csrtss.exe 1904 Csrtss.exe 2916 Csrtss.exe 1032 Csrtss.exe 1428 Csrtss.exe -
Loads dropped DLL 64 IoCs
pid Process 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1628 Csrtss.exe 1628 Csrtss.exe 2784 Csrtss.exe 2784 Csrtss.exe 2788 Csrtss.exe 2788 Csrtss.exe 2720 Csrtss.exe 2720 Csrtss.exe 2752 Csrtss.exe 2752 Csrtss.exe 2608 Csrtss.exe 2608 Csrtss.exe 1988 Csrtss.exe 1988 Csrtss.exe 2572 Csrtss.exe 2572 Csrtss.exe 2656 Csrtss.exe 2656 Csrtss.exe 2916 Csrtss.exe 2916 Csrtss.exe 2628 Csrtss.exe 2628 Csrtss.exe 1692 Csrtss.exe 1692 Csrtss.exe 1756 Csrtss.exe 1756 Csrtss.exe 2524 Csrtss.exe 2524 Csrtss.exe 1196 Csrtss.exe 1196 Csrtss.exe 608 Csrtss.exe 608 Csrtss.exe 2540 Csrtss.exe 2540 Csrtss.exe 1332 Csrtss.exe 1332 Csrtss.exe 2384 Csrtss.exe 2384 Csrtss.exe 1784 Csrtss.exe 1784 Csrtss.exe 1360 Csrtss.exe 1360 Csrtss.exe 704 Csrtss.exe 704 Csrtss.exe 2296 Csrtss.exe 2296 Csrtss.exe 2440 Csrtss.exe 2440 Csrtss.exe 2320 Csrtss.exe 2320 Csrtss.exe 2452 Csrtss.exe 2452 Csrtss.exe 880 Csrtss.exe 880 Csrtss.exe 2428 Csrtss.exe 2428 Csrtss.exe 1132 Csrtss.exe 1132 Csrtss.exe 1768 Csrtss.exe 1768 Csrtss.exe 1540 Csrtss.exe 1540 Csrtss.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe Token: SeDebugPrivilege 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe Token: SeDebugPrivilege 1628 Csrtss.exe Token: SeDebugPrivilege 1628 Csrtss.exe Token: SeDebugPrivilege 2784 Csrtss.exe Token: SeDebugPrivilege 2784 Csrtss.exe Token: SeDebugPrivilege 2788 Csrtss.exe Token: SeDebugPrivilege 2788 Csrtss.exe Token: SeDebugPrivilege 2720 Csrtss.exe Token: SeDebugPrivilege 2720 Csrtss.exe Token: SeDebugPrivilege 2752 Csrtss.exe Token: SeDebugPrivilege 2752 Csrtss.exe Token: SeDebugPrivilege 2608 Csrtss.exe Token: SeDebugPrivilege 2608 Csrtss.exe Token: SeDebugPrivilege 1988 Csrtss.exe Token: SeDebugPrivilege 1988 Csrtss.exe Token: SeDebugPrivilege 2572 Csrtss.exe Token: SeDebugPrivilege 2572 Csrtss.exe Token: SeDebugPrivilege 2656 Csrtss.exe Token: SeDebugPrivilege 2656 Csrtss.exe Token: SeDebugPrivilege 2916 Csrtss.exe Token: SeDebugPrivilege 2916 Csrtss.exe Token: SeDebugPrivilege 2628 Csrtss.exe Token: SeDebugPrivilege 2628 Csrtss.exe Token: SeDebugPrivilege 1692 Csrtss.exe Token: SeDebugPrivilege 1692 Csrtss.exe Token: SeDebugPrivilege 1756 Csrtss.exe Token: SeDebugPrivilege 1756 Csrtss.exe Token: SeDebugPrivilege 2524 Csrtss.exe Token: SeDebugPrivilege 2524 Csrtss.exe Token: SeDebugPrivilege 1196 Csrtss.exe Token: SeDebugPrivilege 1196 Csrtss.exe Token: SeDebugPrivilege 608 Csrtss.exe Token: SeDebugPrivilege 608 Csrtss.exe Token: SeDebugPrivilege 2540 Csrtss.exe Token: SeDebugPrivilege 2540 Csrtss.exe Token: SeDebugPrivilege 1332 Csrtss.exe Token: SeDebugPrivilege 1332 Csrtss.exe Token: SeDebugPrivilege 2384 Csrtss.exe Token: SeDebugPrivilege 2384 Csrtss.exe Token: SeDebugPrivilege 1784 Csrtss.exe Token: SeDebugPrivilege 1784 Csrtss.exe Token: SeDebugPrivilege 1360 Csrtss.exe Token: SeDebugPrivilege 1360 Csrtss.exe Token: SeDebugPrivilege 704 Csrtss.exe Token: SeDebugPrivilege 704 Csrtss.exe Token: SeDebugPrivilege 2296 Csrtss.exe Token: SeDebugPrivilege 2296 Csrtss.exe Token: SeDebugPrivilege 2440 Csrtss.exe Token: SeDebugPrivilege 2440 Csrtss.exe Token: SeDebugPrivilege 2320 Csrtss.exe Token: SeDebugPrivilege 2320 Csrtss.exe Token: SeDebugPrivilege 2452 Csrtss.exe Token: SeDebugPrivilege 2452 Csrtss.exe Token: SeDebugPrivilege 880 Csrtss.exe Token: SeDebugPrivilege 880 Csrtss.exe Token: SeDebugPrivilege 2428 Csrtss.exe Token: SeDebugPrivilege 2428 Csrtss.exe Token: SeDebugPrivilege 1132 Csrtss.exe Token: SeDebugPrivilege 1132 Csrtss.exe Token: SeDebugPrivilege 1768 Csrtss.exe Token: SeDebugPrivilege 1768 Csrtss.exe Token: SeDebugPrivilege 1540 Csrtss.exe Token: SeDebugPrivilege 1540 Csrtss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1628 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 28 PID 2072 wrote to memory of 1628 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 28 PID 2072 wrote to memory of 1628 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 28 PID 2072 wrote to memory of 1628 2072 1cdcb2aa7ed94048ce05a71cbf911b33.exe 28 PID 1628 wrote to memory of 2784 1628 Csrtss.exe 29 PID 1628 wrote to memory of 2784 1628 Csrtss.exe 29 PID 1628 wrote to memory of 2784 1628 Csrtss.exe 29 PID 1628 wrote to memory of 2784 1628 Csrtss.exe 29 PID 2784 wrote to memory of 2788 2784 Csrtss.exe 30 PID 2784 wrote to memory of 2788 2784 Csrtss.exe 30 PID 2784 wrote to memory of 2788 2784 Csrtss.exe 30 PID 2784 wrote to memory of 2788 2784 Csrtss.exe 30 PID 2788 wrote to memory of 2720 2788 Csrtss.exe 31 PID 2788 wrote to memory of 2720 2788 Csrtss.exe 31 PID 2788 wrote to memory of 2720 2788 Csrtss.exe 31 PID 2788 wrote to memory of 2720 2788 Csrtss.exe 31 PID 2720 wrote to memory of 2752 2720 Csrtss.exe 32 PID 2720 wrote to memory of 2752 2720 Csrtss.exe 32 PID 2720 wrote to memory of 2752 2720 Csrtss.exe 32 PID 2720 wrote to memory of 2752 2720 Csrtss.exe 32 PID 2752 wrote to memory of 2608 2752 Csrtss.exe 33 PID 2752 wrote to memory of 2608 2752 Csrtss.exe 33 PID 2752 wrote to memory of 2608 2752 Csrtss.exe 33 PID 2752 wrote to memory of 2608 2752 Csrtss.exe 33 PID 2608 wrote to memory of 1988 2608 Csrtss.exe 34 PID 2608 wrote to memory of 1988 2608 Csrtss.exe 34 PID 2608 wrote to memory of 1988 2608 Csrtss.exe 34 PID 2608 wrote to memory of 1988 2608 Csrtss.exe 34 PID 1988 wrote to memory of 2572 1988 Csrtss.exe 35 PID 1988 wrote to memory of 2572 1988 Csrtss.exe 35 PID 1988 wrote to memory of 2572 1988 Csrtss.exe 35 PID 1988 wrote to memory of 2572 1988 Csrtss.exe 35 PID 2572 wrote to memory of 2656 2572 Csrtss.exe 36 PID 2572 wrote to memory of 2656 2572 Csrtss.exe 36 PID 2572 wrote to memory of 2656 2572 Csrtss.exe 36 PID 2572 wrote to memory of 2656 2572 Csrtss.exe 36 PID 2656 wrote to memory of 2916 2656 Csrtss.exe 37 PID 2656 wrote to memory of 2916 2656 Csrtss.exe 37 PID 2656 wrote to memory of 2916 2656 Csrtss.exe 37 PID 2656 wrote to memory of 2916 2656 Csrtss.exe 37 PID 2916 wrote to memory of 2628 2916 Csrtss.exe 38 PID 2916 wrote to memory of 2628 2916 Csrtss.exe 38 PID 2916 wrote to memory of 2628 2916 Csrtss.exe 38 PID 2916 wrote to memory of 2628 2916 Csrtss.exe 38 PID 2628 wrote to memory of 1692 2628 Csrtss.exe 39 PID 2628 wrote to memory of 1692 2628 Csrtss.exe 39 PID 2628 wrote to memory of 1692 2628 Csrtss.exe 39 PID 2628 wrote to memory of 1692 2628 Csrtss.exe 39 PID 1692 wrote to memory of 1756 1692 Csrtss.exe 40 PID 1692 wrote to memory of 1756 1692 Csrtss.exe 40 PID 1692 wrote to memory of 1756 1692 Csrtss.exe 40 PID 1692 wrote to memory of 1756 1692 Csrtss.exe 40 PID 1756 wrote to memory of 2524 1756 Csrtss.exe 41 PID 1756 wrote to memory of 2524 1756 Csrtss.exe 41 PID 1756 wrote to memory of 2524 1756 Csrtss.exe 41 PID 1756 wrote to memory of 2524 1756 Csrtss.exe 41 PID 2524 wrote to memory of 1196 2524 Csrtss.exe 42 PID 2524 wrote to memory of 1196 2524 Csrtss.exe 42 PID 2524 wrote to memory of 1196 2524 Csrtss.exe 42 PID 2524 wrote to memory of 1196 2524 Csrtss.exe 42 PID 1196 wrote to memory of 608 1196 Csrtss.exe 43 PID 1196 wrote to memory of 608 1196 Csrtss.exe 43 PID 1196 wrote to memory of 608 1196 Csrtss.exe 43 PID 1196 wrote to memory of 608 1196 Csrtss.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cdcb2aa7ed94048ce05a71cbf911b33.exe"C:\Users\Admin\AppData\Local\Temp\1cdcb2aa7ed94048ce05a71cbf911b33.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Users\Admin\AppData\Local\Temp\1cdcb2aa7ed94048ce05a71cbf911b33.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:608 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2540 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1332 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2384 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1784 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1360 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:704 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2320 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2452 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1132 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1768 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"33⤵
- Executes dropped EXE
PID:1340 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"34⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"35⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1776 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"36⤵
- Executes dropped EXE
PID:916 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"37⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"38⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"39⤵
- Executes dropped EXE
PID:2832 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"40⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"41⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"42⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1744 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"43⤵PID:2460
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"44⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1588 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"45⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"46⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"47⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2072 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2728 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"49⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2812 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2784 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"51⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"52⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2856 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"53⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"54⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"55⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2620 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"56⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"57⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3044 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"58⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"59⤵
- Executes dropped EXE
PID:1916 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"60⤵
- Executes dropped EXE
PID:2676 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"61⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"62⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"63⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"64⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1032 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"65⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1428 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"66⤵
- Drops file in System32 directory
PID:1616 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"67⤵PID:2136
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"68⤵PID:1488
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"69⤵PID:1436
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"70⤵PID:268
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"71⤵PID:1576
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"72⤵PID:848
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"73⤵PID:1716
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"74⤵PID:1276
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"75⤵
- Adds Run key to start application
PID:1228 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"76⤵PID:2260
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"77⤵PID:2560
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"78⤵PID:1992
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"79⤵PID:2444
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"80⤵PID:2400
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"81⤵
- Adds Run key to start application
PID:572 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"82⤵PID:2172
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"83⤵PID:1136
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"84⤵PID:2000
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"85⤵
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"86⤵PID:1376
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"87⤵PID:1704
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"88⤵PID:1572
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"89⤵
- Drops file in System32 directory
PID:1540 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"90⤵
- Adds Run key to start application
PID:1340 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"91⤵PID:1740
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"92⤵
- Drops file in System32 directory
PID:564 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"93⤵
- Adds Run key to start application
PID:2336 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"94⤵PID:2036
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"95⤵
- Drops file in System32 directory
PID:1044 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"96⤵
- Adds Run key to start application
PID:2472 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"97⤵PID:1752
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"98⤵
- Drops file in System32 directory
PID:2108 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"99⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2460 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"100⤵PID:1116
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"101⤵PID:2852
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"102⤵
- Adds Run key to start application
PID:2964 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"103⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2872 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"104⤵PID:2788
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"105⤵PID:2760
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"106⤵
- Drops file in System32 directory
PID:2520 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"107⤵
- Drops file in System32 directory
PID:3028 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"108⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2820 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"109⤵
- Drops file in System32 directory
PID:3040 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"110⤵PID:1028
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"111⤵PID:2888
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"112⤵PID:2836
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"113⤵PID:2572
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"114⤵
- Adds Run key to start application
PID:2668 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"115⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2160 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"116⤵PID:2564
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"117⤵PID:1648
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"118⤵PID:1016
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"119⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1756 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"120⤵PID:1824
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"121⤵PID:2524
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"122⤵PID:2144
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-