Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 22:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
17816ecb0138b6203163561cc8aefad2.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
17816ecb0138b6203163561cc8aefad2.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
17816ecb0138b6203163561cc8aefad2.exe
-
Size
6.1MB
-
MD5
17816ecb0138b6203163561cc8aefad2
-
SHA1
bcb0e14576dfae7f6a4c8b53c8bdd662c3cf61f2
-
SHA256
55ca473bc86c9c906045ae89ffe710657c1fdb209623d8047b1816ad7574b960
-
SHA512
c5496cb2fb57856223568558c72a9c9da2eed0074ecd07acd06906c07800b1265bca2a478cffb2917283b86ea6f476d38aef5180475ea929ee51a4ad23d42c1f
-
SSDEEP
98304:CIp27i2u7InCEE+wysPM4mlaw0LI60GBGrGrGWAuU7jPLQ:Rc7i6nTE+wBMHlaw0/U7jPL
Score
10/10
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 17816ecb0138b6203163561cc8aefad2.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 17816ecb0138b6203163561cc8aefad2.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 17816ecb0138b6203163561cc8aefad2.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\17816ecb0138b6203163561cc8aefad2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\17816ecb0138b6203163561cc8aefad2.exe:*:enabled:@shell32.dll,-1" 17816ecb0138b6203163561cc8aefad2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log 17816ecb0138b6203163561cc8aefad2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe 3204 17816ecb0138b6203163561cc8aefad2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3204 17816ecb0138b6203163561cc8aefad2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3204 17816ecb0138b6203163561cc8aefad2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3204 wrote to memory of 612 3204 17816ecb0138b6203163561cc8aefad2.exe 3 PID 3204 wrote to memory of 612 3204 17816ecb0138b6203163561cc8aefad2.exe 3 PID 3204 wrote to memory of 612 3204 17816ecb0138b6203163561cc8aefad2.exe 3 PID 3204 wrote to memory of 612 3204 17816ecb0138b6203163561cc8aefad2.exe 3 PID 3204 wrote to memory of 612 3204 17816ecb0138b6203163561cc8aefad2.exe 3 PID 3204 wrote to memory of 612 3204 17816ecb0138b6203163561cc8aefad2.exe 3 PID 3204 wrote to memory of 668 3204 17816ecb0138b6203163561cc8aefad2.exe 1 PID 3204 wrote to memory of 668 3204 17816ecb0138b6203163561cc8aefad2.exe 1 PID 3204 wrote to memory of 668 3204 17816ecb0138b6203163561cc8aefad2.exe 1 PID 3204 wrote to memory of 668 3204 17816ecb0138b6203163561cc8aefad2.exe 1 PID 3204 wrote to memory of 668 3204 17816ecb0138b6203163561cc8aefad2.exe 1 PID 3204 wrote to memory of 668 3204 17816ecb0138b6203163561cc8aefad2.exe 1 PID 3204 wrote to memory of 780 3204 17816ecb0138b6203163561cc8aefad2.exe 8 PID 3204 wrote to memory of 780 3204 17816ecb0138b6203163561cc8aefad2.exe 8 PID 3204 wrote to memory of 780 3204 17816ecb0138b6203163561cc8aefad2.exe 8 PID 3204 wrote to memory of 780 3204 17816ecb0138b6203163561cc8aefad2.exe 8 PID 3204 wrote to memory of 780 3204 17816ecb0138b6203163561cc8aefad2.exe 8 PID 3204 wrote to memory of 780 3204 17816ecb0138b6203163561cc8aefad2.exe 8 PID 3204 wrote to memory of 784 3204 17816ecb0138b6203163561cc8aefad2.exe 85 PID 3204 wrote to memory of 784 3204 17816ecb0138b6203163561cc8aefad2.exe 85 PID 3204 wrote to memory of 784 3204 17816ecb0138b6203163561cc8aefad2.exe 85 PID 3204 wrote to memory of 784 3204 17816ecb0138b6203163561cc8aefad2.exe 85 PID 3204 wrote to memory of 784 3204 17816ecb0138b6203163561cc8aefad2.exe 85 PID 3204 wrote to memory of 784 3204 17816ecb0138b6203163561cc8aefad2.exe 85 PID 3204 wrote to memory of 800 3204 17816ecb0138b6203163561cc8aefad2.exe 84 PID 3204 wrote to memory of 800 3204 17816ecb0138b6203163561cc8aefad2.exe 84 PID 3204 wrote to memory of 800 3204 17816ecb0138b6203163561cc8aefad2.exe 84 PID 3204 wrote to memory of 800 3204 17816ecb0138b6203163561cc8aefad2.exe 84 PID 3204 wrote to memory of 800 3204 17816ecb0138b6203163561cc8aefad2.exe 84 PID 3204 wrote to memory of 800 3204 17816ecb0138b6203163561cc8aefad2.exe 84 PID 3204 wrote to memory of 912 3204 17816ecb0138b6203163561cc8aefad2.exe 83 PID 3204 wrote to memory of 912 3204 17816ecb0138b6203163561cc8aefad2.exe 83 PID 3204 wrote to memory of 912 3204 17816ecb0138b6203163561cc8aefad2.exe 83 PID 3204 wrote to memory of 912 3204 17816ecb0138b6203163561cc8aefad2.exe 83 PID 3204 wrote to memory of 912 3204 17816ecb0138b6203163561cc8aefad2.exe 83 PID 3204 wrote to memory of 912 3204 17816ecb0138b6203163561cc8aefad2.exe 83 PID 3204 wrote to memory of 960 3204 17816ecb0138b6203163561cc8aefad2.exe 82 PID 3204 wrote to memory of 960 3204 17816ecb0138b6203163561cc8aefad2.exe 82 PID 3204 wrote to memory of 960 3204 17816ecb0138b6203163561cc8aefad2.exe 82 PID 3204 wrote to memory of 960 3204 17816ecb0138b6203163561cc8aefad2.exe 82 PID 3204 wrote to memory of 960 3204 17816ecb0138b6203163561cc8aefad2.exe 82 PID 3204 wrote to memory of 960 3204 17816ecb0138b6203163561cc8aefad2.exe 82 PID 3204 wrote to memory of 336 3204 17816ecb0138b6203163561cc8aefad2.exe 9 PID 3204 wrote to memory of 336 3204 17816ecb0138b6203163561cc8aefad2.exe 9 PID 3204 wrote to memory of 336 3204 17816ecb0138b6203163561cc8aefad2.exe 9 PID 3204 wrote to memory of 336 3204 17816ecb0138b6203163561cc8aefad2.exe 9 PID 3204 wrote to memory of 336 3204 17816ecb0138b6203163561cc8aefad2.exe 9 PID 3204 wrote to memory of 336 3204 17816ecb0138b6203163561cc8aefad2.exe 9 PID 3204 wrote to memory of 424 3204 17816ecb0138b6203163561cc8aefad2.exe 81 PID 3204 wrote to memory of 424 3204 17816ecb0138b6203163561cc8aefad2.exe 81 PID 3204 wrote to memory of 424 3204 17816ecb0138b6203163561cc8aefad2.exe 81 PID 3204 wrote to memory of 424 3204 17816ecb0138b6203163561cc8aefad2.exe 81 PID 3204 wrote to memory of 424 3204 17816ecb0138b6203163561cc8aefad2.exe 81 PID 3204 wrote to memory of 424 3204 17816ecb0138b6203163561cc8aefad2.exe 81 PID 3204 wrote to memory of 608 3204 17816ecb0138b6203163561cc8aefad2.exe 10 PID 3204 wrote to memory of 608 3204 17816ecb0138b6203163561cc8aefad2.exe 10 PID 3204 wrote to memory of 608 3204 17816ecb0138b6203163561cc8aefad2.exe 10 PID 3204 wrote to memory of 608 3204 17816ecb0138b6203163561cc8aefad2.exe 10 PID 3204 wrote to memory of 608 3204 17816ecb0138b6203163561cc8aefad2.exe 10 PID 3204 wrote to memory of 608 3204 17816ecb0138b6203163561cc8aefad2.exe 10 PID 3204 wrote to memory of 1008 3204 17816ecb0138b6203163561cc8aefad2.exe 80 PID 3204 wrote to memory of 1008 3204 17816ecb0138b6203163561cc8aefad2.exe 80 PID 3204 wrote to memory of 1008 3204 17816ecb0138b6203163561cc8aefad2.exe 80 PID 3204 wrote to memory of 1008 3204 17816ecb0138b6203163561cc8aefad2.exe 80
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:668
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:780
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:336
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1140
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:1628
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2704
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1132
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1120
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2944
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3992
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4668
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3032
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:5096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:1296
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1228
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4320
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4732
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:1168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:3660
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2156
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:5028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4396
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1988
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1604
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4072
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3928
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3648
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\17816ecb0138b6203163561cc8aefad2.exe"C:\Users\Admin\AppData\Local\Temp\17816ecb0138b6203163561cc8aefad2.exe"2⤵
- Modifies firewall policy service
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3204
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3228
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3096
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2980
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2644
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2572
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2544
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2316
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2164
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:1664
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2024
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1848
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1612
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1028
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:800
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:2136