Process Hollowing Detected Against svchost.exe
EDR telemetry captured process hollowing sequence: a malicious loader created svchost.exe in suspended state, unmapped the legitimate image using NtUnmapViewOfSection, wrote malicious shellcode into the process address space, and resumed execution. The hollowed svchost.exe process now runs attacker-controlled code while appearing as a legitimate Windows service host in task listings and security monitoring dashboards.