Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 11:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
17868bf758cb6bb3a077b44a24b5235a.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
17868bf758cb6bb3a077b44a24b5235a.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
17868bf758cb6bb3a077b44a24b5235a.exe
-
Size
103KB
-
MD5
17868bf758cb6bb3a077b44a24b5235a
-
SHA1
a554dd9bb14d9abf1951b87f8fd90d6a3bef204d
-
SHA256
b4972ae67df4a75622a11cf5ebbaaf898d4755b6a6f86dd8cfccc140fa7039e5
-
SHA512
2d130c6a9986fc4e56450015b62dcbf0a2dc5f410ce1f968b6a1da282f6523c7258c6362b00a2f59db795753922d564b094c5cf8b44fd4c5fd7e6c76506b57ad
-
SSDEEP
768:+akLN9L/MxPloy+hXyiA2IRyblMrAf2QdL0Ws4nsegRzSzXadItTjpwtF2WSfGSb:YNKxtCX424eluABS4segRd6BwtFH56
Score
10/10
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 17868bf758cb6bb3a077b44a24b5235a.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\17868bf758cb6bb3a077b44a24b5235a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\17868bf758cb6bb3a077b44a24b5235a.exe:*:enabled:@shell32.dll,-1" 17868bf758cb6bb3a077b44a24b5235a.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 17868bf758cb6bb3a077b44a24b5235a.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 17868bf758cb6bb3a077b44a24b5235a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe 3276 17868bf758cb6bb3a077b44a24b5235a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3276 17868bf758cb6bb3a077b44a24b5235a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3276 wrote to memory of 616 3276 17868bf758cb6bb3a077b44a24b5235a.exe 4 PID 3276 wrote to memory of 616 3276 17868bf758cb6bb3a077b44a24b5235a.exe 4 PID 3276 wrote to memory of 616 3276 17868bf758cb6bb3a077b44a24b5235a.exe 4 PID 3276 wrote to memory of 616 3276 17868bf758cb6bb3a077b44a24b5235a.exe 4 PID 3276 wrote to memory of 616 3276 17868bf758cb6bb3a077b44a24b5235a.exe 4 PID 3276 wrote to memory of 616 3276 17868bf758cb6bb3a077b44a24b5235a.exe 4 PID 3276 wrote to memory of 668 3276 17868bf758cb6bb3a077b44a24b5235a.exe 2 PID 3276 wrote to memory of 668 3276 17868bf758cb6bb3a077b44a24b5235a.exe 2 PID 3276 wrote to memory of 668 3276 17868bf758cb6bb3a077b44a24b5235a.exe 2 PID 3276 wrote to memory of 668 3276 17868bf758cb6bb3a077b44a24b5235a.exe 2 PID 3276 wrote to memory of 668 3276 17868bf758cb6bb3a077b44a24b5235a.exe 2 PID 3276 wrote to memory of 668 3276 17868bf758cb6bb3a077b44a24b5235a.exe 2 PID 3276 wrote to memory of 768 3276 17868bf758cb6bb3a077b44a24b5235a.exe 8 PID 3276 wrote to memory of 768 3276 17868bf758cb6bb3a077b44a24b5235a.exe 8 PID 3276 wrote to memory of 768 3276 17868bf758cb6bb3a077b44a24b5235a.exe 8 PID 3276 wrote to memory of 768 3276 17868bf758cb6bb3a077b44a24b5235a.exe 8 PID 3276 wrote to memory of 768 3276 17868bf758cb6bb3a077b44a24b5235a.exe 8 PID 3276 wrote to memory of 768 3276 17868bf758cb6bb3a077b44a24b5235a.exe 8 PID 3276 wrote to memory of 776 3276 17868bf758cb6bb3a077b44a24b5235a.exe 91 PID 3276 wrote to memory of 776 3276 17868bf758cb6bb3a077b44a24b5235a.exe 91 PID 3276 wrote to memory of 776 3276 17868bf758cb6bb3a077b44a24b5235a.exe 91 PID 3276 wrote to memory of 776 3276 17868bf758cb6bb3a077b44a24b5235a.exe 91 PID 3276 wrote to memory of 776 3276 17868bf758cb6bb3a077b44a24b5235a.exe 91 PID 3276 wrote to memory of 776 3276 17868bf758cb6bb3a077b44a24b5235a.exe 91 PID 3276 wrote to memory of 792 3276 17868bf758cb6bb3a077b44a24b5235a.exe 90 PID 3276 wrote to memory of 792 3276 17868bf758cb6bb3a077b44a24b5235a.exe 90 PID 3276 wrote to memory of 792 3276 17868bf758cb6bb3a077b44a24b5235a.exe 90 PID 3276 wrote to memory of 792 3276 17868bf758cb6bb3a077b44a24b5235a.exe 90 PID 3276 wrote to memory of 792 3276 17868bf758cb6bb3a077b44a24b5235a.exe 90 PID 3276 wrote to memory of 792 3276 17868bf758cb6bb3a077b44a24b5235a.exe 90 PID 3276 wrote to memory of 900 3276 17868bf758cb6bb3a077b44a24b5235a.exe 89 PID 3276 wrote to memory of 900 3276 17868bf758cb6bb3a077b44a24b5235a.exe 89 PID 3276 wrote to memory of 900 3276 17868bf758cb6bb3a077b44a24b5235a.exe 89 PID 3276 wrote to memory of 900 3276 17868bf758cb6bb3a077b44a24b5235a.exe 89 PID 3276 wrote to memory of 900 3276 17868bf758cb6bb3a077b44a24b5235a.exe 89 PID 3276 wrote to memory of 900 3276 17868bf758cb6bb3a077b44a24b5235a.exe 89 PID 3276 wrote to memory of 956 3276 17868bf758cb6bb3a077b44a24b5235a.exe 88 PID 3276 wrote to memory of 956 3276 17868bf758cb6bb3a077b44a24b5235a.exe 88 PID 3276 wrote to memory of 956 3276 17868bf758cb6bb3a077b44a24b5235a.exe 88 PID 3276 wrote to memory of 956 3276 17868bf758cb6bb3a077b44a24b5235a.exe 88 PID 3276 wrote to memory of 956 3276 17868bf758cb6bb3a077b44a24b5235a.exe 88 PID 3276 wrote to memory of 956 3276 17868bf758cb6bb3a077b44a24b5235a.exe 88 PID 3276 wrote to memory of 388 3276 17868bf758cb6bb3a077b44a24b5235a.exe 9 PID 3276 wrote to memory of 388 3276 17868bf758cb6bb3a077b44a24b5235a.exe 9 PID 3276 wrote to memory of 388 3276 17868bf758cb6bb3a077b44a24b5235a.exe 9 PID 3276 wrote to memory of 388 3276 17868bf758cb6bb3a077b44a24b5235a.exe 9 PID 3276 wrote to memory of 388 3276 17868bf758cb6bb3a077b44a24b5235a.exe 9 PID 3276 wrote to memory of 388 3276 17868bf758cb6bb3a077b44a24b5235a.exe 9 PID 3276 wrote to memory of 432 3276 17868bf758cb6bb3a077b44a24b5235a.exe 87 PID 3276 wrote to memory of 432 3276 17868bf758cb6bb3a077b44a24b5235a.exe 87 PID 3276 wrote to memory of 432 3276 17868bf758cb6bb3a077b44a24b5235a.exe 87 PID 3276 wrote to memory of 432 3276 17868bf758cb6bb3a077b44a24b5235a.exe 87 PID 3276 wrote to memory of 432 3276 17868bf758cb6bb3a077b44a24b5235a.exe 87 PID 3276 wrote to memory of 432 3276 17868bf758cb6bb3a077b44a24b5235a.exe 87 PID 3276 wrote to memory of 864 3276 17868bf758cb6bb3a077b44a24b5235a.exe 10 PID 3276 wrote to memory of 864 3276 17868bf758cb6bb3a077b44a24b5235a.exe 10 PID 3276 wrote to memory of 864 3276 17868bf758cb6bb3a077b44a24b5235a.exe 10 PID 3276 wrote to memory of 864 3276 17868bf758cb6bb3a077b44a24b5235a.exe 10 PID 3276 wrote to memory of 864 3276 17868bf758cb6bb3a077b44a24b5235a.exe 10 PID 3276 wrote to memory of 864 3276 17868bf758cb6bb3a077b44a24b5235a.exe 10 PID 3276 wrote to memory of 1016 3276 17868bf758cb6bb3a077b44a24b5235a.exe 86 PID 3276 wrote to memory of 1016 3276 17868bf758cb6bb3a077b44a24b5235a.exe 86 PID 3276 wrote to memory of 1016 3276 17868bf758cb6bb3a077b44a24b5235a.exe 86 PID 3276 wrote to memory of 1016 3276 17868bf758cb6bb3a077b44a24b5235a.exe 86
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:668
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:768
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:388
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:864
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1148
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:2888
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2820
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1208
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\17868bf758cb6bb3a077b44a24b5235a.exe"C:\Users\Admin\AppData\Local\Temp\17868bf758cb6bb3a077b44a24b5235a.exe"1⤵
- Modifies firewall policy service
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3276
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:1636
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4588
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:408
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:3528
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:312
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4848
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:1280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3292
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4496
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3716
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:3760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1088
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4828
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3764
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1032
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4344
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3556
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4076
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4000
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3936
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3656
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3384
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2876
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2608
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2196
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2092
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:2040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1936
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1900
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1776
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1752
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1444
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1388
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1052
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1044
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:792
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776