Overview
overview
10Static
static
10foo/0044d6...f7.exe
windows7-x64
1foo/0044d6...f7.exe
windows10-2004-x64
3foo/034e4c...a9.exe
windows7-x64
4foo/034e4c...a9.exe
windows10-2004-x64
4foo/035fa2...72.exe
windows7-x64
6foo/035fa2...72.exe
windows10-2004-x64
6foo/04884a...1b.exe
windows7-x64
7foo/04884a...1b.exe
windows10-2004-x64
7foo/06ed82...59.exe
windows7-x64
7foo/06ed82...59.exe
windows10-2004-x64
7foo/07470b...68.exe
windows7-x64
7foo/07470b...68.exe
windows10-2004-x64
7foo/078adb...c0.exe
windows7-x64
10foo/078adb...c0.exe
windows10-2004-x64
10foo/09e5c8...b4.exe
windows7-x64
3foo/09e5c8...b4.exe
windows10-2004-x64
3foo/0becfe...f4.exe
windows7-x64
10foo/0becfe...f4.exe
windows10-2004-x64
10foo/1a78d3...a3.exe
windows7-x64
5foo/1a78d3...a3.exe
windows10-2004-x64
7foo/1ffe82...a6.exe
windows7-x64
10foo/1ffe82...a6.exe
windows10-2004-x64
10foo/255028...e1.dll
windows7-x64
3foo/255028...e1.dll
windows10-2004-x64
3foo/27601d...cc.exe
windows7-x64
7foo/27601d...cc.exe
windows10-2004-x64
7foo/27f911...49.exe
windows7-x64
10foo/27f911...49.exe
windows10-2004-x64
10foo/28408c...c5.exe
windows7-x64
10foo/28408c...c5.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
95s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
foo/0044d66e4abf7c4af6b5d207065320f7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
foo/0044d66e4abf7c4af6b5d207065320f7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
foo/034e4c62965f8d5dd5d5a2ce34a53ba9.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
foo/034e4c62965f8d5dd5d5a2ce34a53ba9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
foo/035fa2f2fae0a8fad733686a7d9ea772.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
foo/035fa2f2fae0a8fad733686a7d9ea772.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
foo/04884a82d01d733f245d921e1f74fb1b.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
foo/04884a82d01d733f245d921e1f74fb1b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
foo/06ed82e88e1f68cc08602d7cd8ec5f59.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
foo/06ed82e88e1f68cc08602d7cd8ec5f59.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
foo/07470b6ede84f02ec31ab0a601cdc068.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
foo/07470b6ede84f02ec31ab0a601cdc068.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
foo/078adb95b1a0a6449d8c4ece796deac0.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
foo/078adb95b1a0a6449d8c4ece796deac0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
foo/09e5c88a0592763e0c4f30fb88d663b4.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
foo/09e5c88a0592763e0c4f30fb88d663b4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
foo/0becfedf4d0b9ad5251aca33274a4cf4.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
foo/0becfedf4d0b9ad5251aca33274a4cf4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
foo/1a78d313f2891bd468f78694814a28a3.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
foo/1a78d313f2891bd468f78694814a28a3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
foo/1ffe827beb75335731cb6f052a8ec3a6.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
foo/1ffe827beb75335731cb6f052a8ec3a6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
foo/255028f2f37838e92f84f27c68aaf4e1.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
foo/255028f2f37838e92f84f27c68aaf4e1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
foo/27601d095e5b3761d9289584415a73cc.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
foo/27601d095e5b3761d9289584415a73cc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
foo/27f9116902c35a9b784c703762bbd249.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
foo/27f9116902c35a9b784c703762bbd249.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
foo/28408caa2961caecd35c9f8f7c1aecc5.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
foo/28408caa2961caecd35c9f8f7c1aecc5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
foo/0044d66e4abf7c4af6b5d207065320f7.exe
-
Size
127KB
-
MD5
0044d66e4abf7c4af6b5d207065320f7
-
SHA1
07e73ac58bee7bdc26d289bb2697d2588a6b7e64
-
SHA256
b6d19c3e6e82bbde62984f50144ce4d98a18871374ec5d313489d5831317c480
-
SHA512
25633ea2e3cc78262ba69de30d2d3b7f6c013ce3bcbad2eda3c424ac50d7c0b7169372c5ad2b2cd81748ea0622f3db5ba3429f0d3ecfd3feabbfc65d961af5dd
-
SSDEEP
3072:Z81clNypY+TjMulQXTR5aJPh7w/1VOCINO2L2Sy7CU9/7NXeLKo1tjv:ZAclNyW+PtqR5M7o1VP+2R7CU9DNXemu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0044d66e4abf7c4af6b5d207065320f7.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2984 0044d66e4abf7c4af6b5d207065320f7.exe 2984 0044d66e4abf7c4af6b5d207065320f7.exe 2984 0044d66e4abf7c4af6b5d207065320f7.exe 2984 0044d66e4abf7c4af6b5d207065320f7.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe Token: SeDebugPrivilege 2984 0044d66e4abf7c4af6b5d207065320f7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3528 2984 0044d66e4abf7c4af6b5d207065320f7.exe 56 PID 2984 wrote to memory of 612 2984 0044d66e4abf7c4af6b5d207065320f7.exe 5 PID 2984 wrote to memory of 672 2984 0044d66e4abf7c4af6b5d207065320f7.exe 7 PID 2984 wrote to memory of 772 2984 0044d66e4abf7c4af6b5d207065320f7.exe 8 PID 2984 wrote to memory of 780 2984 0044d66e4abf7c4af6b5d207065320f7.exe 9 PID 2984 wrote to memory of 788 2984 0044d66e4abf7c4af6b5d207065320f7.exe 10 PID 2984 wrote to memory of 888 2984 0044d66e4abf7c4af6b5d207065320f7.exe 11 PID 2984 wrote to memory of 940 2984 0044d66e4abf7c4af6b5d207065320f7.exe 12 PID 2984 wrote to memory of 1020 2984 0044d66e4abf7c4af6b5d207065320f7.exe 13 PID 2984 wrote to memory of 380 2984 0044d66e4abf7c4af6b5d207065320f7.exe 14 PID 2984 wrote to memory of 732 2984 0044d66e4abf7c4af6b5d207065320f7.exe 15 PID 2984 wrote to memory of 1036 2984 0044d66e4abf7c4af6b5d207065320f7.exe 16 PID 2984 wrote to memory of 1056 2984 0044d66e4abf7c4af6b5d207065320f7.exe 17 PID 2984 wrote to memory of 1100 2984 0044d66e4abf7c4af6b5d207065320f7.exe 18 PID 2984 wrote to memory of 1132 2984 0044d66e4abf7c4af6b5d207065320f7.exe 19 PID 2984 wrote to memory of 1212 2984 0044d66e4abf7c4af6b5d207065320f7.exe 20 PID 2984 wrote to memory of 1256 2984 0044d66e4abf7c4af6b5d207065320f7.exe 21 PID 2984 wrote to memory of 1328 2984 0044d66e4abf7c4af6b5d207065320f7.exe 22 PID 2984 wrote to memory of 1368 2984 0044d66e4abf7c4af6b5d207065320f7.exe 23 PID 2984 wrote to memory of 1380 2984 0044d66e4abf7c4af6b5d207065320f7.exe 24 PID 2984 wrote to memory of 1412 2984 0044d66e4abf7c4af6b5d207065320f7.exe 25 PID 2984 wrote to memory of 1440 2984 0044d66e4abf7c4af6b5d207065320f7.exe 26 PID 2984 wrote to memory of 1500 2984 0044d66e4abf7c4af6b5d207065320f7.exe 27 PID 2984 wrote to memory of 1656 2984 0044d66e4abf7c4af6b5d207065320f7.exe 28 PID 2984 wrote to memory of 1672 2984 0044d66e4abf7c4af6b5d207065320f7.exe 29 PID 2984 wrote to memory of 1744 2984 0044d66e4abf7c4af6b5d207065320f7.exe 30 PID 2984 wrote to memory of 1792 2984 0044d66e4abf7c4af6b5d207065320f7.exe 31 PID 2984 wrote to memory of 1812 2984 0044d66e4abf7c4af6b5d207065320f7.exe 32 PID 2984 wrote to memory of 1996 2984 0044d66e4abf7c4af6b5d207065320f7.exe 33 PID 2984 wrote to memory of 2016 2984 0044d66e4abf7c4af6b5d207065320f7.exe 34 PID 2984 wrote to memory of 2024 2984 0044d66e4abf7c4af6b5d207065320f7.exe 35 PID 2984 wrote to memory of 1760 2984 0044d66e4abf7c4af6b5d207065320f7.exe 36 PID 2984 wrote to memory of 2008 2984 0044d66e4abf7c4af6b5d207065320f7.exe 37 PID 2984 wrote to memory of 2140 2984 0044d66e4abf7c4af6b5d207065320f7.exe 38 PID 2984 wrote to memory of 2180 2984 0044d66e4abf7c4af6b5d207065320f7.exe 39 PID 2984 wrote to memory of 2216 2984 0044d66e4abf7c4af6b5d207065320f7.exe 40 PID 2984 wrote to memory of 2384 2984 0044d66e4abf7c4af6b5d207065320f7.exe 41 PID 2984 wrote to memory of 2492 2984 0044d66e4abf7c4af6b5d207065320f7.exe 42 PID 2984 wrote to memory of 2500 2984 0044d66e4abf7c4af6b5d207065320f7.exe 43 PID 2984 wrote to memory of 2640 2984 0044d66e4abf7c4af6b5d207065320f7.exe 44 PID 2984 wrote to memory of 2656 2984 0044d66e4abf7c4af6b5d207065320f7.exe 45 PID 2984 wrote to memory of 2708 2984 0044d66e4abf7c4af6b5d207065320f7.exe 46 PID 2984 wrote to memory of 2768 2984 0044d66e4abf7c4af6b5d207065320f7.exe 47 PID 2984 wrote to memory of 2780 2984 0044d66e4abf7c4af6b5d207065320f7.exe 48 PID 2984 wrote to memory of 2804 2984 0044d66e4abf7c4af6b5d207065320f7.exe 49 PID 2984 wrote to memory of 2820 2984 0044d66e4abf7c4af6b5d207065320f7.exe 50 PID 2984 wrote to memory of 2828 2984 0044d66e4abf7c4af6b5d207065320f7.exe 51 PID 2984 wrote to memory of 2976 2984 0044d66e4abf7c4af6b5d207065320f7.exe 52 PID 2984 wrote to memory of 3068 2984 0044d66e4abf7c4af6b5d207065320f7.exe 53 PID 2984 wrote to memory of 3432 2984 0044d66e4abf7c4af6b5d207065320f7.exe 55 PID 2984 wrote to memory of 3528 2984 0044d66e4abf7c4af6b5d207065320f7.exe 56 PID 2984 wrote to memory of 3640 2984 0044d66e4abf7c4af6b5d207065320f7.exe 57 PID 2984 wrote to memory of 3828 2984 0044d66e4abf7c4af6b5d207065320f7.exe 58 PID 2984 wrote to memory of 3916 2984 0044d66e4abf7c4af6b5d207065320f7.exe 59 PID 2984 wrote to memory of 3980 2984 0044d66e4abf7c4af6b5d207065320f7.exe 60 PID 2984 wrote to memory of 4080 2984 0044d66e4abf7c4af6b5d207065320f7.exe 61 PID 2984 wrote to memory of 3184 2984 0044d66e4abf7c4af6b5d207065320f7.exe 62 PID 2984 wrote to memory of 4352 2984 0044d66e4abf7c4af6b5d207065320f7.exe 65 PID 2984 wrote to memory of 4396 2984 0044d66e4abf7c4af6b5d207065320f7.exe 67 PID 2984 wrote to memory of 1616 2984 0044d66e4abf7c4af6b5d207065320f7.exe 68 PID 2984 wrote to memory of 4932 2984 0044d66e4abf7c4af6b5d207065320f7.exe 69 PID 2984 wrote to memory of 2888 2984 0044d66e4abf7c4af6b5d207065320f7.exe 70 PID 2984 wrote to memory of 3700 2984 0044d66e4abf7c4af6b5d207065320f7.exe 71 PID 2984 wrote to memory of 4608 2984 0044d66e4abf7c4af6b5d207065320f7.exe 72
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:788
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1020
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:780
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3068
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3828
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3916
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3980
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4080
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3184
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:2888
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:2688
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:3748
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3612
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2012
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:5016
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:380
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1100
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2804
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1132
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1368
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1440
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2640
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1656
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1792
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:1996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2016
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2024
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2008
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2180
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2216
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2768
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2820
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\foo\0044d66e4abf7c4af6b5d207065320f7.exe"C:\Users\Admin\AppData\Local\Temp\foo\0044d66e4abf7c4af6b5d207065320f7.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4352
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4932
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3700
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:3896