Analysis
-
max time kernel
118s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 21:55
Static task
static1
Behavioral task
behavioral1
Sample
1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe
Resource
win10v2004-20220812-en
General
-
Target
1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe
-
Size
939KB
-
MD5
3f87c5fe1471cd8fca27923c3e28fba0
-
SHA1
a6eb75d64f1cc7fca6c9e541ca815b44796394ea
-
SHA256
1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b
-
SHA512
df1e508611a278d05f627a254d5e94a8d43f96934694b934d673a031c2e7f993a3cbc9d0956007d66ec255590b6a012f725fe16840b1faf1184269c832b6fb25
-
SSDEEP
24576:113aQvCBCUWjbUnvEG7YSvsrdkS1s1msZhxTT40qeKK:H3aQ6MUWscaYSUSS1s1mihxTTvq+
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{6YY5FVND-LA48-R77O-H0W4-VT1438Q564C5} iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6YY5FVND-LA48-R77O-H0W4-VT1438Q564C5}\StubPath = "C:\\Windows\\system32\\svchost\\server.exe Restart" iexplore.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6YY5FVND-LA48-R77O-H0W4-VT1438Q564C5} iexplore.exe -
resource yara_rule behavioral2/memory/4348-140-0x0000000010410000-0x00000000104D4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rg+g4+rg4eg4eg4r4h44he4h+564he4h = "C:\\Windows\\system32\\svchost\\server.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ge54g564g5454h54h5+4ht5r4h54th54h = "C:\\Windows\\system32\\svchost\\server.exe" iexplore.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchost\logs.dat iexplore.exe File created C:\Windows\SysWOW64\svchost\plugin.dat iexplore.exe File opened for modification C:\Windows\SysWOW64\svchost\ iexplore.exe File created C:\Windows\SysWOW64\svchost\server.exe iexplore.exe File opened for modification C:\Windows\SysWOW64\svchost\server.exe iexplore.exe File opened for modification C:\Windows\SysWOW64\svchost\plugin.dat iexplore.exe File created C:\Windows\SysWOW64\svchost\logs.dat iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4936 set thread context of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 -
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 iexplore.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 iexplore.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 iexplore.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 4348 cvtres.exe 4348 cvtres.exe 4348 cvtres.exe 4348 cvtres.exe 4348 cvtres.exe 4348 cvtres.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 376 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe Token: SeDebugPrivilege 4348 cvtres.exe Token: SeDebugPrivilege 4348 cvtres.exe Token: SeDebugPrivilege 4348 cvtres.exe Token: SeDebugPrivilege 4348 cvtres.exe Token: SeDebugPrivilege 376 iexplore.exe Token: SeDebugPrivilege 376 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4936 wrote to memory of 4348 4936 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 81 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82 PID 4348 wrote to memory of 376 4348 cvtres.exe 82
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:596
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:804
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:384
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3412
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3496
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3344
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3252
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3680
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4400
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:388
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:4880
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4628
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:968
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1128
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2604
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1180
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1368
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2504
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1680
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1608
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1924
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1968
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1644
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2084
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2144
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2512
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2572
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe"C:\Users\Admin\AppData\Local\Temp\1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4988
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:1380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2020
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4276
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4576
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4292