Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe
Resource
win10v2004-20220812-en
General
-
Target
b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe
-
Size
196KB
-
MD5
220e0f073e1d21384173ebd1a4effcd7
-
SHA1
3d69fa68f2cdcab36e4628cd27cc698147fcbc22
-
SHA256
b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c
-
SHA512
2da3a527cdc44e4ced9b4177782a6fad17717449fca0c1d89af9460c5e8dc67422aa782b1d814a46bfa37241cd3d5da6e80a5f936f1dfbf11a79413f23135b4d
-
SSDEEP
3072:LRttuKltqdWJMNKLlo0+y+Lh+1SCxCcE91BbY4vnxgLQdkXstxwckBwkRQrewcxV:V3Pex0B1SAO5WLQdkT5Gq50AxNhE/KX
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2648 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 9 PID 1728 wrote to memory of 576 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 3 PID 1728 wrote to memory of 664 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 1 PID 1728 wrote to memory of 764 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 77 PID 1728 wrote to memory of 784 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 76 PID 1728 wrote to memory of 792 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 75 PID 1728 wrote to memory of 884 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 74 PID 1728 wrote to memory of 940 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 73 PID 1728 wrote to memory of 1016 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 72 PID 1728 wrote to memory of 440 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 71 PID 1728 wrote to memory of 424 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 70 PID 1728 wrote to memory of 880 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 69 PID 1728 wrote to memory of 1032 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 68 PID 1728 wrote to memory of 1040 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 67 PID 1728 wrote to memory of 1100 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 66 PID 1728 wrote to memory of 1180 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 65 PID 1728 wrote to memory of 1216 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 64 PID 1728 wrote to memory of 1244 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 63 PID 1728 wrote to memory of 1288 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 62 PID 1728 wrote to memory of 1364 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 61 PID 1728 wrote to memory of 1404 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 60 PID 1728 wrote to memory of 1420 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 59 PID 1728 wrote to memory of 1476 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 58 PID 1728 wrote to memory of 1580 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 57 PID 1728 wrote to memory of 1628 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 56 PID 1728 wrote to memory of 1636 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 55 PID 1728 wrote to memory of 1648 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 54 PID 1728 wrote to memory of 1756 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 53 PID 1728 wrote to memory of 1820 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 52 PID 1728 wrote to memory of 1876 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 51 PID 1728 wrote to memory of 1884 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 50 PID 1728 wrote to memory of 1892 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 49 PID 1728 wrote to memory of 1964 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 48 PID 1728 wrote to memory of 1340 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 47 PID 1728 wrote to memory of 1680 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 46 PID 1728 wrote to memory of 1692 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 45 PID 1728 wrote to memory of 2136 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 44 PID 1728 wrote to memory of 2296 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 43 PID 1728 wrote to memory of 2308 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 42 PID 1728 wrote to memory of 2344 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 41 PID 1728 wrote to memory of 2372 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 40 PID 1728 wrote to memory of 2452 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 39 PID 1728 wrote to memory of 2464 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 38 PID 1728 wrote to memory of 2484 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 37 PID 1728 wrote to memory of 2504 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 36 PID 1728 wrote to memory of 2620 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 35 PID 1728 wrote to memory of 2696 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 34 PID 1728 wrote to memory of 2884 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 33 PID 1728 wrote to memory of 2580 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 32 PID 1728 wrote to memory of 3276 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 10 PID 1728 wrote to memory of 3376 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 13 PID 1728 wrote to memory of 3440 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 11 PID 1728 wrote to memory of 3528 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 12 PID 1728 wrote to memory of 3688 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 31 PID 1728 wrote to memory of 3964 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 14 PID 1728 wrote to memory of 4700 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 29 PID 1728 wrote to memory of 4332 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 28 PID 1728 wrote to memory of 3628 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 27 PID 1728 wrote to memory of 1304 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 25 PID 1728 wrote to memory of 2056 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 24 PID 1728 wrote to memory of 4768 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 23 PID 1728 wrote to memory of 1624 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 16 PID 1728 wrote to memory of 3328 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 22 PID 1728 wrote to memory of 3716 1728 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 21
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:664
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:576
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1016
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:784
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe"C:\Users\Admin\AppData\Local\Temp\b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3276
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3440
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3528
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3376
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3964
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:1624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:1076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:3716
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:2056
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1304
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3628
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4332
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4700
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:2580
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2696
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2484
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2372
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2296
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2136
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:1692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:1680
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1340
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1884
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1876
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1820
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1636
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1244
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1032
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:880
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:884
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:764