Instructions:
- Uncompress the lab (pass: cyberdefenders.org)
Scenario:
Our intrusion detection system has alerted us to suspicious behavior on a workstation, pointing to a likely malware intrusion. A memory dump of this system has been taken for analysis. Your task is to analyze this dump, trace the malware’s actions, and report key findings. This analysis is critical in understanding the breach and preventing further compromise.
Tools:
- Volatility 3
#1 Respuesta: ChromeSetup.exe
We need to identify the process responsible for this suspicious behavior. What is the name of the suspicious process?
Obtención de la evidencia
Utilizamos el siguiente comando para realizar el análisis inicial de la memoria:
vol -f memory.dmp windows.malfind
El resultado muestra los procesos sospechosos:
Volatility 3 Framework 2.7.1
Progress: 100.00 PDB scanning finished
PID Process Start VPN End VPN Tag Protection CommitCharge PrivateMemory File output Notes Hexdump Disasm
2128 SearchApp.exe 0x25942230000 0x2594224ffff VadS PAGE_EXECUTE_READWRITE 4 1 Disabled N/A
48 89 54 24 10 48 89 4c H.T$.H.L
24 08 4c 89 44 24 18 4c $.L.D$.L
89 4c 24 20 48 8b 41 28 .L$.H.A(
48 8b 48 08 48 8b 51 50 H.H.H.QP
48 83 e2 f8 48 8b ca 48 H...H..H
b8 60 00 23 42 59 02 00 .`.#BY..
00 48 2b c8 48 81 f9 70 .H+.H..p
0f 00 00 76 09 48 c7 c1 ...v.H..
0x25942230000: mov qword ptr [rsp + 0x10], rdx
0x25942230005: mov qword ptr [rsp + 8], rcx
0x2594223000a: mov qword ptr [rsp + 0x18], r8
0x2594223000f: mov qword ptr [rsp + 0x20], r9
0x25942230014: mov rax, qword ptr [rcx + 0x28]
0x25942230018: mov rcx, qword ptr [rax + 8]
0x2594223001c: mov rdx, qword ptr [rcx + 0x50]
0x25942230020: and rdx, 0xfffffffffffffff8
0x25942230024: mov rcx, rdx
0x25942230027: movabs rax, 0x25942230060
0x25942230031: sub rcx, rax
0x25942230034: cmp rcx, 0xf70
0x2594223003b: jbe 0x25942230046
2128 SearchApp.exe 0x259535c0000 0x25953623fff VadS PAGE_EXECUTE_READWRITE 1 1 Disabled N/A
e9 fb ff fd ef ff ff ff ........
ff cc cc cc cc cc cc cc ........
e9 eb 03 fe ef ff ff ff ........
ff cc cc cc cc cc cc cc ........
e9 db 0f fe ef ff ff ff ........
ff cc cc cc cc cc cc cc ........
e9 cb 17 fe ef ff ff ff ........
ff cc cc cc cc cc cc cc ........
0x259535c0000: jmp 0x259435a0000
7068 RuntimeBroker. 0x1db7d360000 0x1db7d360fff Vad PAGE_EXECUTE_READWRITE 0 0 Disabled N/A
00 00 00 00 00 00 00 00 ........
fe ff ff ff f7 2f 00 00 ...../..
00 00 00 00 00 00 00 00 ........
00 00 00 00 00 00 00 00 ........
00 00 00 00 00 00 00 00 ........
00 00 00 00 00 00 00 00 ........
00 00 00 00 00 00 00 00 ........
00 00 00 00 00 00 00 00 ........
0x1db7d360000: add byte ptr [rax], al
0x1db7d360002: add byte ptr [rax], al
0x1db7d360004: add byte ptr [rax], al
0x1db7d360006: add byte ptr [rax], al
7484 smartscreen.ex 0x1f413fe0000 0x1f413ffffff VadS PAGE_EXECUTE_READWRITE 1 1 Disabled N/A
48 89 54 24 10 48 89 4c H.T$.H.L
24 08 4c 89 44 24 18 4c $.L.D$.L
89 4c 24 20 48 8b 41 28 .L$.H.A(
48 8b 48 08 48 8b 51 50 H.H.H.QP
48 83 e2 f8 48 8b ca 48 H...H..H
b8 60 00 fe 13 f4 01 00 .`......
00 48 2b c8 48 81 f9 70 .H+.H..p
0f 00 00 76 09 48 c7 c1 ...v.H..
0x1f413fe0000: mov qword ptr [rsp + 0x10], rdx
0x1f413fe0005: mov qword ptr [rsp + 8], rcx
0x1f413fe000a: mov qword ptr [rsp + 0x18], r8
0x1f413fe000f: mov qword ptr [rsp + 0x20], r9
0x1f413fe0014: mov rax, qword ptr [rcx + 0x28]
0x1f413fe0018: mov rcx, qword ptr [rax + 8]
0x1f413fe001c: mov rdx, qword ptr [rcx + 0x50]
0x1f413fe0020: and rdx, 0xfffffffffffffff8
0x1f413fe0024: mov rcx, rdx
0x1f413fe0027: movabs rax, 0x1f413fe0060
0x1f413fe0031: sub rcx, rax
0x1f413fe0034: cmp rcx, 0xf70
0x1f413fe003b: jbe 0x1f413fe0046
7484 smartscreen.ex 0x1f414320000 0x1f414383fff VadS PAGE_EXECUTE_READWRITE 1 1 Disabled N/A
e9 fb 07 07 00 00 00 00 ........
00 cc cc cc cc cc cc cc ........
cc cc cc cc cc cc cc cc ........
cc cc cc cc cc cc cc cc ........
cc cc cc cc cc cc cc cc ........
cc cc cc cc cc cc cc cc ........
cc cc cc cc cc cc cc cc ........
cc cc cc cc cc cc cc cc ........
0x1f414320000: jmp 0x1f414390800
0x1f414320005: add byte ptr [rax], al
0x1f414320007: add byte ptr [rax], al
0x1f414320009: int3
0x1f41432000a: int3
0x1f41432000b: int3
0x1f41432000c: int3
0x1f41432000d: int3
0x1f41432000e: int3
0x1f41432000f: int3
0x1f414320010: int3
0x1f414320011: int3
0x1f414320012: int3
0x1f414320013: int3
0x1f414320014: int3
0x1f414320015: int3
0x1f414320016: int3
0x1f414320017: int3
0x1f414320018: int3
0x1f414320019: int3
0x1f41432001a: int3
0x1f41432001b: int3
0x1f41432001c: int3
0x1f41432001d: int3
0x1f41432001e: int3
0x1f41432001f: int3
0x1f414320020: int3
0x1f414320021: int3
0x1f414320022: int3
0x1f414320023: int3
0x1f414320024: int3
0x1f414320025: int3
0x1f414320026: int3
0x1f414320027: int3
0x1f414320028: int3
0x1f414320029: int3
0x1f41432002a: int3
0x1f41432002b: int3
0x1f41432002c: int3
0x1f41432002d: int3
0x1f41432002e: int3
0x1f41432002f: int3
0x1f414320030: int3
0x1f414320031: int3
0x1f414320032: int3
0x1f414320033: int3
0x1f414320034: int3
0x1f414320035: int3
0x1f414320036: int3
0x1f414320037: int3
0x1f414320038: int3
0x1f414320039: int3
0x1f41432003a: int3
0x1f41432003b: int3
0x1f41432003c: int3
0x1f41432003d: int3
0x1f41432003e: int3
0x1f41432003f: int3
7484 smartscreen.ex 0x1f4247d0000 0x1f4247effff VadS PAGE_EXECUTE_READWRITE 1 1 Disabled N/A
48 89 54 24 10 48 89 4c H.T$.H.L
24 08 4c 89 44 24 18 4c $.L.D$.L
89 4c 24 20 48 8b 41 28 .L$.H.A(
48 8b 48 08 48 8b 51 50 H.H.H.QP
48 83 e2 f8 48 8b ca 48 H...H..H
b8 60 00 7d 24 f4 01 00 .`.}$...
00 48 2b c8 48 81 f9 70 .H+.H..p
0f 00 00 76 09 48 c7 c1 ...v.H..
0x1f4247d0000: mov qword ptr [rsp + 0x10], rdx
0x1f4247d0005: mov qword ptr [rsp + 8], rcx
0x1f4247d000a: mov qword ptr [rsp + 0x18], r8
0x1f4247d000f: mov qword ptr [rsp + 0x20], r9
0x1f4247d0014: mov rax, qword ptr [rcx + 0x28]
0x1f4247d0018: mov rcx, qword ptr [rax + 8]
0x1f4247d001c: mov rdx, qword ptr [rcx + 0x50]
0x1f4247d0020: and rdx, 0xfffffffffffffff8
0x1f4247d0024: mov rcx, rdx
0x1f4247d0027: movabs rax, 0x1f4247d0060
0x1f4247d0031: sub rcx, rax
0x1f4247d0034: cmp rcx, 0xf70
0x1f4247d003b: jbe 0x1f4247d0046
7484 smartscreen.ex 0x1f424860000 0x1f4248c3fff VadS PAGE_EXECUTE_READWRITE 1 1 Disabled N/A
e9 fb ff 06 00 00 00 00 ........
00 cc cc cc cc cc cc cc ........
cc cc cc cc cc cc cc cc ........
cc cc cc cc cc cc cc cc ........
cc cc cc cc cc cc cc cc ........
cc cc cc cc cc cc cc cc ........
cc cc cc cc cc cc cc cc ........
cc cc cc cc cc cc cc cc ........
0x1f424860000: jmp 0x1f4248d0000
0x1f424860005: add byte ptr [rax], al
0x1f424860007: add byte ptr [rax], al
0x1f424860009: int3
0x1f42486000a: int3
0x1f42486000b: int3
0x1f42486000c: int3
0x1f42486000d: int3
0x1f42486000e: int3
0x1f42486000f: int3
0x1f424860010: int3
0x1f424860011: int3
0x1f424860012: int3
0x1f424860013: int3
0x1f424860014: int3
0x1f424860015: int3
0x1f424860016: int3
0x1f424860017: int3
0x1f424860018: int3
0x1f424860019: int3
0x1f42486001a: int3
0x1f42486001b: int3
0x1f42486001c: int3
0x1f42486001d: int3
0x1f42486001e: int3
0x1f42486001f: int3
0x1f424860020: int3
0x1f424860021: int3
0x1f424860022: int3
0x1f424860023: int3
0x1f424860024: int3
0x1f424860025: int3
0x1f424860026: int3
0x1f424860027: int3
0x1f424860028: int3
0x1f424860029: int3
0x1f42486002a: int3
0x1f42486002b: int3
0x1f42486002c: int3
0x1f42486002d: int3
0x1f42486002e: int3
0x1f42486002f: int3
0x1f424860030: int3
0x1f424860031: int3
0x1f424860032: int3
0x1f424860033: int3
0x1f424860034: int3
0x1f424860035: int3
0x1f424860036: int3
0x1f424860037: int3
0x1f424860038: int3
0x1f424860039: int3
0x1f42486003a: int3
0x1f42486003b: int3
0x1f42486003c: int3
0x1f42486003d: int3
0x1f42486003e: int3
0x1f42486003f: int3
7484 smartscreen.ex 0x1f4351d0000 0x1f4351effff VadS PAGE_EXECUTE_READWRITE 1 1 Disabled N/A
48 89 54 24 10 48 89 4c H.T$.H.L
24 08 4c 89 44 24 18 4c $.L.D$.L
89 4c 24 20 48 8b 41 28 .L$.H.A(
48 8b 48 08 48 8b 51 50 H.H.H.QP
48 83 e2 f8 48 8b ca 48 H...H..H
b8 60 00 1d 35 f4 01 00 .`..5...
00 48 2b c8 48 81 f9 70 .H+.H..p
0f 00 00 76 09 48 c7 c1 ...v.H..
0x1f4351d0000: mov qword ptr [rsp + 0x10], rdx
0x1f4351d0005: mov qword ptr [rsp + 8], rcx
0x1f4351d000a: mov qword ptr [rsp + 0x18], r8
0x1f4351d000f: mov qword ptr [rsp + 0x20], r9
0x1f4351d0014: mov rax, qword ptr [rcx + 0x28]
0x1f4351d0018: mov rcx, qword ptr [rax + 8]
0x1f4351d001c: mov rdx, qword ptr [rcx + 0x50]
0x1f4351d0020: and rdx, 0xfffffffffffffff8
0x1f4351d0024: mov rcx, rdx
0x1f4351d0027: movabs rax, 0x1f4351d0060
0x1f4351d0031: sub rcx, rax
0x1f4351d0034: cmp rcx, 0xf70
0x1f4351d003b: jbe 0x1f4351d0046
7780 OneDrive.exe 0x76b0000 0x76bffff VadS PAGE_EXECUTE_READWRITE 16 1 Disabled N/A
00 00 00 00 00 00 00 00 ........
00 00 00 00 00 00 00 00 ........
f8 ff 00 00 00 00 00 00 ........
00 00 00 00 00 00 00 00 ........
00 00 00 00 00 00 00 00 ........
00 00 00 00 00 00 00 00 ........
00 00 00 00 00 00 00 00 ........
00 00 00 00 00 00 00 00 ........
0x76b0000: add byte ptr [eax], al
0x76b0002: add byte ptr [eax], al
0x76b0004: add byte ptr [eax], al
0x76b0006: add byte ptr [eax], al
0x76b0008: add byte ptr [eax], al
0x76b000a: add byte ptr [eax], al
0x76b000c: add byte ptr [eax], al
0x76b000e: add byte ptr [eax], al
0x76b0010: clc
0x76b0011: inc dword ptr [eax]
0x76b0013: add byte ptr [eax], al
0x76b0015: add byte ptr [eax], al
0x76b0017: add byte ptr [eax], al
0x76b0019: add byte ptr [eax], al
0x76b001b: add byte ptr [eax], al
0x76b001d: add byte ptr [eax], al
0x76b001f: add byte ptr [eax], al
0x76b0021: add byte ptr [eax], al
0x76b0023: add byte ptr [eax], al
0x76b0025: add byte ptr [eax], al
0x76b0027: add byte ptr [eax], al
0x76b0029: add byte ptr [eax], al
0x76b002b: add byte ptr [eax], al
0x76b002d: add byte ptr [eax], al
0x76b002f: add byte ptr [eax], al
0x76b0031: add byte ptr [eax], al
0x76b0033: add byte ptr [eax], al
0x76b0035: add byte ptr [eax], al
0x76b0037: add byte ptr [eax], al
0x76b0039: add byte ptr [eax], al
0x76b003b: add byte ptr [eax], al
0x76b003d: add byte ptr [eax], al
5912 WWAHost.exe 0x18909a60000 0x18909a7ffff VadS PAGE_EXECUTE_READWRITE 2 1 Disabled N/A
48 89 54 24 10 48 89 4c H.T$.H.L
24 08 4c 89 44 24 18 4c $.L.D$.L
89 4c 24 20 48 8b 41 28 .L$.H.A(
48 8b 48 08 48 8b 51 50 H.H.H.QP
48 83 e2 f8 48 8b ca 48 H...H..H
b8 60 00 a6 09 89 01 00 .`......
00 48 2b c8 48 81 f9 70 .H+.H..p
0f 00 00 76 09 48 c7 c1 ...v.H..
0x18909a60000: mov qword ptr [rsp + 0x10], rdx
0x18909a60005: mov qword ptr [rsp + 8], rcx
0x18909a6000a: mov qword ptr [rsp + 0x18], r8
0x18909a6000f: mov qword ptr [rsp + 0x20], r9
0x18909a60014: mov rax, qword ptr [rcx + 0x28]
0x18909a60018: mov rcx, qword ptr [rax + 8]
0x18909a6001c: mov rdx, qword ptr [rcx + 0x50]
0x18909a60020: and rdx, 0xfffffffffffffff8
0x18909a60024: mov rcx, rdx
0x18909a60027: movabs rax, 0x18909a60060
0x18909a60031: sub rcx, rax
0x18909a60034: cmp rcx, 0xf70
0x18909a6003b: jbe 0x18909a60046
5912 WWAHost.exe 0x1890a380000 0x1890a3e3fff VadS PAGE_EXECUTE_READWRITE 1 1 Disabled N/A
e9 fb ff 08 00 00 00 00 ........
00 cc cc cc cc cc cc cc ........
e9 eb 07 09 00 00 00 00 ........
00 cc cc cc cc cc cc cc ........
e9 db 0f 09 00 00 00 00 ........
00 cc cc cc cc cc cc cc ........
e9 cb 0b 09 00 00 00 00 ........
00 cc cc cc cc cc cc cc ........
0x1890a380000: jmp 0x1890a410000
0x1890a380005: add byte ptr [rax], al
0x1890a380007: add byte ptr [rax], al
0x1890a380009: int3
0x1890a38000a: int3
0x1890a38000b: int3
0x1890a38000c: int3
0x1890a38000d: int3
0x1890a38000e: int3
0x1890a38000f: int3
0x1890a380010: jmp 0x1890a410800
0x1890a380015: add byte ptr [rax], al
0x1890a380017: add byte ptr [rax], al
0x1890a380019: int3
0x1890a38001a: int3
0x1890a38001b: int3
0x1890a38001c: int3
0x1890a38001d: int3
0x1890a38001e: int3
0x1890a38001f: int3
0x1890a380020: jmp 0x1890a411000
0x1890a380025: add byte ptr [rax], al
0x1890a380027: add byte ptr [rax], al
0x1890a380029: int3
0x1890a38002a: int3
0x1890a38002b: int3
0x1890a38002c: int3
0x1890a38002d: int3
0x1890a38002e: int3
0x1890a38002f: int3
0x1890a380030: jmp 0x1890a410c00
0x1890a380035: add byte ptr [rax], al
0x1890a380037: add byte ptr [rax], al
0x1890a380039: int3
0x1890a38003a: int3
0x1890a38003b: int3
0x1890a38003c: int3
0x1890a38003d: int3
0x1890a38003e: int3
0x1890a38003f: int3
Al analizar losprocesos identificamos el proceso OneDrive.exe con PID 7780 utilizando windows.pstree para visualizar la estructura de directorios.
vol -f memory.dmp windows.pstree
Output
Volatility 3 Framework 2.7.1
Progress: 100.00 PDB scanning finished
PID PPID ImageFileName Offset(V) Threads Handles SessionId Wow64 CreateTime ExitTime Audit Cmd Path
4 0 System 0xca82b0e88040 165 - N/A False 2024-02-01 19:48:22.000000 N/A - - -
* 320 4 smss.exe 0xca82b1a95040 2 - N/A False 2024-02-01 19:48:22.000000 N/A \Device\HarddiskVolume3\Windows\System32\smss.exe \SystemRoot\System32\smss.exe \SystemRoot\System32\smss.exe
* 108 4 Registry 0xca82b0eeb080 4 - N/A False 2024-02-01 19:48:15.000000 N/A Registry - -
* 1828 4 MemCompression 0xca82b39b9040 34 - N/A False 2024-02-01 19:48:24.000000 N/A MemCompression - -
448 440 csrss.exe 0xca82b1f68080 11 - 0 False 2024-02-01 19:48:23.000000 N/A \Device\HarddiskVolume3\Windows\System32\csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16 C:\Windows\system32\csrss.exe
524 440 wininit.exe 0xca82b2843080 2 - 0 False 2024-02-01 19:48:23.000000 N/A \Device\HarddiskVolume3\Windows\System32\wininit.exe wininit.exe C:\Windows\system32\wininit.exe
* 676 524 lsass.exe 0xca82b2923080 10 - 0 False 2024-02-01 19:48:23.000000 N/A \Device\HarddiskVolume3\Windows\System32\lsass.exe C:\Windows\system32\lsass.exe C:\Windows\system32\lsass.exe
* 660 524 services.exe 0xca82b28e9080 8 - 0 False 2024-02-01 19:48:23.000000 N/A \Device\HarddiskVolume3\Windows\System32\services.exe C:\Windows\system32\services.exe C:\Windows\system32\services.exe
** 2564 660 spoolsv.exe 0xca82b3c5b200 8 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\spoolsv.exe C:\Windows\System32\spoolsv.exe C:\Windows\System32\spoolsv.exe
** 5132 660 svchost.exe 0xca82b7752280 9 - 0 False 2024-02-01 19:48:28.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc C:\Windows\system32\svchost.exe
** 3104 660 svchost.exe 0xca82b7229080 12 - 0 False 2024-02-01 19:48:26.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc C:\Windows\system32\svchost.exe
** 1068 660 svchost.exe 0xca82b3115300 5 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts C:\Windows\System32\svchost.exe
** 2092 660 svchost.exe 0xca82b0f38080 13 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p C:\Windows\System32\svchost.exe
*** 7272 2092 audiodg.exe 0xca82b8308080 5 - 0 False 2024-02-01 19:48:49.000000 N/A \Device\HarddiskVolume3\Windows\System32\audiodg.exe C:\Windows\system32\AUDIODG.EXE 0x4b8 C:\Windows\system32\AUDIODG.EXE
** 2612 660 svchost.exe 0xca82b3ca22c0 5 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p C:\Windows\system32\svchost.exe
** 3128 660 svchost.exe 0xca82b3e6b080 7 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer C:\Windows\system32\svchost.exe
** 3160 660 svchost.exe 0xca82b3e9f2c0 2 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p -s SstpSvc C:\Windows\system32\svchost.exe
** 5220 660 svchost.exe 0xca82b77792c0 5 - 1 False 2024-02-01 19:48:28.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc C:\Windows\system32\svchost.exe
** 1644 660 svchost.exe 0xca82b38c7300 3 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc C:\Windows\system32\svchost.exe
** 3692 660 svchost.exe 0xca82b7061280 6 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TabletInputService C:\Windows\System32\svchost.exe
*** 3936 3692 ctfmon.exe 0xca82b7107240 11 - 1 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\ctfmon.exe "ctfmon.exe" C:\Windows\system32\ctfmon.exe
** 6252 660 SearchIndexer. 0xca82b7daa0c0 16 - 0 False 2024-02-01 19:48:30.000000 N/A \Device\HarddiskVolume3\Windows\System32\SearchIndexer.exe C:\Windows\system32\SearchIndexer.exe /Embedding C:\Windows\system32\SearchIndexer.exe
*** 8696 6252 SearchProtocol 0xca82b8c08300 9 - 0 False 2024-02-01 19:53:28.000000 N/A \Device\HarddiskVolume3\Windows\System32\SearchProtocolHost.exe "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exe
*** 3004 6252 SearchFilterHo 0xca82b1c74300 4 - 0 False 2024-02-01 19:53:28.000000 N/A \Device\HarddiskVolume3\Windows\System32\SearchFilterHost.exe "C:\Windows\system32\SearchFilterHost.exe" 0 812 816 824 8192 820 796 C:\Windows\system32\SearchFilterHost.exe
** 1136 660 svchost.exe 0xca82b313e300 8 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog C:\Windows\System32\svchost.exe
** 1144 660 svchost.exe 0xca82b313f300 12 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule C:\Windows\system32\svchost.exe
*** 3152 1144 taskhostw.exe 0xca82b7681280 7 - 1 False 2024-02-01 19:48:27.000000 N/A \Device\HarddiskVolume3\Windows\System32\taskhostw.exe taskhostw.exe C:\Windows\system32\taskhostw.exe
*** 3116 1144 taskhostw.exe 0xca82b3e6a300 8 - 1 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\taskhostw.exe taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E} C:\Windows\system32\taskhostw.exe
*** 7500 1144 MicrosoftEdgeU 0xca82b79e5080 3 - 0 True 2024-02-01 19:51:24.000000 N/A \Device\HarddiskVolume3\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /c C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
** 1156 660 svchost.exe 0xca82b3140080 5 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc C:\Windows\system32\svchost.exe
** 3208 660 svchost.exe 0xca82b3ed6280 3 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks C:\Windows\System32\svchost.exe
** 1164 660 svchost.exe 0xca82b3153280 3 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService C:\Windows\System32\svchost.exe
** 2704 660 svchost.exe 0xca82b3cbb300 5 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation C:\Windows\System32\svchost.exe
** 1172 660 svchost.exe 0xca82b3152080 4 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc C:\Windows\system32\svchost.exe
** 1684 660 svchost.exe 0xca82b390c300 5 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc C:\Windows\System32\svchost.exe
** 4760 660 svchost.exe 0xca82b7757280 4 - 0 False 2024-02-01 19:48:28.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost C:\Windows\System32\svchost.exe
** 3228 660 svchost.exe 0xca82b7682080 3 - 0 False 2024-02-01 19:48:28.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC C:\Windows\System32\svchost.exe
** 3248 660 VGAuthService. 0xca82b3edd300 3 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe "C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe" C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe
** 4276 660 dllhost.exe 0xca82b7320280 15 - 0 False 2024-02-01 19:48:26.000000 N/A \Device\HarddiskVolume3\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235} C:\Windows\system32\dllhost.exe
** 1716 660 svchost.exe 0xca82b39042c0 5 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem C:\Windows\system32\svchost.exe
** 3256 660 vm3dservice.ex 0xca82b3edb0c0 5 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\vm3dservice.exe C:\Windows\system32\vm3dservice.exe C:\Windows\system32\vm3dservice.exe
*** 3544 3256 vm3dservice.ex 0xca82b3fce200 6 - 1 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\vm3dservice.exe vm3dservice.exe -n C:\Windows\system32\vm3dservice.exe
** 1724 660 svchost.exe 0xca82b3920080 6 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s SysMain C:\Windows\system32\svchost.exe
** 4796 660 svchost.exe 0xca82b758d300 7 - 0 False 2024-02-01 19:48:26.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc C:\Windows\System32\svchost.exe
** 2244 660 svchost.exe 0xca82b0e970c0 10 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache C:\Windows\system32\svchost.exe
** 1740 660 svchost.exe 0xca82b3907080 4 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes C:\Windows\System32\svchost.exe
** 7380 660 svchost.exe 0xca82b79841c0 5 - 0 False 2024-02-01 19:49:00.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s lfsvc C:\Windows\system32\svchost.exe
** 2776 660 svchost.exe 0xca82b3d1c2c0 7 - 1 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc C:\Windows\system32\svchost.exe
** 3288 660 wlms.exe 0xca82b3ef1240 3 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\wlms\wlms.exe C:\Windows\system32\wlms\wlms.exe C:\Windows\system32\wlms\wlms.exe
** 3296 660 vmtoolsd.exe 0xca82b3ef4280 12 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Program Files\VMware\VMware Tools\vmtoolsd.exe "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe" C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
** 740 660 svchost.exe 0xca82b30c7240 5 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc C:\Windows\system32\svchost.exe
** 4836 660 msdtc.exe 0xca82b75a7280 12 - 0 False 2024-02-01 19:48:26.000000 N/A \Device\HarddiskVolume3\Windows\System32\msdtc.exe C:\Windows\System32\msdtc.exe C:\Windows\System32\msdtc.exe
** 2280 660 svchost.exe 0xca82b0fc0080 3 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p C:\Windows\System32\svchost.exe
** 1260 660 svchost.exe 0xca82b318f2c0 4 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p C:\Windows\system32\svchost.exe
** 2288 660 svchost.exe 0xca82b0fbe080 5 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p C:\Windows\system32\svchost.exe
** 3832 660 svchost.exe 0xca82b8b352c0 6 - 1 False 2024-02-01 19:50:05.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k UnistackSvcGroup C:\Windows\System32\svchost.exe
** 3852 660 svchost.exe 0xca82b1c90240 13 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs C:\Windows\System32\svchost.exe
** 2328 660 svchost.exe 0xca82b0fb1080 9 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository C:\Windows\system32\svchost.exe
** 3356 660 svchost.exe 0xca82b3efa240 8 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService C:\Windows\system32\svchost.exe
** 7968 660 svchost.exe 0xca82b8ba72c0 4 - 0 False 2024-02-01 19:50:05.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc C:\Windows\System32\svchost.exe
** 808 660 svchost.exe 0xca82b299a240 15 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p C:\Windows\system32\svchost.exe
*** 4492 808 WmiPrvSE.exe 0xca82b7424280 13 - 0 False 2024-02-01 19:48:26.000000 N/A \Device\HarddiskVolume3\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe C:\Windows\system32\wbem\wmiprvse.exe
*** 7948 808 RuntimeBroker. 0xca82b87e5200 3 - 1 False 2024-02-01 19:49:08.000000 N/A \Device\HarddiskVolume3\Windows\System32\RuntimeBroker.exe C:\Windows\System32\RuntimeBroker.exe -Embedding C:\Windows\System32\RuntimeBroker.exe
*** 8848 808 RuntimeBroker. 0xca82b8bd5080 1 - 1 False 2024-02-01 19:49:36.000000 N/A \Device\HarddiskVolume3\Windows\System32\RuntimeBroker.exe C:\Windows\System32\RuntimeBroker.exe -Embedding C:\Windows\System32\RuntimeBroker.exe
*** 5912 808 WWAHost.exe 0xca82b8b86080 34 - 1 False 2024-02-01 19:49:19.000000 N/A \Device\HarddiskVolume3\Windows\System32\WWAHost.exe "C:\Windows\system32\wwahost.exe" -ServerName:Microsoft.MicrosoftOfficeHub.wwa C:\Windows\system32\wwahost.exe
*** 8728 808 WinStore.App.e 0xca82b7df4080 11 - 1 False 2024-02-01 19:49:34.000000 N/A \Device\HarddiskVolume3\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe "C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe" -ServerName:App.AppXc75wvwned5vhz4xyxxecvgdjhdkgsdza.mca C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe
*** 7068 808 RuntimeBroker. 0xca82b81d42c0 7 - 1 False 2024-02-01 19:48:31.000000 N/A \Device\HarddiskVolume3\Windows\System32\RuntimeBroker.exe C:\Windows\System32\RuntimeBroker.exe -Embedding C:\Windows\System32\RuntimeBroker.exe
*** 5676 808 StartMenuExper 0xca82b78c4080 12 - 1 False 2024-02-01 19:48:30.000000 N/A \Device\HarddiskVolume3\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
*** 2220 808 RuntimeBroker. 0xca82b896d340 6 - 1 False 2024-02-01 19:52:27.000000 N/A \Device\HarddiskVolume3\Windows\System32\RuntimeBroker.exe C:\Windows\System32\RuntimeBroker.exe -Embedding C:\Windows\System32\RuntimeBroker.exe
*** 2608 808 ShellExperienc 0xca82b880b340 18 - 1 False 2024-02-01 19:52:26.000000 N/A \Device\HarddiskVolume3\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
*** 6964 808 LockApp.exe 0xca82b7dca080 12 - 1 False 2024-02-01 19:48:31.000000 N/A \Device\HarddiskVolume3\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exe "C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exe" -ServerName:WindowsDefaultLockScreen.AppX7y4nbzq37zn4ks9k7amqjywdat7d3j2z.mca C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exe
*** 4792 808 SkypeApp.exe 0xca82b88020c0 13 - 1 False 2024-02-01 19:49:06.000000 N/A \Device\HarddiskVolume3\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe "C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe" -ServerName:App.AppXffn3yxqvgawq9fpmnhy90fr3y01d1t5b.mca C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe
*** 7484 808 smartscreen.ex 0xca82b82d0340 17 - 1 False 2024-02-01 19:48:41.000000 N/A \Device\HarddiskVolume3\Windows\System32\smartscreen.exe C:\Windows\System32\smartscreen.exe -Embedding C:\Windows\System32\smartscreen.exe
*** 5948 808 RuntimeBroker. 0xca82b7a9b080 7 - 1 False 2024-02-01 19:48:30.000000 N/A \Device\HarddiskVolume3\Windows\System32\RuntimeBroker.exe C:\Windows\System32\RuntimeBroker.exe -Embedding C:\Windows\System32\RuntimeBroker.exe
*** 6216 808 RuntimeBroker. 0xca82b7b14240 15 - 1 False 2024-02-01 19:48:30.000000 N/A \Device\HarddiskVolume3\Windows\System32\RuntimeBroker.exe C:\Windows\System32\RuntimeBroker.exe -Embedding C:\Windows\System32\RuntimeBroker.exe
*** 6984 808 WmiPrvSE.exe 0xca82b8046080 7 - 0 False 2024-02-01 19:48:46.000000 N/A \Device\HarddiskVolume3\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe C:\Windows\system32\wbem\wmiprvse.exe
*** 7112 808 ApplicationFra 0xca82b8ba2080 3 - 1 False 2024-02-01 19:49:19.000000 N/A \Device\HarddiskVolume3\Windows\System32\ApplicationFrameHost.exe C:\Windows\system32\ApplicationFrameHost.exe -Embedding C:\Windows\system32\ApplicationFrameHost.exe
*** 2128 808 SearchApp.exe 0xca82b7b10080 35 - 1 False 2024-02-01 19:48:30.000000 N/A \Device\HarddiskVolume3\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
*** 8420 808 dllhost.exe 0xca82b8e7b300 6 - 1 False 2024-02-01 19:49:21.000000 N/A \Device\HarddiskVolume3\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F} C:\Windows\system32\DllHost.exe
*** 2928 808 RuntimeBroker. 0xca82b82d80c0 6 - 1 False 2024-02-01 19:48:32.000000 N/A \Device\HarddiskVolume3\Windows\System32\RuntimeBroker.exe C:\Windows\System32\RuntimeBroker.exe -Embedding C:\Windows\System32\RuntimeBroker.exe
*** 5624 808 RuntimeBroker. 0xca82b8b182c0 1 - 1 False 2024-02-01 19:49:19.000000 N/A \Device\HarddiskVolume3\Windows\System32\RuntimeBroker.exe C:\Windows\System32\RuntimeBroker.exe -Embedding C:\Windows\System32\RuntimeBroker.exe
** 5932 660 svchost.exe 0xca82b7b0a0c0 10 - 0 False 2024-02-01 19:48:30.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc C:\Windows\system32\svchost.exe
** 2864 660 svchost.exe 0xca82b3d432c0 6 - 1 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s WpnUserService C:\Windows\system32\svchost.exe
** 1844 660 svchost.exe 0xca82b39bb240 3 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS C:\Windows\system32\svchost.exe
** 2872 660 svchost.exe 0xca82b3e68240 7 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker C:\Windows\system32\svchost.exe
** 2876 660 svchost.exe 0xca82b3d55240 22 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt C:\Windows\system32\svchost.exe
*** 2964 2876 WMIADAP.exe 0xca82b8b0f340 4 - 0 False 2024-02-01 19:52:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\wbem\WMIADAP.exe wmiadap.exe /F /T /R \\?\C:\Windows\system32\wbem\WMIADAP.EXE
** 4416 660 svchost.exe 0xca82b7406240 34 - 0 False 2024-02-01 19:48:26.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc C:\Windows\system32\svchost.exe
** 2384 660 svchost.exe 0xca82b0f69080 4 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection C:\Windows\System32\svchost.exe
** 3420 660 svchost.exe 0xca82b3f8f2c0 4 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s WdiServiceHost C:\Windows\System32\svchost.exe
** 2912 660 svchost.exe 0xca82b3d8e240 5 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT C:\Windows\system32\svchost.exe
** 6500 660 svchost.exe 0xca82b84cc080 3 - 0 False 2024-02-01 19:48:49.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo C:\Windows\system32\svchost.exe
** 1384 660 svchost.exe 0xca82b38042c0 4 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p -s nsi C:\Windows\system32\svchost.exe
** 2920 660 svchost.exe 0xca82b3d90300 5 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent C:\Windows\system32\svchost.exe
** 6504 660 svchost.exe 0xca82b7b16240 4 - 0 False 2024-02-01 19:48:30.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc C:\Windows\system32\svchost.exe
** 1916 660 svchost.exe 0xca82b3a30280 4 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder C:\Windows\System32\svchost.exe
** 7040 660 SgrmBroker.exe 0xca82b8f85340 8 - 0 False 2024-02-01 19:50:26.000000 N/A \Device\HarddiskVolume3\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
** 1420 660 svchost.exe 0xca82b3817240 5 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager C:\Windows\system32\svchost.exe
*** 2760 1420 sihost.exe 0xca82b3d1a280 11 - 1 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\sihost.exe sihost.exe C:\Windows\system32\sihost.exe
** 1932 660 svchost.exe 0xca82b3a322c0 7 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache C:\Windows\system32\svchost.exe
** 1944 660 svchost.exe 0xca82b3a362c0 8 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm C:\Windows\System32\svchost.exe
** 2972 660 svchost.exe 0xca82b3dae300 7 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc C:\Windows\system32\svchost.exe
** 7580 660 SecurityHealth 0xca82b8586240 14 - 0 False 2024-02-01 19:48:41.000000 N/A \Device\HarddiskVolume3\Windows\System32\SecurityHealthService.exe C:\Windows\system32\SecurityHealthService.exe C:\Windows\system32\SecurityHealthService.exe
** 928 660 svchost.exe 0xca82b29be2c0 7 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k RPCSS -p C:\Windows\system32\svchost.exe
** 1452 660 svchost.exe 0xca82b3855300 6 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp C:\Windows\system32\svchost.exe
** 2988 660 svchost.exe 0xca82b3dd8240 11 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k utcsvc -p C:\Windows\System32\svchost.exe
** 2484 660 svchost.exe 0xca82b3b382c0 17 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p C:\Windows\system32\svchost.exe
** 2996 660 svchost.exe 0xca82b3dda2c0 15 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s DPS C:\Windows\System32\svchost.exe
** 6080 660 svchost.exe 0xca82b742b340 0 - 0 False 2024-02-01 19:51:24.000000 2024-02-01 19:51:30.000000 \Device\HarddiskVolume3\Windows\System32\svchost.exe - -
** 2500 660 svchost.exe 0xca82b3be80c0 12 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p -s DoSvc C:\Windows\System32\svchost.exe
** 2004 660 svchost.exe 0xca82b3b2c300 3 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc C:\Windows\system32\svchost.exe
** 984 660 svchost.exe 0xca82b3038240 5 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM C:\Windows\system32\svchost.exe
** 5592 660 svchost.exe 0xca82b81ef2c0 4 - 0 False 2024-02-01 19:48:31.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc C:\Windows\system32\svchost.exe
** 3040 660 svchost.exe 0xca82b3df5080 6 - 0 False 2024-02-01 19:48:25.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetSvcs -p -s iphlpsvc C:\Windows\System32\svchost.exe
** 2544 660 svchost.exe 0xca82b8e84340 9 - 0 False 2024-02-01 19:50:26.000000 N/A \Device\HarddiskVolume3\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc C:\Windows\System32\svchost.exe
* 844 524 fontdrvhost.ex 0xca82b299d080 6 - 0 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\fontdrvhost.exe "fontdrvhost.exe" C:\Windows\system32\fontdrvhost.exe
532 516 csrss.exe 0xca82b287f140 13 - 1 False 2024-02-01 19:48:23.000000 N/A \Device\HarddiskVolume3\Windows\System32\csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16 C:\Windows\system32\csrss.exe
624 516 winlogon.exe 0xca82b28cb080 4 - 1 False 2024-02-01 19:48:23.000000 N/A \Device\HarddiskVolume3\Windows\System32\winlogon.exe winlogon.exe C:\Windows\system32\winlogon.exe
* 364 624 LogonUI.exe 0xca82b30a2080 0 - 1 False 2024-02-01 19:48:24.000000 2024-02-01 19:48:37.000000 \Device\HarddiskVolume3\Windows\System32\LogonUI.exe - -
* 372 624 dwm.exe 0xca82b30a3080 14 - 1 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\dwm.exe "dwm.exe" C:\Windows\system32\dwm.exe
* 4508 624 userinit.exe 0xca82b7426340 0 - 1 False 2024-02-01 19:48:26.000000 2024-02-01 19:48:52.000000 \Device\HarddiskVolume3\Windows\System32\userinit.exe - -
** 4568 4508 explorer.exe 0xca82b7440340 55 - 1 False 2024-02-01 19:48:26.000000 N/A \Device\HarddiskVolume3\Windows\explorer.exe C:\Windows\Explorer.EXE C:\Windows\Explorer.EXE
*** 7780 4568 OneDrive.exe 0xca82b814a0c0 21 - 1 True 2024-02-01 19:48:42.000000 N/A \Device\HarddiskVolume3\Users\alex\AppData\Local\Microsoft\OneDrive\OneDrive.exe "C:\Users\alex\AppData\Local\Microsoft\OneDrive\OneDrive.exe" /background C:\Users\alex\AppData\Local\Microsoft\OneDrive\OneDrive.exe
*** 7540 4568 SecurityHealth 0xca82b7858080 3 - 1 False 2024-02-01 19:48:41.000000 N/A \Device\HarddiskVolume3\Windows\System32\SecurityHealthSystray.exe "C:\Windows\System32\SecurityHealthSystray.exe" C:\Windows\System32\SecurityHealthSystray.exe
*** 7684 4568 vmtoolsd.exe 0xca82b7dbe080 8 - 1 False 2024-02-01 19:48:41.000000 N/A \Device\HarddiskVolume3\Program Files\VMware\VMware Tools\vmtoolsd.exe "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe" -n vmusr C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
*** 4628 4568 ChromeSetup.ex 0xca82b830a300 4 - 1 True 2024-02-01 19:48:50.000000 N/A \Device\HarddiskVolume3\Users\alex\Downloads\ChromeSetup.exe "C:\Users\alex\Downloads\ChromeSetup.exe" C:\Users\alex\Downloads\ChromeSetup.exe
* 836 624 fontdrvhost.ex 0xca82b299c140 6 - 1 False 2024-02-01 19:48:24.000000 N/A \Device\HarddiskVolume3\Windows\System32\fontdrvhost.exe "fontdrvhost.exe" C:\Windows\system32\fontdrvhost.exe
El resultado reveló varios procesos de interés:
** 4568 4508 explorer.exe 0xca82b7440340 55 - 1 False 2024-02-01 19:48:26.000000 N/A \Device\HarddiskVolume3\Windows\explorer.exe C:\Windows\Explorer.EXE C:\Windows\Explorer.EXE
*** 7780 4568 OneDrive.exe 0xca82b814a0c0 21 - 1 True 2024-02-01 19:48:42.000000 N/A \Device\HarddiskVolume3\Users\alex\AppData\Local\Microsoft\OneDrive\OneDrive.exe "C:\Users\alex\AppData\Local\Microsoft\OneDrive\OneDrive.exe" /background C:\Users\alex\AppData\Local\Microsoft\OneDrive\OneDrive.exe
*** 7540 4568 SecurityHealth 0xca82b7858080 3 - 1 False 2024-02-01 19:48:41.000000 N/A \Device\HarddiskVolume3\Windows\System32\SecurityHealthSystray.exe "C:\Windows\System32\SecurityHealthSystray.exe" C:\Windows\System32\SecurityHealthSystray.exe
*** 7684 4568 vmtoolsd.exe 0xca82b7dbe080 8 - 1 False 2024-02-01 19:48:41.000000 N/A \Device\HarddiskVolume3\Program Files\VMware\VMware Tools\vmtoolsd.exe "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe" -n vmusr C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
*** 4628 4568 ChromeSetup.ex 0xca82b830a300 4 - 1 True 2024-02-01 19:48:50.000000 N/A \Device\HarddiskVolume3\Users\alex\Downloads\ChromeSetup.exe "C:\Users\alex\Downloads\ChromeSetup.exe" C:\Users\alex\Downloads\ChromeSetup.exe
Para explorar posibles conexiones entre estos procesos, ejecutamos windows.netstat:
vol -f memory.dmp windows.netstat
Output:
Volatility 3 Framework 2.7.1
Progress: 100.00 PDB scanning finished
Offset Proto LocalAddr LocalPort ForeignAddr ForeignPort State PID Owner Created
0xca82b7deeb20 TCPv4 192.168.19.133 49763 2.18.162.9 443 ESTABLISHED 2500 svchost.exe 2024-02-01 19:52:57.000000
0xca82b7abdaf0 TCPv4 192.168.19.133 49739 40.115.3.253 443 ESTABLISHED 3356 svchost.exe 2024-02-01 19:51:25.000000
0xca82b87e8a20 TCPv4 192.168.19.133 49697 95.100.200.202 443 CLOSE_WAIT 5912 WWAHost.exe 2024-02-01 19:49:20.000000
0xca82b8bd7a20 TCPv4 192.168.19.133 49695 95.100.200.202 443 CLOSE_WAIT 5912 WWAHost.exe 2024-02-01 19:49:20.000000
0xca82b7861a20 TCPv4 192.168.19.133 49761 2.16.149.135 80 ESTABLISHED 2500 svchost.exe 2024-02-01 19:52:57.000000
0xca82b87f3010 TCPv4 192.168.19.133 49691 192.229.221.95 80 CLOSE_WAIT 5912 WWAHost.exe 2024-02-01 19:49:20.000000
0xca82b8005a20 TCPv4 192.168.19.133 49693 95.100.200.202 443 CLOSE_WAIT 5912 WWAHost.exe 2024-02-01 19:49:20.000000
0xca82b3fc74d0 TCPv4 192.168.19.133 49759 2.18.162.9 443 ESTABLISHED 2500 svchost.exe 2024-02-01 19:52:56.000000
0xca82b8ba9a20 TCPv4 192.168.19.133 49699 95.100.200.202 443 CLOSE_WAIT 5912 WWAHost.exe 2024-02-01 19:49:20.000000
0xca82b8b98a20 TCPv4 192.168.19.133 49760 2.18.162.9 443 ESTABLISHED 2500 svchost.exe 2024-02-01 19:52:57.000000
0xca82b7f1fa20 TCPv4 192.168.19.133 49692 95.100.200.202 443 CLOSE_WAIT 5912 WWAHost.exe 2024-02-01 19:49:20.000000
0xca82b8564050 TCPv4 192.168.19.133 49755 20.199.120.85 443 ESTABLISHED 3356 svchost.exe 2024-02-01 19:52:25.000000
0xca82b38b0730 TCPv4 192.168.19.133 49765 52.179.219.14 443 ESTABLISHED 2500 svchost.exe 2024-02-01 19:52:58.000000
0xca82b78cba20 TCPv4 192.168.19.133 49694 95.100.200.202 443 CLOSE_WAIT 5912 WWAHost.exe 2024-02-01 19:49:20.000000
0xca82b7e5a700 TCPv4 192.168.19.133 49700 95.100.200.202 443 CLOSE_WAIT 5912 WWAHost.exe 2024-02-01 19:49:20.000000
0xca82b8bc2b30 TCPv4 192.168.19.133 49682 58.64.204.181 5202 SYN_SENT 4628 ChromeSetup.ex 2024-02-01 19:48:51.000000
0xca82b8baea20 TCPv4 192.168.19.133 49696 95.100.200.202 443 CLOSE_WAIT 5912 WWAHost.exe 2024-02-01 19:49:20.000000
0xca82b1c2ed30 TCPv4 0.0.0.0 135 0.0.0.0 0 LISTENING 928 svchost.exe 2024-02-01 19:48:24.000000
0xca82b1c2ed30 TCPv6 :: 135 :: 0 LISTENING 928 svchost.exe 2024-02-01 19:48:24.000000
0xca82b1c2e0d0 TCPv4 0.0.0.0 135 0.0.0.0 0 LISTENING 928 svchost.exe 2024-02-01 19:48:24.000000
0xca82b3fe2a70 TCPv4 192.168.19.133 139 0.0.0.0 0 LISTENING 4 System 2024-02-01 19:48:26.000000
0xca82b0eadb50 TCPv4 0.0.0.0 445 0.0.0.0 0 LISTENING 4 System 2024-02-01 19:48:25.000000
0xca82b0eadb50 TCPv6 :: 445 :: 0 LISTENING 4 System 2024-02-01 19:48:25.000000
0xca82b3fe19f0 TCPv4 0.0.0.0 5040 0.0.0.0 0 LISTENING 3104 svchost.exe 2024-02-01 19:48:31.000000
0xca82b0ead9f0 TCPv4 0.0.0.0 7680 0.0.0.0 0 LISTENING 2500 svchost.exe 2024-02-01 19:48:25.000000
0xca82b0ead9f0 TCPv6 :: 7680 :: 0 LISTENING 2500 svchost.exe 2024-02-01 19:48:25.000000
0xca82b1c2ebd0 TCPv4 0.0.0.0 49664 0.0.0.0 0 LISTENING 676 lsass.exe 2024-02-01 19:48:24.000000
0xca82b1c2ebd0 TCPv6 :: 49664 :: 0 LISTENING 676 lsass.exe 2024-02-01 19:48:24.000000
0xca82b1c2e910 TCPv4 0.0.0.0 49664 0.0.0.0 0 LISTENING 676 lsass.exe 2024-02-01 19:48:24.000000
0xca82b1c2ee90 TCPv4 0.0.0.0 49665 0.0.0.0 0 LISTENING 524 wininit.exe 2024-02-01 19:48:24.000000
0xca82b1c2ee90 TCPv6 :: 49665 :: 0 LISTENING 524 wininit.exe 2024-02-01 19:48:24.000000
0xca82b1c2d470 TCPv4 0.0.0.0 49665 0.0.0.0 0 LISTENING 524 wininit.exe 2024-02-01 19:48:24.000000
0xca82b1c2e230 TCPv4 0.0.0.0 49666 0.0.0.0 0 LISTENING 1136 svchost.exe 2024-02-01 19:48:24.000000
0xca82b1c2e230 TCPv6 :: 49666 :: 0 LISTENING 1136 svchost.exe 2024-02-01 19:48:24.000000
0xca82b1c2d5d0 TCPv4 0.0.0.0 49666 0.0.0.0 0 LISTENING 1136 svchost.exe 2024-02-01 19:48:24.000000
0xca82b37e9a70 TCPv4 0.0.0.0 49667 0.0.0.0 0 LISTENING 1144 svchost.exe 2024-02-01 19:48:24.000000
0xca82b37e9a70 TCPv6 :: 49667 :: 0 LISTENING 1144 svchost.exe 2024-02-01 19:48:24.000000
0xca82b1c2e7b0 TCPv4 0.0.0.0 49667 0.0.0.0 0 LISTENING 1144 svchost.exe 2024-02-01 19:48:24.000000
0xca82b0eadcb0 TCPv4 0.0.0.0 49668 0.0.0.0 0 LISTENING 2564 spoolsv.exe 2024-02-01 19:48:25.000000
0xca82b0eadcb0 TCPv6 :: 49668 :: 0 LISTENING 2564 spoolsv.exe 2024-02-01 19:48:25.000000
0xca82b0ead5d0 TCPv4 0.0.0.0 49668 0.0.0.0 0 LISTENING 2564 spoolsv.exe 2024-02-01 19:48:25.000000
0xca82b3fe11b0 TCPv4 0.0.0.0 49669 0.0.0.0 0 LISTENING 660 services.exe 2024-02-01 19:48:25.000000
0xca82b3fe11b0 TCPv6 :: 49669 :: 0 LISTENING 660 services.exe 2024-02-01 19:48:25.000000
0xca82b3fe2390 TCPv4 0.0.0.0 49669 0.0.0.0 0 LISTENING 660 services.exe 2024-02-01 19:48:25.000000
0xca82b711f470 TCPv4 0.0.0.0 49670 0.0.0.0 0 LISTENING 2920 svchost.exe 2024-02-01 19:48:26.000000
0xca82b711f470 TCPv6 :: 49670 :: 0 LISTENING 2920 svchost.exe 2024-02-01 19:48:26.000000
0xca82b711f050 TCPv4 0.0.0.0 49670 0.0.0.0 0 LISTENING 2920 svchost.exe 2024-02-01 19:48:26.000000
0xca82b748db00 UDPv4 192.168.19.133 137 * 0 4 System 2024-02-01 19:48:26.000000
0xca82b748d650 UDPv4 192.168.19.133 138 * 0 4 System 2024-02-01 19:48:26.000000
0xca82b3d5f6f0 UDPv4 0.0.0.0 500 * 0 2912 svchost.exe 2024-02-01 19:48:25.000000
0xca82b3d5f6f0 UDPv6 :: 500 * 0 2912 svchost.exe 2024-02-01 19:48:25.000000
0xca82b3d5e750 UDPv4 0.0.0.0 500 * 0 2912 svchost.exe 2024-02-01 19:48:25.000000
0xca82b3d5fba0 UDPv4 0.0.0.0 4500 * 0 2912 svchost.exe 2024-02-01 19:48:25.000000
0xca82b3d5fba0 UDPv6 :: 4500 * 0 2912 svchost.exe 2024-02-01 19:48:25.000000
0xca82b3d5f560 UDPv4 0.0.0.0 4500 * 0 2912 svchost.exe 2024-02-01 19:48:25.000000
0xca82b748e460 UDPv4 0.0.0.0 5353 * 0 2244 svchost.exe 2024-02-01 19:48:26.000000
0xca82b748e460 UDPv6 :: 5353 * 0 2244 svchost.exe 2024-02-01 19:48:26.000000
0xca82b748e780 UDPv4 0.0.0.0 5353 * 0 2244 svchost.exe 2024-02-01 19:48:26.000000
0xca82b7492150 UDPv4 0.0.0.0 5355 * 0 2244 svchost.exe 2024-02-01 19:48:26.000000
0xca82b7492150 UDPv6 :: 5355 * 0 2244 svchost.exe 2024-02-01 19:48:26.000000
0xca82b748fd60 UDPv4 0.0.0.0 5355 * 0 2244 svchost.exe 2024-02-01 19:48:26.000000
0xca82b3f676a0 UDPv4 127.0.0.1 60166 * 0 3040 svchost.exe 2024-02-01 19:48:25.000000
Descubrimos una conexión relevante:
"0xca82b8bc2b30 TCPv4 192.168.19.133 49682 58.64.204.181 5202 SYN_SENT 4628 ChromeSetup.ex 2024-02-01 19:48:51.000000"
Para profundizar, realizamos un volcado del archivo asociado al PID 4628:
vol -f memory.dmp windows.dumpfile --pid 4628
Output:
Volatility 3 Framework 2.7.1
Progress: 100.00 PDB scanning finished
Cache FileObject FileName Result
ImageSectionObject 0xca82b8202cd0 winmm.dll file.0xca82b8202cd0.0xca82b79ab4b0.ImageSectionObject.winmm.dll.img
DataSectionObject 0xca82b85325a0 ChromeSetup.exe Error dumping file
ImageSectionObject 0xca82b85325a0 ChromeSetup.exe file.0xca82b85325a0.0xca82b7e06c80.ImageSectionObject.ChromeSetup.exe.img
ImageSectionObject 0xca82b8215100 AcLayers.dll file.0xca82b8215100.0xca82b7ae1d60.ImageSectionObject.AcLayers.dll.img
ImageSectionObject 0xca82b8218300 sfc.dll file.0xca82b8218300.0xca82b8490050.ImageSectionObject.sfc.dll.img
ImageSectionObject 0xca82b821c950 winrnr.dll file.0xca82b821c950.0xca82b7de9c80.ImageSectionObject.winrnr.dll.img
ImageSectionObject 0xca82b8217810 msacm32.dll file.0xca82b8217810.0xca82b7dd6c80.ImageSectionObject.msacm32.dll.img
ImageSectionObject 0xca82b8536420 wsock32.dll file.0xca82b8536420.0xca82b7a69db0.ImageSectionObject.wsock32.dll.img
ImageSectionObject 0xca82b8218490 pnrpnsp.dll file.0xca82b8218490.0xca82b7e31ca0.ImageSectionObject.pnrpnsp.dll.img
ImageSectionObject 0xca82b82198e0 wshbth.dll file.0xca82b82198e0.0xca82b7bfac20.ImageSectionObject.wshbth.dll.img
ImageSectionObject 0xca82b821d8f0 nlaapi.dll file.0xca82b821d8f0.0xca82b7abbcc0.ImageSectionObject.nlaapi.dll.img
ImageSectionObject 0xca82b8539df0 NapiNSP.dll file.0xca82b8539df0.0xca82b7e4fc80.ImageSectionObject.NapiNSP.dll.img
ImageSectionObject 0xca82b8217cc0 winmmbase.dll file.0xca82b8217cc0.0xca82b7ae1b00.ImageSectionObject.winmmbase.dll.img
ImageSectionObject 0xca82b82187b0 sfc_os.dll file.0xca82b82187b0.0xca82b78b6a20.ImageSectionObject.sfc_os.dll.img
ImageSectionObject 0xca82b82179a0 winspool.drv file.0xca82b82179a0.0xca82b7e4cc80.ImageSectionObject.winspool.drv.img
ImageSectionObject 0xca82b8525a80 mswsock.dll file.0xca82b8525a80.0xca82b7640cc0.ImageSectionObject.mswsock.dll.img
ImageSectionObject 0xca82b8527380 apphelp.dll file.0xca82b8527380.0xca82b7105dc0.ImageSectionObject.apphelp.dll.img
ImageSectionObject 0xca82b82174f0 AcGenral.dll file.0xca82b82174f0.0xca82b7a8cb80.ImageSectionObject.AcGenral.dll.img
ImageSectionObject 0xca82b8523370 FWPUCLNT.DLL file.0xca82b8523370.0xca82b858ac80.ImageSectionObject.FWPUCLNT.DLL.img
ImageSectionObject 0xca82b8523820 rasadhlp.dll file.0xca82b8523820.0xca82b78cca20.ImageSectionObject.rasadhlp.dll.img
ImageSectionObject 0xca82b820b1a0 samcli.dll file.0xca82b820b1a0.0xca82b1c14c80.ImageSectionObject.samcli.dll.img
ImageSectionObject 0xca82b82021e0 dnsapi.dll file.0xca82b82021e0.0xca82b79ab750.ImageSectionObject.dnsapi.dll.img
ImageSectionObject 0xca82b1b70700 sechost.dll file.0xca82b1b70700.0xca82b1ba12b0.ImageSectionObject.sechost.dll.img
DataSectionObject 0xca82b81330b0 uxtheme.dll file.0xca82b81330b0.0xca82b84a4eb0.DataSectionObject.uxtheme.dll.dat
ImageSectionObject 0xca82b81330b0 uxtheme.dll file.0xca82b81330b0.0xca82b78e0c80.ImageSectionObject.uxtheme.dll.img
ImageSectionObject 0xca82b82050c0 srvcli.dll file.0xca82b82050c0.0xca82b78f1a20.ImageSectionObject.srvcli.dll.img
ImageSectionObject 0xca82b8203180 mpr.dll file.0xca82b8203180.0xca82b78f0c80.ImageSectionObject.mpr.dll.img
ImageSectionObject 0xca82b296a410 netutils.dll file.0xca82b296a410.0xca82b73a8b80.ImageSectionObject.netutils.dll.img
ImageSectionObject 0xca82b7c7b660 urlmon.dll file.0xca82b7c7b660.0xca82b7e4dc80.ImageSectionObject.urlmon.dll.img
ImageSectionObject 0xca82b8204a80 iertutil.dll file.0xca82b8204a80.0xca82b37c68a0.ImageSectionObject.iertutil.dll.img
ImageSectionObject 0xca82b3f72610 comctl32.dll file.0xca82b3f72610.0xca82b8056c80.ImageSectionObject.comctl32.dll.img
ImageSectionObject 0xca82b8139960 dwmapi.dll file.0xca82b8139960.0xca82b75f2c80.ImageSectionObject.dwmapi.dll.img
ImageSectionObject 0xca82b81362b0 IPHLPAPI.DLL file.0xca82b81362b0.0xca82b8052a20.ImageSectionObject.IPHLPAPI.DLL.img
ImageSectionObject 0xca82b1bb9700 win32u.dll file.0xca82b1bb9700.0xca82b1ba9820.ImageSectionObject.win32u.dll.img
ImageSectionObject 0xca82b7254090 version.dll file.0xca82b7254090.0xca82b73a8db0.ImageSectionObject.version.dll.img
ImageSectionObject 0xca82b772bdf0 sspicli.dll file.0xca82b772bdf0.0xca82b7663a20.ImageSectionObject.sspicli.dll.img
ImageSectionObject 0xca82b7726800 kernel.appcore.dll file.0xca82b7726800.0xca82b763dc80.ImageSectionObject.kernel.appcore.dll.img
ImageSectionObject 0xca82b8131620 userenv.dll file.0xca82b8131620.0xca82b78dfa20.ImageSectionObject.userenv.dll.img
ImageSectionObject 0xca82b1bba380 gdi32.dll file.0xca82b1bba380.0xca82b1ba9a50.ImageSectionObject.gdi32.dll.img
ImageSectionObject 0xca82b1bb9ed0 msctf.dll file.0xca82b1bb9ed0.0xca82b1baa390.ImageSectionObject.msctf.dll.img
ImageSectionObject 0xca82b1bb9890 ole32.dll file.0xca82b1bb9890.0xca82b1ba2010.ImageSectionObject.ole32.dll.img
ImageSectionObject 0xca82b1bbace0 ws2_32.dll file.0xca82b1bbace0.0xca82b1ba29a0.ImageSectionObject.ws2_32.dll.img
ImageSectionObject 0xca82b1b70890 msvcrt.dll file.0xca82b1b70890.0xca82b1ba1510.ImageSectionObject.msvcrt.dll.img
ImageSectionObject 0xca82b1bbab50 bcryptprimitives.dll file.0xca82b1bbab50.0xca82b1ba1970.ImageSectionObject.bcryptprimitives.dll.img
ImageSectionObject 0xca82b19355e0 ntdll.dll file.0xca82b19355e0.0xca82b193f050.ImageSectionObject.ntdll.dll.img
ImageSectionObject 0xca82b1b703e0 KernelBase.dll file.0xca82b1b703e0.0xca82b1b5ec20.ImageSectionObject.KernelBase.dll.img
ImageSectionObject 0xca82b1b711f0 rpcrt4.dll file.0xca82b1b711f0.0xca82b1b9f4e0.ImageSectionObject.rpcrt4.dll.img
ImageSectionObject 0xca82b1b700c0 gdi32full.dll file.0xca82b1b700c0.0xca82b1ba1050.ImageSectionObject.gdi32full.dll.img
ImageSectionObject 0xca82b1b70250 SHCore.dll file.0xca82b1b70250.0xca82b1b9f970.ImageSectionObject.SHCore.dll.img
ImageSectionObject 0xca82b1b719c0 ucrtbase.dll file.0xca82b1b719c0.0xca82b1b9f050.ImageSectionObject.ucrtbase.dll.img
ImageSectionObject 0xca82b1b71510 shlwapi.dll file.0xca82b1b71510.0xca82b1b9f280.ImageSectionObject.shlwapi.dll.img
ImageSectionObject 0xca82b1b716a0 advapi32.dll file.0xca82b1b716a0.0xca82b1b5f740.ImageSectionObject.advapi32.dll.img
ImageSectionObject 0xca82b1b71380 imm32.dll file.0xca82b1b71380.0xca82b1b5fc00.ImageSectionObject.imm32.dll.img
ImageSectionObject 0xca82b1b38bb0 kernel32.dll file.0xca82b1b38bb0.0xca82b1b54cd0.ImageSectionObject.kernel32.dll.img
ImageSectionObject 0xca82b1b39ce0 msvcp_win.dll file.0xca82b1b39ce0.0xca82b1b5a930.ImageSectionObject.msvcp_win.dll.img
ImageSectionObject 0xca82b1b70bb0 oleaut32.dll file.0xca82b1b70bb0.0xca82b1b5c470.ImageSectionObject.oleaut32.dll.img
ImageSectionObject 0xca82b1b70ed0 setupapi.dll file.0xca82b1b70ed0.0xca82b1b5e9c0.ImageSectionObject.setupapi.dll.img
ImageSectionObject 0xca82b1b38d40 shell32.dll file.0xca82b1b38d40.0xca82b1b57ac0.ImageSectionObject.shell32.dll.img
ImageSectionObject 0xca82b1b39380 comdlg32.dll file.0xca82b1b39380.0xca82b1b59cf0.ImageSectionObject.comdlg32.dll.img
ImageSectionObject 0xca82b1b38570 cfgmgr32.dll file.0xca82b1b38570.0xca82b1b2d010.ImageSectionObject.cfgmgr32.dll.img
ImageSectionObject 0xca82b1b391f0 user32.dll file.0xca82b1b391f0.0xca82b1b2d270.ImageSectionObject.user32.dll.img
ImageSectionObject 0xca82b1b38700 combase.dll file.0xca82b1b38700.0xca82b1b2d8f0.ImageSectionObject.combase.dll.img
ImageSectionObject 0xca82b1b383e0 bcrypt.dll file.0xca82b1b383e0.0xca82b379a010.ImageSectionObject.bcrypt.dll.img
ImageSectionObject 0xca82b1b38a20 nsi.dll file.0xca82b1b38a20.0xca82b3799d00.ImageSectionObject.nsi.dll.img
ImageSectionObject 0xca82b1ace6a0 wow64cpu.dll file.0xca82b1ace6a0.0xca82b1b0a320.ImageSectionObject.wow64cpu.dll.img
ImageSectionObject 0xca82b1acdd40 wow64.dll file.0xca82b1acdd40.0xca82b1b0a5f0.ImageSectionObject.wow64.dll.img
ImageSectionObject 0xca82b1933ee0 ntdll.dll file.0xca82b1933ee0.0xca82b1922c70.ImageSectionObject.ntdll.dll.img
ImageSectionObject 0xca82b1aefbb0 wow64win.dll file.0xca82b1aefbb0.0xca82b1ab7d30.ImageSectionObject.wow64win.dll.img
Y obtuvimos el MD5 del proceso:
md5sum *ChromeSetup.exe*
11318cc3a3613fb679e25973a0a701fc file.0xca82b85325a0.0xca82b7e06c80.ImageSectionObject.ChromeSetup.exe.img
14f6b75515df5eee396d961e161148c5 file.0xca82b85325a0.0xca82b83c7770.DataSectionObject.ChromeSetup.exe.dat
Al verificar en VirusTotal, confirmamos que se trata de un troyano identificado como «virus.nimnul/vjadtre».
#2 Respuesta: C:\Users\alex\Downloads\ChromeSetup.exe
To eradicate the malware, what is the exact file path of the process executable?
Obtención de la evidencia
En la pregunta anterior, identificamos la ubicación del archivo utilizando el comando «windows.pstree»:
vol -f memory.dmp windows.pstree | grep ChromeSetup.exe
*** 4628: 100.04568 ChromeSetup.exan0xca82b830a300 4 - 1 True 2024-02-01 19:48:50.000000 N/A \Device\HarddiskVolume3\Users\alex\Downloads\ChromeSetup.exe "C:\Users\alex\Downloads\ChromeSetup.exe" C:\Users\alex\Downloads\ChromeSetup.exe
La ruta del archivo ejecutable del proceso ChromeSetup.exe es:
C:\Users\alex\Downloads\ChromeSetup.exe
#3 Respuesta: 58.64.204.181
Identifying network connections is crucial for understanding the malware's communication strategy. What is the IP address it attempted to connect to?
Obtención de la evidencia
En la pregunta #1, identificamos la dirección IP del atacante utilizando el comando windows.netstat.
vol -f memory.dmp windows.netstat | grep ChromeSetup.ex
0xca82b8bc2b30.0TCPv4 192.168.19.133an49682fin58.64.204.181 5202 SYN_SENT 4628 ChromeSetup.ex 2024-02-01 19:48:51.000000
#4 Respuesta: Hong Kong
To pinpoint the geographical origin of the attack, which city is associated with the IP address the malware communicated with?
Obtención de la evidencia
Para obtener la ubicación de la dirección IP, utilicé el servicio https://ipinfo.io/58.64.204.181:
curl https://ipinfo.io/58.64.204.181
{
"ip": "58.64.204.181",
"city": "Hong Kong",
"region": "Hong Kong",
"country": "HK",
"loc": "22.2783,114.1747",
"org": "AS17444 HKBN Enterprise Solutions Limited",
"timezone": "Asia/Hong_Kong",
"readme": "https://ipinfo.io/missingauth"
}
#5 Respuesta: 280c9d36039f9432433893dee6126d72b9112ad2
Hashes provide a unique identifier for files, aiding in detecting similar threats across machines. What is the SHA1 hash of the malware's executable?
Obtención de la evidencia
En la pregunta #1 realizamos un volcado del proceso para un análisis detallado y confirmamos que se trataba del malware utilizando el comando «windows.dumpfile –pid 4628». A continuación, obtenemos el hash SHA1 del archivo:
sha1sum file.0xca82b85325a0.0xca82b7e06c80.ImageSectionObject.ChromeSetup.exe.img
280c9d36039f9432433893dee6126d72b9112ad2 file.0xca82b85325a0.0xca82b7e06c80.ImageSectionObject.ChromeSetup.exe.img
#6 Respuesta: 2019-12-01 08:36:04
Understanding the malware's development timeline can offer insights into its deployment. What is the compilation UTC timestamp of the malware?
Obtención de la evidencia
Para obtener la timestamp de compilación en formato UTC del malware, utilizamos exiftool
para extraer los metadatos del archivo:
exiftool file.0xca82b85325a0.0xca82b7e06c80.ImageSectionObject.ChromeSetup.exe.img
Output:
ExifTool Version Number : 12.57
File Name : file.0xca82b85325a0.0xca82b7e06c80.ImageSectionObject.ChromeSetup.exe.img
Directory : .
File Size : 1004 kB
File Modification Date/Time : 2024:07:09 10:07:24+02:00
File Access Date/Time : 2024:07:09 10:08:36+02:00
File Inode Change Date/Time : 2024:07:09 10:07:24+02:00
File Permissions : -rw-------
File Type : Win32 EXE
File Type Extension : exe
MIME Type : application/octet-stream
Machine Type : Intel 386 or later, and compatibles
Time Stamp : 2019:12:01 09:36:04+01:00
Image File Characteristics : No relocs, Executable, No line numbers, No symbols, 32-bit
PE Type : PE32
Linker Version : 6.0
Code Size : 782336
Initialized Data Size : 372736
Uninitialized Data Size : 0
Entry Point : 0x116000
OS Version : 4.0
Image Version : 0.0
Subsystem Version : 4.0
Subsystem : Windows GUI
Para convertir el tiempo local a UTC, simplemente ajustamos la hora restando el desplazamiento horario. En este caso:
- La Time Stamp local es
2019-12-01 09:36:04+01:00
. - El desplazamiento horario es
+01:00
(Central European Time, CET).
Paso a paso para convertir a UTC:
- Identifica el desplazamiento horario: El
+01:00
indica que la hora local está una hora adelantada con respecto a UTC. - Resta el desplazamiento horario: Para obtener el tiempo en UTC, resta una hora a la marca de tiempo local.Por lo tanto:
Tiempo UTC = Tiempo local - Desplazamiento horario
= 2019-12-01 09:36:04 +01:00 - 01:00
= 2019-12-01 08:36:04 UTC
Así, la marca de tiempo de compilación del malware en formato UTC es 2019-12-01 08:36:04
.
#7 Respuesta: dnsnb8.net
Identifying domains involved with this malware helps in blocking future malicious communications and identifying current possible communications with that domain in our network. Can you provide the domain related to the malware?
Obtención de la evidencia
Buscando en VirusTotal los IOC, encontramos los siguientes dominios asociados a este malware.
:wq!