Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 05:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08786f845c12c0e32ae20c1a4d80efc6.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
08786f845c12c0e32ae20c1a4d80efc6.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
08786f845c12c0e32ae20c1a4d80efc6.exe
-
Size
70KB
-
MD5
08786f845c12c0e32ae20c1a4d80efc6
-
SHA1
878aa1652a5bdceaa1c280f41dafb3e4efa24efb
-
SHA256
6e41d1375e548702d8aa8ca9e969ef1038d42a3c033da590cbb0a54e1bc25cda
-
SHA512
e34956fe7571826ed03fb00ca5b7e772b82e794c44e7079f5b05c5caecbdf8aee1a493a1b1ac7eca7b481a403359a4320353e3dd93954b1cd0e7b25b016bfbb9
-
SSDEEP
1536:CDyvX0vm5bKZT1cWHH3DabJbjMbB2QMvHreKvbdg:CSX0IbKZTeWz4qwJjvvbd
Score
10/10
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 08786f845c12c0e32ae20c1a4d80efc6.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 08786f845c12c0e32ae20c1a4d80efc6.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 08786f845c12c0e32ae20c1a4d80efc6.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\08786f845c12c0e32ae20c1a4d80efc6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\08786f845c12c0e32ae20c1a4d80efc6.exe:*:enabled:@shell32.dll,-1" 08786f845c12c0e32ae20c1a4d80efc6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5008 08786f845c12c0e32ae20c1a4d80efc6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5008 08786f845c12c0e32ae20c1a4d80efc6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 612 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5 PID 5008 wrote to memory of 612 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5 PID 5008 wrote to memory of 612 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5 PID 5008 wrote to memory of 612 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5 PID 5008 wrote to memory of 612 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5 PID 5008 wrote to memory of 612 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 5 PID 5008 wrote to memory of 664 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 3 PID 5008 wrote to memory of 664 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 3 PID 5008 wrote to memory of 664 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 3 PID 5008 wrote to memory of 664 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 3 PID 5008 wrote to memory of 664 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 3 PID 5008 wrote to memory of 664 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 3 PID 5008 wrote to memory of 788 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 9 PID 5008 wrote to memory of 788 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 9 PID 5008 wrote to memory of 788 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 9 PID 5008 wrote to memory of 788 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 9 PID 5008 wrote to memory of 788 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 9 PID 5008 wrote to memory of 788 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 9 PID 5008 wrote to memory of 796 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 8 PID 5008 wrote to memory of 796 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 8 PID 5008 wrote to memory of 796 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 8 PID 5008 wrote to memory of 796 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 8 PID 5008 wrote to memory of 796 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 8 PID 5008 wrote to memory of 796 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 8 PID 5008 wrote to memory of 804 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 88 PID 5008 wrote to memory of 804 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 88 PID 5008 wrote to memory of 804 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 88 PID 5008 wrote to memory of 804 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 88 PID 5008 wrote to memory of 804 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 88 PID 5008 wrote to memory of 804 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 88 PID 5008 wrote to memory of 908 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 87 PID 5008 wrote to memory of 908 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 87 PID 5008 wrote to memory of 908 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 87 PID 5008 wrote to memory of 908 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 87 PID 5008 wrote to memory of 908 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 87 PID 5008 wrote to memory of 908 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 87 PID 5008 wrote to memory of 960 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 86 PID 5008 wrote to memory of 960 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 86 PID 5008 wrote to memory of 960 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 86 PID 5008 wrote to memory of 960 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 86 PID 5008 wrote to memory of 960 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 86 PID 5008 wrote to memory of 960 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 86 PID 5008 wrote to memory of 380 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 10 PID 5008 wrote to memory of 380 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 10 PID 5008 wrote to memory of 380 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 10 PID 5008 wrote to memory of 380 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 10 PID 5008 wrote to memory of 380 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 10 PID 5008 wrote to memory of 380 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 10 PID 5008 wrote to memory of 536 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 85 PID 5008 wrote to memory of 536 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 85 PID 5008 wrote to memory of 536 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 85 PID 5008 wrote to memory of 536 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 85 PID 5008 wrote to memory of 536 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 85 PID 5008 wrote to memory of 536 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 85 PID 5008 wrote to memory of 404 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 11 PID 5008 wrote to memory of 404 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 11 PID 5008 wrote to memory of 404 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 11 PID 5008 wrote to memory of 404 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 11 PID 5008 wrote to memory of 404 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 11 PID 5008 wrote to memory of 404 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 11 PID 5008 wrote to memory of 60 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 84 PID 5008 wrote to memory of 60 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 84 PID 5008 wrote to memory of 60 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 84 PID 5008 wrote to memory of 60 5008 08786f845c12c0e32ae20c1a4d80efc6.exe 84
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:664
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:796
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:380
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3888
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:3420
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:768
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca2⤵PID:3928
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:2304
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1564
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:3576
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:2424
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4528
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3168
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3972
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3824
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3732
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2952
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:404
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1296
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2660
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:956
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵PID:5100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:3176
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3496
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:2720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4860
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3540
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\08786f845c12c0e32ae20c1a4d80efc6.exe"C:\Users\Admin\AppData\Local\Temp\08786f845c12c0e32ae20c1a4d80efc6.exe"2⤵
- Modifies firewall policy service
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3180
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3084
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2668
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2572
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2536
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2160
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2068
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1732
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1984
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1888
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1832
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1644
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1092
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1084
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:60
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:908
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:804