Analysis
-
max time kernel
100s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 22:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1ac68b292573bd3b48ede9ac5ea02940N.exe
Resource
win7-20240705-en
windows7-x64
4 signatures
120 seconds
Behavioral task
behavioral2
Sample
1ac68b292573bd3b48ede9ac5ea02940N.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
4 signatures
120 seconds
General
-
Target
1ac68b292573bd3b48ede9ac5ea02940N.exe
-
Size
41KB
-
MD5
1ac68b292573bd3b48ede9ac5ea02940
-
SHA1
394eaa52f10f694168f346a0090ce104a8410eec
-
SHA256
4508ac06af752db832a0582724bf479104a1019bce3306618a8da9b869ebda1e
-
SHA512
413597fbdd0f839913819e20e078a699a9818cdcf6b54196f533ed7bd72b67ef0772ba99c56b66398aa082e9dd863ece1dc52707d71cd255fe81d7fc6b3685d5
-
SSDEEP
768:ucG6xlCRaJKGOA7SHJ8HWr64a1VGHzkxS4iDHWLsDixcvn7mCnDG:ucG6yPzKSHJa1MP2Aiqvn77
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3972 wrote to memory of 612 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 5 PID 3972 wrote to memory of 612 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 5 PID 3972 wrote to memory of 612 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 5 PID 3972 wrote to memory of 612 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 5 PID 3972 wrote to memory of 612 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 5 PID 3972 wrote to memory of 612 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 5 PID 3972 wrote to memory of 660 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 7 PID 3972 wrote to memory of 660 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 7 PID 3972 wrote to memory of 660 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 7 PID 3972 wrote to memory of 660 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 7 PID 3972 wrote to memory of 660 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 7 PID 3972 wrote to memory of 660 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 7 PID 3972 wrote to memory of 772 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 8 PID 3972 wrote to memory of 772 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 8 PID 3972 wrote to memory of 772 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 8 PID 3972 wrote to memory of 772 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 8 PID 3972 wrote to memory of 772 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 8 PID 3972 wrote to memory of 772 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 8 PID 3972 wrote to memory of 780 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 9 PID 3972 wrote to memory of 780 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 9 PID 3972 wrote to memory of 780 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 9 PID 3972 wrote to memory of 780 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 9 PID 3972 wrote to memory of 780 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 9 PID 3972 wrote to memory of 780 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 9 PID 3972 wrote to memory of 788 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 10 PID 3972 wrote to memory of 788 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 10 PID 3972 wrote to memory of 788 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 10 PID 3972 wrote to memory of 788 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 10 PID 3972 wrote to memory of 788 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 10 PID 3972 wrote to memory of 788 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 10 PID 3972 wrote to memory of 892 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 11 PID 3972 wrote to memory of 892 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 11 PID 3972 wrote to memory of 892 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 11 PID 3972 wrote to memory of 892 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 11 PID 3972 wrote to memory of 892 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 11 PID 3972 wrote to memory of 892 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 11 PID 3972 wrote to memory of 948 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 12 PID 3972 wrote to memory of 948 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 12 PID 3972 wrote to memory of 948 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 12 PID 3972 wrote to memory of 948 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 12 PID 3972 wrote to memory of 948 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 12 PID 3972 wrote to memory of 948 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 12 PID 3972 wrote to memory of 1020 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 13 PID 3972 wrote to memory of 1020 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 13 PID 3972 wrote to memory of 1020 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 13 PID 3972 wrote to memory of 1020 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 13 PID 3972 wrote to memory of 1020 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 13 PID 3972 wrote to memory of 1020 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 13 PID 3972 wrote to memory of 428 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 14 PID 3972 wrote to memory of 428 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 14 PID 3972 wrote to memory of 428 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 14 PID 3972 wrote to memory of 428 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 14 PID 3972 wrote to memory of 428 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 14 PID 3972 wrote to memory of 428 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 14 PID 3972 wrote to memory of 856 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 15 PID 3972 wrote to memory of 856 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 15 PID 3972 wrote to memory of 856 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 15 PID 3972 wrote to memory of 856 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 15 PID 3972 wrote to memory of 856 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 15 PID 3972 wrote to memory of 856 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 15 PID 3972 wrote to memory of 944 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 16 PID 3972 wrote to memory of 944 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 16 PID 3972 wrote to memory of 944 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 16 PID 3972 wrote to memory of 944 3972 1ac68b292573bd3b48ede9ac5ea02940N.exe 16
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:780
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1020
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:660
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3188
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3808
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3900
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3964
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4056
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2396
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:1756
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4772
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4384
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3268
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:5064
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:3700
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:856
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:944
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1116
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1160
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2636
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:804
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1456
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2536
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1588
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1592
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1724
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1768
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1988
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2060
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2236
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2252
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:2984
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:3004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:3020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:3048
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\1ac68b292573bd3b48ede9ac5ea02940N.exe"C:\Users\Admin\AppData\Local\Temp\1ac68b292573bd3b48ede9ac5ea02940N.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3972
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3632
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:1432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2112
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:3172