Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
00096d48964848ea3f1efc058df51f60N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
00096d48964848ea3f1efc058df51f60N.exe
Resource
win10v2004-20240802-en
General
-
Target
00096d48964848ea3f1efc058df51f60N.exe
-
Size
38KB
-
MD5
00096d48964848ea3f1efc058df51f60
-
SHA1
271857ede50470bc12f98a40f8311e84bcc47898
-
SHA256
c3c60f1d19e5ee8d7838afb5121f9c7003ec1cd2d811611fd70c0e4430a28123
-
SHA512
fa2eac84acd3d1ee7dc43fcb60981037ca45e10634b9250fc8b7af4d97fc0a07bfff1c0999b35cad9c986e77f72266f1b7de2dbb0de1952b52140105f65a6029
-
SSDEEP
768:PfkbECqnOt0rfAReLkh/AEiv/nug8KqP0Ar:P8BsO2r2cgkG3VB
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\ETC\HOSTS 00096d48964848ea3f1efc058df51f60N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00096d48964848ea3f1efc058df51f60N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe 4920 00096d48964848ea3f1efc058df51f60N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4920 00096d48964848ea3f1efc058df51f60N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 616 4920 00096d48964848ea3f1efc058df51f60N.exe 5 PID 4920 wrote to memory of 616 4920 00096d48964848ea3f1efc058df51f60N.exe 5 PID 4920 wrote to memory of 616 4920 00096d48964848ea3f1efc058df51f60N.exe 5 PID 4920 wrote to memory of 616 4920 00096d48964848ea3f1efc058df51f60N.exe 5 PID 4920 wrote to memory of 616 4920 00096d48964848ea3f1efc058df51f60N.exe 5 PID 4920 wrote to memory of 616 4920 00096d48964848ea3f1efc058df51f60N.exe 5 PID 4920 wrote to memory of 672 4920 00096d48964848ea3f1efc058df51f60N.exe 7 PID 4920 wrote to memory of 672 4920 00096d48964848ea3f1efc058df51f60N.exe 7 PID 4920 wrote to memory of 672 4920 00096d48964848ea3f1efc058df51f60N.exe 7 PID 4920 wrote to memory of 672 4920 00096d48964848ea3f1efc058df51f60N.exe 7 PID 4920 wrote to memory of 672 4920 00096d48964848ea3f1efc058df51f60N.exe 7 PID 4920 wrote to memory of 672 4920 00096d48964848ea3f1efc058df51f60N.exe 7 PID 4920 wrote to memory of 780 4920 00096d48964848ea3f1efc058df51f60N.exe 8 PID 4920 wrote to memory of 780 4920 00096d48964848ea3f1efc058df51f60N.exe 8 PID 4920 wrote to memory of 780 4920 00096d48964848ea3f1efc058df51f60N.exe 8 PID 4920 wrote to memory of 780 4920 00096d48964848ea3f1efc058df51f60N.exe 8 PID 4920 wrote to memory of 780 4920 00096d48964848ea3f1efc058df51f60N.exe 8 PID 4920 wrote to memory of 780 4920 00096d48964848ea3f1efc058df51f60N.exe 8 PID 4920 wrote to memory of 788 4920 00096d48964848ea3f1efc058df51f60N.exe 9 PID 4920 wrote to memory of 788 4920 00096d48964848ea3f1efc058df51f60N.exe 9 PID 4920 wrote to memory of 788 4920 00096d48964848ea3f1efc058df51f60N.exe 9 PID 4920 wrote to memory of 788 4920 00096d48964848ea3f1efc058df51f60N.exe 9 PID 4920 wrote to memory of 788 4920 00096d48964848ea3f1efc058df51f60N.exe 9 PID 4920 wrote to memory of 788 4920 00096d48964848ea3f1efc058df51f60N.exe 9 PID 4920 wrote to memory of 796 4920 00096d48964848ea3f1efc058df51f60N.exe 10 PID 4920 wrote to memory of 796 4920 00096d48964848ea3f1efc058df51f60N.exe 10 PID 4920 wrote to memory of 796 4920 00096d48964848ea3f1efc058df51f60N.exe 10 PID 4920 wrote to memory of 796 4920 00096d48964848ea3f1efc058df51f60N.exe 10 PID 4920 wrote to memory of 796 4920 00096d48964848ea3f1efc058df51f60N.exe 10 PID 4920 wrote to memory of 796 4920 00096d48964848ea3f1efc058df51f60N.exe 10 PID 4920 wrote to memory of 900 4920 00096d48964848ea3f1efc058df51f60N.exe 11 PID 4920 wrote to memory of 900 4920 00096d48964848ea3f1efc058df51f60N.exe 11 PID 4920 wrote to memory of 900 4920 00096d48964848ea3f1efc058df51f60N.exe 11 PID 4920 wrote to memory of 900 4920 00096d48964848ea3f1efc058df51f60N.exe 11 PID 4920 wrote to memory of 900 4920 00096d48964848ea3f1efc058df51f60N.exe 11 PID 4920 wrote to memory of 900 4920 00096d48964848ea3f1efc058df51f60N.exe 11 PID 4920 wrote to memory of 952 4920 00096d48964848ea3f1efc058df51f60N.exe 12 PID 4920 wrote to memory of 952 4920 00096d48964848ea3f1efc058df51f60N.exe 12 PID 4920 wrote to memory of 952 4920 00096d48964848ea3f1efc058df51f60N.exe 12 PID 4920 wrote to memory of 952 4920 00096d48964848ea3f1efc058df51f60N.exe 12 PID 4920 wrote to memory of 952 4920 00096d48964848ea3f1efc058df51f60N.exe 12 PID 4920 wrote to memory of 952 4920 00096d48964848ea3f1efc058df51f60N.exe 12 PID 4920 wrote to memory of 64 4920 00096d48964848ea3f1efc058df51f60N.exe 13 PID 4920 wrote to memory of 64 4920 00096d48964848ea3f1efc058df51f60N.exe 13 PID 4920 wrote to memory of 64 4920 00096d48964848ea3f1efc058df51f60N.exe 13 PID 4920 wrote to memory of 64 4920 00096d48964848ea3f1efc058df51f60N.exe 13 PID 4920 wrote to memory of 64 4920 00096d48964848ea3f1efc058df51f60N.exe 13 PID 4920 wrote to memory of 64 4920 00096d48964848ea3f1efc058df51f60N.exe 13 PID 4920 wrote to memory of 408 4920 00096d48964848ea3f1efc058df51f60N.exe 14 PID 4920 wrote to memory of 408 4920 00096d48964848ea3f1efc058df51f60N.exe 14 PID 4920 wrote to memory of 408 4920 00096d48964848ea3f1efc058df51f60N.exe 14 PID 4920 wrote to memory of 408 4920 00096d48964848ea3f1efc058df51f60N.exe 14 PID 4920 wrote to memory of 408 4920 00096d48964848ea3f1efc058df51f60N.exe 14 PID 4920 wrote to memory of 408 4920 00096d48964848ea3f1efc058df51f60N.exe 14 PID 4920 wrote to memory of 516 4920 00096d48964848ea3f1efc058df51f60N.exe 15 PID 4920 wrote to memory of 516 4920 00096d48964848ea3f1efc058df51f60N.exe 15 PID 4920 wrote to memory of 516 4920 00096d48964848ea3f1efc058df51f60N.exe 15 PID 4920 wrote to memory of 516 4920 00096d48964848ea3f1efc058df51f60N.exe 15 PID 4920 wrote to memory of 516 4920 00096d48964848ea3f1efc058df51f60N.exe 15 PID 4920 wrote to memory of 516 4920 00096d48964848ea3f1efc058df51f60N.exe 15 PID 4920 wrote to memory of 1032 4920 00096d48964848ea3f1efc058df51f60N.exe 16 PID 4920 wrote to memory of 1032 4920 00096d48964848ea3f1efc058df51f60N.exe 16 PID 4920 wrote to memory of 1032 4920 00096d48964848ea3f1efc058df51f60N.exe 16 PID 4920 wrote to memory of 1032 4920 00096d48964848ea3f1efc058df51f60N.exe 16
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:780
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:64
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:796
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2888
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3736
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3852
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3912
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4028
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3964
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:3360
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4908
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4900
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2796
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:1228
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:720
-
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider2⤵PID:3908
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:516
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1032
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1124
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1184
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:3136
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:4952
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1444
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2156
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1456
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1580
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1812
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1916
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1924
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2012
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2108
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2180
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2468
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2524
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3344
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\00096d48964848ea3f1efc058df51f60N.exe"C:\Users\Admin\AppData\Local\Temp\00096d48964848ea3f1efc058df51f60N.exe"2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4040
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4192
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:2204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4980
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2208
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:368