Analysis
-
max time kernel
137s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 08:31
Behavioral task
behavioral1
Sample
866a7486a8022f7a088f58e4eb1bd322.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
866a7486a8022f7a088f58e4eb1bd322.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
866a7486a8022f7a088f58e4eb1bd322.exe
-
Size
256KB
-
MD5
866a7486a8022f7a088f58e4eb1bd322
-
SHA1
48d920ce86a75fe24b11b841b2b7d14de2671bb9
-
SHA256
34b54cd936109de793abf56935b21be1de9fbf5f6892bb00ecfc36c4668238a3
-
SHA512
5ff55d142f80ad7efd3ee1bffce1aa38b9e5ceeaa320a2ecbafb0d1b28a89d708f665c5e2deee5d3e420a79b89a619da881d876864a0ae59fced2fd2a41f628f
-
SSDEEP
6144:bMzzILGFkzhr0pGj9oXgIYZrcjrhGNRx7:TcoqGj9oXgIur8Qrx7
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1944-0-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral2/memory/1944-6-0x0000000000400000-0x000000000047C000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1944 866a7486a8022f7a088f58e4eb1bd322.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1944 866a7486a8022f7a088f58e4eb1bd322.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1944 wrote to memory of 616 1944 866a7486a8022f7a088f58e4eb1bd322.exe 3 PID 1944 wrote to memory of 616 1944 866a7486a8022f7a088f58e4eb1bd322.exe 3 PID 1944 wrote to memory of 616 1944 866a7486a8022f7a088f58e4eb1bd322.exe 3 PID 1944 wrote to memory of 616 1944 866a7486a8022f7a088f58e4eb1bd322.exe 3 PID 1944 wrote to memory of 616 1944 866a7486a8022f7a088f58e4eb1bd322.exe 3 PID 1944 wrote to memory of 616 1944 866a7486a8022f7a088f58e4eb1bd322.exe 3 PID 1944 wrote to memory of 680 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1 PID 1944 wrote to memory of 680 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1 PID 1944 wrote to memory of 680 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1 PID 1944 wrote to memory of 680 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1 PID 1944 wrote to memory of 680 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1 PID 1944 wrote to memory of 680 1944 866a7486a8022f7a088f58e4eb1bd322.exe 1 PID 1944 wrote to memory of 788 1944 866a7486a8022f7a088f58e4eb1bd322.exe 8 PID 1944 wrote to memory of 788 1944 866a7486a8022f7a088f58e4eb1bd322.exe 8 PID 1944 wrote to memory of 788 1944 866a7486a8022f7a088f58e4eb1bd322.exe 8 PID 1944 wrote to memory of 788 1944 866a7486a8022f7a088f58e4eb1bd322.exe 8 PID 1944 wrote to memory of 788 1944 866a7486a8022f7a088f58e4eb1bd322.exe 8 PID 1944 wrote to memory of 788 1944 866a7486a8022f7a088f58e4eb1bd322.exe 8 PID 1944 wrote to memory of 800 1944 866a7486a8022f7a088f58e4eb1bd322.exe 81 PID 1944 wrote to memory of 800 1944 866a7486a8022f7a088f58e4eb1bd322.exe 81 PID 1944 wrote to memory of 800 1944 866a7486a8022f7a088f58e4eb1bd322.exe 81 PID 1944 wrote to memory of 800 1944 866a7486a8022f7a088f58e4eb1bd322.exe 81 PID 1944 wrote to memory of 800 1944 866a7486a8022f7a088f58e4eb1bd322.exe 81 PID 1944 wrote to memory of 800 1944 866a7486a8022f7a088f58e4eb1bd322.exe 81 PID 1944 wrote to memory of 808 1944 866a7486a8022f7a088f58e4eb1bd322.exe 80 PID 1944 wrote to memory of 808 1944 866a7486a8022f7a088f58e4eb1bd322.exe 80 PID 1944 wrote to memory of 808 1944 866a7486a8022f7a088f58e4eb1bd322.exe 80 PID 1944 wrote to memory of 808 1944 866a7486a8022f7a088f58e4eb1bd322.exe 80 PID 1944 wrote to memory of 808 1944 866a7486a8022f7a088f58e4eb1bd322.exe 80 PID 1944 wrote to memory of 808 1944 866a7486a8022f7a088f58e4eb1bd322.exe 80 PID 1944 wrote to memory of 912 1944 866a7486a8022f7a088f58e4eb1bd322.exe 31 PID 1944 wrote to memory of 912 1944 866a7486a8022f7a088f58e4eb1bd322.exe 31 PID 1944 wrote to memory of 912 1944 866a7486a8022f7a088f58e4eb1bd322.exe 31 PID 1944 wrote to memory of 912 1944 866a7486a8022f7a088f58e4eb1bd322.exe 31 PID 1944 wrote to memory of 912 1944 866a7486a8022f7a088f58e4eb1bd322.exe 31 PID 1944 wrote to memory of 912 1944 866a7486a8022f7a088f58e4eb1bd322.exe 31 PID 1944 wrote to memory of 964 1944 866a7486a8022f7a088f58e4eb1bd322.exe 27 PID 1944 wrote to memory of 964 1944 866a7486a8022f7a088f58e4eb1bd322.exe 27 PID 1944 wrote to memory of 964 1944 866a7486a8022f7a088f58e4eb1bd322.exe 27 PID 1944 wrote to memory of 964 1944 866a7486a8022f7a088f58e4eb1bd322.exe 27 PID 1944 wrote to memory of 964 1944 866a7486a8022f7a088f58e4eb1bd322.exe 27 PID 1944 wrote to memory of 964 1944 866a7486a8022f7a088f58e4eb1bd322.exe 27 PID 1944 wrote to memory of 64 1944 866a7486a8022f7a088f58e4eb1bd322.exe 9 PID 1944 wrote to memory of 64 1944 866a7486a8022f7a088f58e4eb1bd322.exe 9 PID 1944 wrote to memory of 64 1944 866a7486a8022f7a088f58e4eb1bd322.exe 9 PID 1944 wrote to memory of 64 1944 866a7486a8022f7a088f58e4eb1bd322.exe 9 PID 1944 wrote to memory of 64 1944 866a7486a8022f7a088f58e4eb1bd322.exe 9 PID 1944 wrote to memory of 64 1944 866a7486a8022f7a088f58e4eb1bd322.exe 9 PID 1944 wrote to memory of 740 1944 866a7486a8022f7a088f58e4eb1bd322.exe 10 PID 1944 wrote to memory of 740 1944 866a7486a8022f7a088f58e4eb1bd322.exe 10 PID 1944 wrote to memory of 740 1944 866a7486a8022f7a088f58e4eb1bd322.exe 10 PID 1944 wrote to memory of 740 1944 866a7486a8022f7a088f58e4eb1bd322.exe 10 PID 1944 wrote to memory of 740 1944 866a7486a8022f7a088f58e4eb1bd322.exe 10 PID 1944 wrote to memory of 740 1944 866a7486a8022f7a088f58e4eb1bd322.exe 10 PID 1944 wrote to memory of 1028 1944 866a7486a8022f7a088f58e4eb1bd322.exe 11 PID 1944 wrote to memory of 1028 1944 866a7486a8022f7a088f58e4eb1bd322.exe 11 PID 1944 wrote to memory of 1028 1944 866a7486a8022f7a088f58e4eb1bd322.exe 11 PID 1944 wrote to memory of 1028 1944 866a7486a8022f7a088f58e4eb1bd322.exe 11 PID 1944 wrote to memory of 1028 1944 866a7486a8022f7a088f58e4eb1bd322.exe 11 PID 1944 wrote to memory of 1028 1944 866a7486a8022f7a088f58e4eb1bd322.exe 11 PID 1944 wrote to memory of 1036 1944 866a7486a8022f7a088f58e4eb1bd322.exe 12 PID 1944 wrote to memory of 1036 1944 866a7486a8022f7a088f58e4eb1bd322.exe 12 PID 1944 wrote to memory of 1036 1944 866a7486a8022f7a088f58e4eb1bd322.exe 12 PID 1944 wrote to memory of 1036 1944 866a7486a8022f7a088f58e4eb1bd322.exe 12
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:680
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:64
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:800
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3156
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3872
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2352
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3984
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3344
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4148
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:404
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:2324
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4812
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:3272
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:3328
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1232
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2796
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:956
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1292
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1480
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2504
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1528
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1096
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1660
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1712
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1836
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1464
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3360
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\866a7486a8022f7a088f58e4eb1bd322.exe"C:\Users\Admin\AppData\Local\Temp\866a7486a8022f7a088f58e4eb1bd322.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:5072
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4124
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1444
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:3192
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2520
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2160
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2136
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:808