Analysis
-
max time kernel
140s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 00:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
63ff023599d75a7d6d502fffc09e2863.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
63ff023599d75a7d6d502fffc09e2863.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
63ff023599d75a7d6d502fffc09e2863.exe
-
Size
50KB
-
MD5
63ff023599d75a7d6d502fffc09e2863
-
SHA1
a29693e80be7373b2ebf5aa8c0d1cdc2bb5eafca
-
SHA256
0e9b0f7bb7d08267cd70e084f94e712f7c05a41a94ed6e2e240bd5f89bb80c5d
-
SHA512
42fa932e6b5109ec74ad71512d2310f3e9517e2ae01e433e277693031466bcd3403368b8dd7dbb8655a6ab692e6766d0473d64f2574adc3add2918ebda034dbe
-
SSDEEP
768:TLKMpusnGNFjNCS1d5ak6qQbe99xsc/8xNDEB3jegwgmbO:TEsnbEhMe7xD8DDE5en9bO
Score
10/10
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 63ff023599d75a7d6d502fffc09e2863.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 63ff023599d75a7d6d502fffc09e2863.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 63ff023599d75a7d6d502fffc09e2863.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\63ff023599d75a7d6d502fffc09e2863.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\63ff023599d75a7d6d502fffc09e2863.exe:*:enabled:@shell32.dll,-1" 63ff023599d75a7d6d502fffc09e2863.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\ETC\HOSTS 63ff023599d75a7d6d502fffc09e2863.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe 3792 63ff023599d75a7d6d502fffc09e2863.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3792 63ff023599d75a7d6d502fffc09e2863.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 624 3792 63ff023599d75a7d6d502fffc09e2863.exe 5 PID 3792 wrote to memory of 624 3792 63ff023599d75a7d6d502fffc09e2863.exe 5 PID 3792 wrote to memory of 624 3792 63ff023599d75a7d6d502fffc09e2863.exe 5 PID 3792 wrote to memory of 624 3792 63ff023599d75a7d6d502fffc09e2863.exe 5 PID 3792 wrote to memory of 624 3792 63ff023599d75a7d6d502fffc09e2863.exe 5 PID 3792 wrote to memory of 624 3792 63ff023599d75a7d6d502fffc09e2863.exe 5 PID 3792 wrote to memory of 680 3792 63ff023599d75a7d6d502fffc09e2863.exe 3 PID 3792 wrote to memory of 680 3792 63ff023599d75a7d6d502fffc09e2863.exe 3 PID 3792 wrote to memory of 680 3792 63ff023599d75a7d6d502fffc09e2863.exe 3 PID 3792 wrote to memory of 680 3792 63ff023599d75a7d6d502fffc09e2863.exe 3 PID 3792 wrote to memory of 680 3792 63ff023599d75a7d6d502fffc09e2863.exe 3 PID 3792 wrote to memory of 680 3792 63ff023599d75a7d6d502fffc09e2863.exe 3 PID 3792 wrote to memory of 784 3792 63ff023599d75a7d6d502fffc09e2863.exe 8 PID 3792 wrote to memory of 784 3792 63ff023599d75a7d6d502fffc09e2863.exe 8 PID 3792 wrote to memory of 784 3792 63ff023599d75a7d6d502fffc09e2863.exe 8 PID 3792 wrote to memory of 784 3792 63ff023599d75a7d6d502fffc09e2863.exe 8 PID 3792 wrote to memory of 784 3792 63ff023599d75a7d6d502fffc09e2863.exe 8 PID 3792 wrote to memory of 784 3792 63ff023599d75a7d6d502fffc09e2863.exe 8 PID 3792 wrote to memory of 792 3792 63ff023599d75a7d6d502fffc09e2863.exe 16 PID 3792 wrote to memory of 792 3792 63ff023599d75a7d6d502fffc09e2863.exe 16 PID 3792 wrote to memory of 792 3792 63ff023599d75a7d6d502fffc09e2863.exe 16 PID 3792 wrote to memory of 792 3792 63ff023599d75a7d6d502fffc09e2863.exe 16 PID 3792 wrote to memory of 792 3792 63ff023599d75a7d6d502fffc09e2863.exe 16 PID 3792 wrote to memory of 792 3792 63ff023599d75a7d6d502fffc09e2863.exe 16 PID 3792 wrote to memory of 800 3792 63ff023599d75a7d6d502fffc09e2863.exe 15 PID 3792 wrote to memory of 800 3792 63ff023599d75a7d6d502fffc09e2863.exe 15 PID 3792 wrote to memory of 800 3792 63ff023599d75a7d6d502fffc09e2863.exe 15 PID 3792 wrote to memory of 800 3792 63ff023599d75a7d6d502fffc09e2863.exe 15 PID 3792 wrote to memory of 800 3792 63ff023599d75a7d6d502fffc09e2863.exe 15 PID 3792 wrote to memory of 800 3792 63ff023599d75a7d6d502fffc09e2863.exe 15 PID 3792 wrote to memory of 912 3792 63ff023599d75a7d6d502fffc09e2863.exe 14 PID 3792 wrote to memory of 912 3792 63ff023599d75a7d6d502fffc09e2863.exe 14 PID 3792 wrote to memory of 912 3792 63ff023599d75a7d6d502fffc09e2863.exe 14 PID 3792 wrote to memory of 912 3792 63ff023599d75a7d6d502fffc09e2863.exe 14 PID 3792 wrote to memory of 912 3792 63ff023599d75a7d6d502fffc09e2863.exe 14 PID 3792 wrote to memory of 912 3792 63ff023599d75a7d6d502fffc09e2863.exe 14 PID 3792 wrote to memory of 960 3792 63ff023599d75a7d6d502fffc09e2863.exe 13 PID 3792 wrote to memory of 960 3792 63ff023599d75a7d6d502fffc09e2863.exe 13 PID 3792 wrote to memory of 960 3792 63ff023599d75a7d6d502fffc09e2863.exe 13 PID 3792 wrote to memory of 960 3792 63ff023599d75a7d6d502fffc09e2863.exe 13 PID 3792 wrote to memory of 960 3792 63ff023599d75a7d6d502fffc09e2863.exe 13 PID 3792 wrote to memory of 960 3792 63ff023599d75a7d6d502fffc09e2863.exe 13 PID 3792 wrote to memory of 316 3792 63ff023599d75a7d6d502fffc09e2863.exe 9 PID 3792 wrote to memory of 316 3792 63ff023599d75a7d6d502fffc09e2863.exe 9 PID 3792 wrote to memory of 316 3792 63ff023599d75a7d6d502fffc09e2863.exe 9 PID 3792 wrote to memory of 316 3792 63ff023599d75a7d6d502fffc09e2863.exe 9 PID 3792 wrote to memory of 316 3792 63ff023599d75a7d6d502fffc09e2863.exe 9 PID 3792 wrote to memory of 316 3792 63ff023599d75a7d6d502fffc09e2863.exe 9 PID 3792 wrote to memory of 396 3792 63ff023599d75a7d6d502fffc09e2863.exe 12 PID 3792 wrote to memory of 396 3792 63ff023599d75a7d6d502fffc09e2863.exe 12 PID 3792 wrote to memory of 396 3792 63ff023599d75a7d6d502fffc09e2863.exe 12 PID 3792 wrote to memory of 396 3792 63ff023599d75a7d6d502fffc09e2863.exe 12 PID 3792 wrote to memory of 396 3792 63ff023599d75a7d6d502fffc09e2863.exe 12 PID 3792 wrote to memory of 396 3792 63ff023599d75a7d6d502fffc09e2863.exe 12 PID 3792 wrote to memory of 432 3792 63ff023599d75a7d6d502fffc09e2863.exe 11 PID 3792 wrote to memory of 432 3792 63ff023599d75a7d6d502fffc09e2863.exe 11 PID 3792 wrote to memory of 432 3792 63ff023599d75a7d6d502fffc09e2863.exe 11 PID 3792 wrote to memory of 432 3792 63ff023599d75a7d6d502fffc09e2863.exe 11 PID 3792 wrote to memory of 432 3792 63ff023599d75a7d6d502fffc09e2863.exe 11 PID 3792 wrote to memory of 432 3792 63ff023599d75a7d6d502fffc09e2863.exe 11 PID 3792 wrote to memory of 928 3792 63ff023599d75a7d6d502fffc09e2863.exe 10 PID 3792 wrote to memory of 928 3792 63ff023599d75a7d6d502fffc09e2863.exe 10 PID 3792 wrote to memory of 928 3792 63ff023599d75a7d6d502fffc09e2863.exe 10 PID 3792 wrote to memory of 928 3792 63ff023599d75a7d6d502fffc09e2863.exe 10
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:680
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:624
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:800
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:784
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:868
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3656
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:1944
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:4540
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:2308
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:756
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:2924
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4924
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4116
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3660
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:4056
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3944
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3216
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4932
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:1716
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:928
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:912
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:956
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1184
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:560
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2708
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1108
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1272
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1724
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:4940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:5080
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1220
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:1900
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:5072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3708
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\63ff023599d75a7d6d502fffc09e2863.exe"C:\Users\Admin\AppData\Local\Temp\63ff023599d75a7d6d502fffc09e2863.exe"2⤵
- Modifies firewall policy service
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1968
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2968
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2520
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2500
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2288
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2168
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2132
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1996
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1888
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1792
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1664
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1300