Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 04:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c269a882bcc4bba33ffbb3fa21c810b7.exe
Resource
win7-20240215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
c269a882bcc4bba33ffbb3fa21c810b7.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
c269a882bcc4bba33ffbb3fa21c810b7.exe
-
Size
156KB
-
MD5
c269a882bcc4bba33ffbb3fa21c810b7
-
SHA1
e2e4289b58a961c9c35ded8b19b8e76285237314
-
SHA256
d0055997295ea1b192815c0a8f42ffec03e3679755d383d39ddbf07085de52f9
-
SHA512
2570baea1fc9323d6f460528da02bd585f2e34dcc84edd5569d73b32d6c04509c6ef6726aecc4de26eb9a6c7c65efb19c22ce7578695be55cb781485fe0b96bb
-
SSDEEP
3072:HlGgmBam7n5lOYxKeJwjIdTc9sqsJyAK2kWA+HApqJIynv:FGdv75LqiRqswAK2S+L
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2944-0-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/2944-1-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/2944-2-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/3404-4-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-5-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-6-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-7-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-8-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-9-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-10-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-11-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-12-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-13-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-14-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-15-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-16-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-18-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-19-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-20-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-17-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-22-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-23-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-24-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-21-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-25-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-26-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-28-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-32-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-31-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-30-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-29-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-27-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-34-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-37-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-38-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-39-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/3404-40-0x000000000EA00000-0x000000000EA26000-memory.dmp upx behavioral2/memory/632-52-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-53-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-54-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-55-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-56-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-57-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-62-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-60-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-61-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-58-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-59-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-63-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-64-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-65-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/632-66-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2944-2868-0x0000000000400000-0x000000000043F000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe Token: SeDebugPrivilege 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 3404 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 57 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5 PID 2944 wrote to memory of 632 2944 c269a882bcc4bba33ffbb3fa21c810b7.exe 5
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:808
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:400
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:688
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:816
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3040
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3760
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3892
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3988
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3176
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3872
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:448
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4496
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4564
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:1716
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:1988
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca2⤵PID:4800
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:5012
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:4092
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1028
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1124
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1164
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2684
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1320
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1396
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2528
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1512
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1532
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1776
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1960
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1968
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:392
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2224
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2732
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3368
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\c269a882bcc4bba33ffbb3fa21c810b7.exe"C:\Users\Admin\AppData\Local\Temp\c269a882bcc4bba33ffbb3fa21c810b7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3560
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4908
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:1732
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:2916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:3672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:2912