Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 08:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe
Resource
win7-20231025-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe
Resource
win10v2004-20231025-en
5 signatures
150 seconds
General
-
Target
NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe
-
Size
51KB
-
MD5
c6e533b2672d54f4a52a1abbea3dc720
-
SHA1
d799c0418ae9e923a256b9d3705feae44649108e
-
SHA256
b3318d1133eaeea6c8d251a5045c8a4c3509629f2cc4d05fe8c7d06f453028b9
-
SHA512
1ebe1c370db0858090873a0aaf3afc626c57a047f9bb9fe31c7fd6821690420bc7bfa08492c258e372c1385091d37f4eb401c19e492765d610ea998855afc9e7
-
SSDEEP
768:6drWCRrIXhBNutBZ9N8FTPOnXPLZZVCg:6drWClI+9NuTPONZM
Score
10/10
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe:*:enabled:@shell32.dll,-1" NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe Token: SeSecurityPrivilege 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe Token: SeDebugPrivilege 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 628 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 6 PID 3880 wrote to memory of 628 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 6 PID 3880 wrote to memory of 628 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 6 PID 3880 wrote to memory of 628 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 6 PID 3880 wrote to memory of 628 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 6 PID 3880 wrote to memory of 628 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 6 PID 3880 wrote to memory of 684 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 4 PID 3880 wrote to memory of 684 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 4 PID 3880 wrote to memory of 684 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 4 PID 3880 wrote to memory of 684 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 4 PID 3880 wrote to memory of 684 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 4 PID 3880 wrote to memory of 684 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 4 PID 3880 wrote to memory of 788 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 8 PID 3880 wrote to memory of 788 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 8 PID 3880 wrote to memory of 788 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 8 PID 3880 wrote to memory of 788 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 8 PID 3880 wrote to memory of 788 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 8 PID 3880 wrote to memory of 788 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 8 PID 3880 wrote to memory of 808 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 84 PID 3880 wrote to memory of 808 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 84 PID 3880 wrote to memory of 808 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 84 PID 3880 wrote to memory of 808 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 84 PID 3880 wrote to memory of 808 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 84 PID 3880 wrote to memory of 808 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 84 PID 3880 wrote to memory of 812 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 83 PID 3880 wrote to memory of 812 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 83 PID 3880 wrote to memory of 812 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 83 PID 3880 wrote to memory of 812 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 83 PID 3880 wrote to memory of 812 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 83 PID 3880 wrote to memory of 812 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 83 PID 3880 wrote to memory of 912 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 82 PID 3880 wrote to memory of 912 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 82 PID 3880 wrote to memory of 912 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 82 PID 3880 wrote to memory of 912 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 82 PID 3880 wrote to memory of 912 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 82 PID 3880 wrote to memory of 912 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 82 PID 3880 wrote to memory of 960 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 81 PID 3880 wrote to memory of 960 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 81 PID 3880 wrote to memory of 960 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 81 PID 3880 wrote to memory of 960 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 81 PID 3880 wrote to memory of 960 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 81 PID 3880 wrote to memory of 960 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 81 PID 3880 wrote to memory of 332 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 9 PID 3880 wrote to memory of 332 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 9 PID 3880 wrote to memory of 332 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 9 PID 3880 wrote to memory of 332 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 9 PID 3880 wrote to memory of 332 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 9 PID 3880 wrote to memory of 332 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 9 PID 3880 wrote to memory of 528 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 10 PID 3880 wrote to memory of 528 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 10 PID 3880 wrote to memory of 528 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 10 PID 3880 wrote to memory of 528 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 10 PID 3880 wrote to memory of 528 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 10 PID 3880 wrote to memory of 528 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 10 PID 3880 wrote to memory of 708 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 80 PID 3880 wrote to memory of 708 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 80 PID 3880 wrote to memory of 708 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 80 PID 3880 wrote to memory of 708 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 80 PID 3880 wrote to memory of 708 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 80 PID 3880 wrote to memory of 708 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 80 PID 3880 wrote to memory of 904 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 79 PID 3880 wrote to memory of 904 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 79 PID 3880 wrote to memory of 904 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 79 PID 3880 wrote to memory of 904 3880 NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe 79
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:684
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:628
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:332
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:812
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3616
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3828
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3712
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4840
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:1440
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca2⤵PID:1356
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:1396
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4532
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4356
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:3968
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2240
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3920
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2084
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2784
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1132
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2636
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:116
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1184
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1400
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2456
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2072
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3424
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c6e533b2672d54f4a52a1abbea3dc720.exe"2⤵
- Modifies firewall policy service
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4032
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:2856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:4396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2728
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4076
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:64
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2624
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2324
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2192
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2104
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1972
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1912
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1796
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1752
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1324
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1060
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:904
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:912
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:808