Analysis
-
max time kernel
140s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 12:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bbd565b5fc7e2c7ae5a72323c6c84043.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
bbd565b5fc7e2c7ae5a72323c6c84043.exe
Resource
win10v2004-20240226-en
6 signatures
150 seconds
General
-
Target
bbd565b5fc7e2c7ae5a72323c6c84043.exe
-
Size
241KB
-
MD5
bbd565b5fc7e2c7ae5a72323c6c84043
-
SHA1
dc9f8f2c724079a34f3cd14e956d5d7e0536da53
-
SHA256
4fe7b2d7f391cb0780eb9d3abb54548f4a28b8d86ef98276226506a9027908e9
-
SHA512
9c723ec532654340d98b1c6ef06484ea0661a4fa23adb00abd516296d3b5f577e0061fc9b3b56d73fad3041ab425b3a69c701c136efafd4074f97eaf36bda2b9
-
SSDEEP
6144:2qdNGT8pG5cnEUyE7NmZpIDYSHKp9JT5S6VR/Uu:nTnEUye0YHO9JXR/j
Score
10/10
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List bbd565b5fc7e2c7ae5a72323c6c84043.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile bbd565b5fc7e2c7ae5a72323c6c84043.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications bbd565b5fc7e2c7ae5a72323c6c84043.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\bbd565b5fc7e2c7ae5a72323c6c84043.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bbd565b5fc7e2c7ae5a72323c6c84043.exe:*:enabled:@shell32.dll,-1" bbd565b5fc7e2c7ae5a72323c6c84043.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4688 2184 WerFault.exe 81 3232 2184 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 628 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 5 PID 2184 wrote to memory of 628 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 5 PID 2184 wrote to memory of 628 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 5 PID 2184 wrote to memory of 628 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 5 PID 2184 wrote to memory of 628 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 5 PID 2184 wrote to memory of 628 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 5 PID 2184 wrote to memory of 684 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 7 PID 2184 wrote to memory of 684 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 7 PID 2184 wrote to memory of 684 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 7 PID 2184 wrote to memory of 684 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 7 PID 2184 wrote to memory of 684 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 7 PID 2184 wrote to memory of 684 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 7 PID 2184 wrote to memory of 788 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 8 PID 2184 wrote to memory of 788 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 8 PID 2184 wrote to memory of 788 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 8 PID 2184 wrote to memory of 788 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 8 PID 2184 wrote to memory of 788 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 8 PID 2184 wrote to memory of 788 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 8 PID 2184 wrote to memory of 792 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 9 PID 2184 wrote to memory of 792 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 9 PID 2184 wrote to memory of 792 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 9 PID 2184 wrote to memory of 792 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 9 PID 2184 wrote to memory of 792 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 9 PID 2184 wrote to memory of 792 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 9 PID 2184 wrote to memory of 804 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 10 PID 2184 wrote to memory of 804 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 10 PID 2184 wrote to memory of 804 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 10 PID 2184 wrote to memory of 804 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 10 PID 2184 wrote to memory of 804 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 10 PID 2184 wrote to memory of 804 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 10 PID 2184 wrote to memory of 912 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 11 PID 2184 wrote to memory of 912 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 11 PID 2184 wrote to memory of 912 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 11 PID 2184 wrote to memory of 912 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 11 PID 2184 wrote to memory of 912 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 11 PID 2184 wrote to memory of 912 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 11 PID 2184 wrote to memory of 964 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 12 PID 2184 wrote to memory of 964 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 12 PID 2184 wrote to memory of 964 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 12 PID 2184 wrote to memory of 964 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 12 PID 2184 wrote to memory of 964 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 12 PID 2184 wrote to memory of 964 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 12 PID 2184 wrote to memory of 316 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 13 PID 2184 wrote to memory of 316 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 13 PID 2184 wrote to memory of 316 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 13 PID 2184 wrote to memory of 316 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 13 PID 2184 wrote to memory of 316 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 13 PID 2184 wrote to memory of 316 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 13 PID 2184 wrote to memory of 396 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 14 PID 2184 wrote to memory of 396 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 14 PID 2184 wrote to memory of 396 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 14 PID 2184 wrote to memory of 396 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 14 PID 2184 wrote to memory of 396 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 14 PID 2184 wrote to memory of 396 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 14 PID 2184 wrote to memory of 704 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 15 PID 2184 wrote to memory of 704 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 15 PID 2184 wrote to memory of 704 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 15 PID 2184 wrote to memory of 704 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 15 PID 2184 wrote to memory of 704 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 15 PID 2184 wrote to memory of 704 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 15 PID 2184 wrote to memory of 1032 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 16 PID 2184 wrote to memory of 1032 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 16 PID 2184 wrote to memory of 1032 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 16 PID 2184 wrote to memory of 1032 2184 bbd565b5fc7e2c7ae5a72323c6c84043.exe 16
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:628
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:792
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:684
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:804
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3164
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3864
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3968
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4032
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:1016
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4124
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4500
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4652
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:1888
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4828
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca2⤵PID:2756
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:5060
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:2956
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1032
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1204
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2544
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1224
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1388
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2424
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1500
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1656
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1808
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1948
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1960
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2040
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2052
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2124
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2828
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2856
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3264
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\bbd565b5fc7e2c7ae5a72323c6c84043.exe"C:\Users\Admin\AppData\Local\Temp\bbd565b5fc7e2c7ae5a72323c6c84043.exe"2⤵
- Modifies firewall policy service
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 5403⤵
- Program crash
PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 5123⤵
- Program crash
PID:4688
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2148
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1452
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:1548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:1716
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2184 -ip 21841⤵PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2184 -ip 21841⤵PID:1704