Analysis
-
max time kernel
92s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 07:18
Behavioral task
behavioral1
Sample
a1445abc6df1ef5983dcb2b6a4810ca3.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
a1445abc6df1ef5983dcb2b6a4810ca3.exe
-
Size
193KB
-
MD5
a1445abc6df1ef5983dcb2b6a4810ca3
-
SHA1
238c4bd94c310d1845b40b296afb00c44ed91d84
-
SHA256
48dfb8260c93ed4795b6ee2e91333e83cd492b15fea19df5af466b0d4f755a96
-
SHA512
ad4e0334f1dd4bc19ce52a7f5ec59afb497c1fb595b27aae940ab2aaf42b640d544f02ed0f758e73179d29d480930d783a736e2e2fb1442883fe41beb151d4a5
-
SSDEEP
3072:NTUtZpaaUJ7FlxTTUXdu/6NIqjRcNQl7BQERFmTdYiKD6VtJGRzLjMCJd2:RcpavHIfNXbgE7mqiKD6Vt0zPMCJd
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List a1445abc6df1ef5983dcb2b6a4810ca3.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile a1445abc6df1ef5983dcb2b6a4810ca3.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications a1445abc6df1ef5983dcb2b6a4810ca3.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\a1445abc6df1ef5983dcb2b6a4810ca3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a1445abc6df1ef5983dcb2b6a4810ca3.exe:*:enabled:@shell32.dll,-1" a1445abc6df1ef5983dcb2b6a4810ca3.exe -
resource yara_rule behavioral2/memory/3552-0-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/3552-9-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/3552-14-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 956 3552 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 620 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 5 PID 3552 wrote to memory of 620 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 5 PID 3552 wrote to memory of 620 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 5 PID 3552 wrote to memory of 620 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 5 PID 3552 wrote to memory of 620 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 5 PID 3552 wrote to memory of 620 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 5 PID 3552 wrote to memory of 680 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3 PID 3552 wrote to memory of 680 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3 PID 3552 wrote to memory of 680 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3 PID 3552 wrote to memory of 680 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3 PID 3552 wrote to memory of 680 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3 PID 3552 wrote to memory of 680 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 3 PID 3552 wrote to memory of 784 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 86 PID 3552 wrote to memory of 784 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 86 PID 3552 wrote to memory of 784 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 86 PID 3552 wrote to memory of 784 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 86 PID 3552 wrote to memory of 784 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 86 PID 3552 wrote to memory of 784 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 86 PID 3552 wrote to memory of 792 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 85 PID 3552 wrote to memory of 792 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 85 PID 3552 wrote to memory of 792 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 85 PID 3552 wrote to memory of 792 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 85 PID 3552 wrote to memory of 792 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 85 PID 3552 wrote to memory of 792 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 85 PID 3552 wrote to memory of 804 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 84 PID 3552 wrote to memory of 804 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 84 PID 3552 wrote to memory of 804 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 84 PID 3552 wrote to memory of 804 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 84 PID 3552 wrote to memory of 804 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 84 PID 3552 wrote to memory of 804 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 84 PID 3552 wrote to memory of 920 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 83 PID 3552 wrote to memory of 920 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 83 PID 3552 wrote to memory of 920 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 83 PID 3552 wrote to memory of 920 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 83 PID 3552 wrote to memory of 920 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 83 PID 3552 wrote to memory of 920 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 83 PID 3552 wrote to memory of 968 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 82 PID 3552 wrote to memory of 968 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 82 PID 3552 wrote to memory of 968 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 82 PID 3552 wrote to memory of 968 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 82 PID 3552 wrote to memory of 968 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 82 PID 3552 wrote to memory of 968 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 82 PID 3552 wrote to memory of 380 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 8 PID 3552 wrote to memory of 380 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 8 PID 3552 wrote to memory of 380 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 8 PID 3552 wrote to memory of 380 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 8 PID 3552 wrote to memory of 380 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 8 PID 3552 wrote to memory of 380 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 8 PID 3552 wrote to memory of 412 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 81 PID 3552 wrote to memory of 412 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 81 PID 3552 wrote to memory of 412 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 81 PID 3552 wrote to memory of 412 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 81 PID 3552 wrote to memory of 412 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 81 PID 3552 wrote to memory of 412 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 81 PID 3552 wrote to memory of 468 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 9 PID 3552 wrote to memory of 468 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 9 PID 3552 wrote to memory of 468 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 9 PID 3552 wrote to memory of 468 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 9 PID 3552 wrote to memory of 468 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 9 PID 3552 wrote to memory of 468 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 9 PID 3552 wrote to memory of 872 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 80 PID 3552 wrote to memory of 872 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 80 PID 3552 wrote to memory of 872 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 80 PID 3552 wrote to memory of 872 3552 a1445abc6df1ef5983dcb2b6a4810ca3.exe 80
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:680
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:380
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:792
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1132
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1096
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:4548
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2644
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1088
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1380
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2492
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2320
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2940
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3288
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4076
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4004
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3872
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3928
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4992
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2596
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4440
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:4488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:232
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2480
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2564
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4796
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1112
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4832
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4776
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1580
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3320
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3684
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\a1445abc6df1ef5983dcb2b6a4810ca3.exe"C:\Users\Admin\AppData\Local\Temp\a1445abc6df1ef5983dcb2b6a4810ca3.exe"2⤵
- Modifies firewall policy service
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 13443⤵
- Program crash
PID:956
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3184
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2520
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2400
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2232
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1548
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1396
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2000
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1992
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1876
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1740
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1684
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1192
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:804
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider2⤵PID:2112
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3552 -ip 35521⤵PID:3408