DFIR Blog
  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity

Windows Forensics

Key Windows Process

3/26/2019

 
Picture
Overview:
An application consists of one or more processes. A process, in the simplest terms, is an executing program. One or more threads run in the context of the process. A thread is the basic unit to which the operating system allocates processor time. A thread can execute any part of the process code, including parts currently being executed by another thread.

Each process provides the resources needed to execute a program. A process has a virtual address space, executable code, open handles to system objects, a security context, a unique process identifier, environment variables, a priority class, minimum and maximum working set sizes, and at least one thread of execution. Each process is started with a single thread, often called the primary thread, but can create additional threads from any of its threads.

System
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:
svchost.exe
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:

smss.exe
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:

csrss.exe
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:
services.exe
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:

isaiso.exe
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:

explorer.exe
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:

wininit.exe
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:
winlogon.exe
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:

lsass.exe
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:

taskhostw.exe
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:
wininit.exe
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:
Runtimebroker.exe
  • path:
  • parent process:
  • Number of instance:
  • User Account:
  • Start Time:
  • Information:
profitcoin
4/27/2021 04:01:42 pm

FOR RECOVERY OF STOLEN BITCOIN / CRYPTOCURRENCY ,  RECOVERY OF LOST FUNDS FROM SCAMMER.  Have  you ever been a victim of a scam?  or have you lost your money to fake hackers online? I implore you to contact this trustworthy hacker and   recovery expert profitcoin.invest25@yahoo.com , I was a victim of fake people posing as  binary options and bitcoin investors,  I lost a sum of $4,000 and 2BTC from my bitcoin wallet to these fakes. It took a while before I realized they were scams and this really hurt .Then an in-law of mine heard about it and recommended to me a specialist with the address -  profitcoin.invest25@yahoo.com  . He helped me recover my lost bitcoins  in less than 72hrs  and the fakes were caught and made to pay for what they did to me .if you have lost any amount to online scams and you're seeking to recover LOST FUNDS from wallet hackers, fake hackers,  online dating scams, BTC wallet hack, recovery of lost funds from fake binary investors  .Reach out to  Wizard Charles Group Hackers  to help you


Comments are closed.

    Archives

    September 2019
    August 2019
    July 2019
    June 2019
    March 2019
    March 2018

    Categories

    All
    ATA
    Detection
    Forensics
    Microsoft
    Rules
    Windows
    Windows Foreniscs

    RSS Feed

  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity