Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 08:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
91589b168ec9d6434c5c5a381d9e6290N.exe
Resource
win7-20240708-en
4 signatures
120 seconds
Behavioral task
behavioral2
Sample
91589b168ec9d6434c5c5a381d9e6290N.exe
Resource
win10v2004-20240709-en
5 signatures
120 seconds
General
-
Target
91589b168ec9d6434c5c5a381d9e6290N.exe
-
Size
1.2MB
-
MD5
91589b168ec9d6434c5c5a381d9e6290
-
SHA1
1f01e197e829290fb8764712953e9f34ff67b78a
-
SHA256
28ff1b45b5b868a146535ceb38f475b62d4bde1b87c343e04d83709a3a1b7157
-
SHA512
3faeb26ba460925574bdf6bb222cfe5a2d60e8bad9b671588b2c45ffa909f1a5ce2aa6b9ee9db923f54d0f73388e7d112fd055fd5fd68390e462213f0e8f5e00
-
SSDEEP
24576:Y0U6vGWQMFuobcLnplqb6qy3C2oR5VrAS58b:gpScjpcmn3CbR5NAS5
Score
10/10
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 91589b168ec9d6434c5c5a381d9e6290N.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 91589b168ec9d6434c5c5a381d9e6290N.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 91589b168ec9d6434c5c5a381d9e6290N.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\91589b168ec9d6434c5c5a381d9e6290N.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\91589b168ec9d6434c5c5a381d9e6290N.exe:*:enabled:@shell32.dll,-1" 91589b168ec9d6434c5c5a381d9e6290N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 4716 91589b168ec9d6434c5c5a381d9e6290N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4716 91589b168ec9d6434c5c5a381d9e6290N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 612 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 5 PID 4716 wrote to memory of 612 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 5 PID 4716 wrote to memory of 612 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 5 PID 4716 wrote to memory of 612 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 5 PID 4716 wrote to memory of 612 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 5 PID 4716 wrote to memory of 612 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 5 PID 4716 wrote to memory of 676 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 7 PID 4716 wrote to memory of 676 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 7 PID 4716 wrote to memory of 676 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 7 PID 4716 wrote to memory of 676 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 7 PID 4716 wrote to memory of 676 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 7 PID 4716 wrote to memory of 676 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 7 PID 4716 wrote to memory of 776 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 8 PID 4716 wrote to memory of 776 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 8 PID 4716 wrote to memory of 776 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 8 PID 4716 wrote to memory of 776 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 8 PID 4716 wrote to memory of 776 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 8 PID 4716 wrote to memory of 776 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 8 PID 4716 wrote to memory of 784 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 9 PID 4716 wrote to memory of 784 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 9 PID 4716 wrote to memory of 784 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 9 PID 4716 wrote to memory of 784 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 9 PID 4716 wrote to memory of 784 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 9 PID 4716 wrote to memory of 784 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 9 PID 4716 wrote to memory of 792 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 10 PID 4716 wrote to memory of 792 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 10 PID 4716 wrote to memory of 792 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 10 PID 4716 wrote to memory of 792 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 10 PID 4716 wrote to memory of 792 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 10 PID 4716 wrote to memory of 792 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 10 PID 4716 wrote to memory of 900 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 11 PID 4716 wrote to memory of 900 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 11 PID 4716 wrote to memory of 900 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 11 PID 4716 wrote to memory of 900 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 11 PID 4716 wrote to memory of 900 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 11 PID 4716 wrote to memory of 900 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 11 PID 4716 wrote to memory of 948 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 12 PID 4716 wrote to memory of 948 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 12 PID 4716 wrote to memory of 948 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 12 PID 4716 wrote to memory of 948 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 12 PID 4716 wrote to memory of 948 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 12 PID 4716 wrote to memory of 948 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 12 PID 4716 wrote to memory of 316 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 13 PID 4716 wrote to memory of 316 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 13 PID 4716 wrote to memory of 316 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 13 PID 4716 wrote to memory of 316 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 13 PID 4716 wrote to memory of 316 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 13 PID 4716 wrote to memory of 316 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 13 PID 4716 wrote to memory of 512 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 14 PID 4716 wrote to memory of 512 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 14 PID 4716 wrote to memory of 512 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 14 PID 4716 wrote to memory of 512 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 14 PID 4716 wrote to memory of 512 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 14 PID 4716 wrote to memory of 512 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 14 PID 4716 wrote to memory of 620 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 15 PID 4716 wrote to memory of 620 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 15 PID 4716 wrote to memory of 620 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 15 PID 4716 wrote to memory of 620 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 15 PID 4716 wrote to memory of 620 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 15 PID 4716 wrote to memory of 620 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 15 PID 4716 wrote to memory of 1052 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 16 PID 4716 wrote to memory of 1052 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 16 PID 4716 wrote to memory of 1052 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 16 PID 4716 wrote to memory of 1052 4716 91589b168ec9d6434c5c5a381d9e6290N.exe 16
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:792
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:776
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3084
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3832
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3928
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3996
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4084
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4132
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:2640
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3268
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4100
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1440
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2096
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3936
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:4644
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:2592
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:512
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1112
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2748
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:1156
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1132
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1140
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1320
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1416
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2628
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1560
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1568
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1764
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:1976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1984
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2108
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2252
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2324
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2812
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2824
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3412
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\91589b168ec9d6434c5c5a381d9e6290N.exe"C:\Users\Admin\AppData\Local\Temp\91589b168ec9d6434c5c5a381d9e6290N.exe"2⤵
- Modifies firewall policy service
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4716
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3320
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4800
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4244
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:2292