PowerShell Transcript - qaw-MJABER-NB. +NZRNB .20220116090657
PowerShell Transcript - qaw-MJABER-NB. +NZRNB .20220116090657
Name : System
ProcessId : 4
ParentProcessId : 0
CommandLine :
ExecutablePath :
Name : Registry
ProcessId : 132
ParentProcessId : 4
CommandLine :
ExecutablePath :
Name : smss.exe
ProcessId : 520
ParentProcessId : 4
CommandLine :
ExecutablePath :
Name : csrss.exe
ProcessId : 828
ParentProcessId : 700
CommandLine :
ExecutablePath :
Name : wininit.exe
ProcessId : 916
ParentProcessId : 700
CommandLine :
ExecutablePath :
Name : services.exe
ProcessId : 988
ParentProcessId : 916
CommandLine :
ExecutablePath :
Name : LsaIso.exe
ProcessId : 1008
ParentProcessId : 916
CommandLine :
ExecutablePath :
Name : lsass.exe
ProcessId : 1016
ParentProcessId : 916
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1040
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : WUDFHost.exe
ProcessId : 1048
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : fontdrvhost.exe
ProcessId : 1104
ParentProcessId : 916
CommandLine :
ExecutablePath :
Name : WUDFHost.exe
ProcessId : 1168
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1224
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1272
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : WUDFHost.exe
ProcessId : 1444
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1572
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1596
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1656
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1664
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1672
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1688
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1696
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1800
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1944
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1956
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2000
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2028
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 1244
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2080
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2184
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : IntelCpHDCPSvc.exe
ProcessId : 2192
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2224
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2324
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2340
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2364
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2704
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : IntelCpHeciSvc.exe
ProcessId : 2760
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2792
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2820
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2828
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2836
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 2944
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 3220
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 3292
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : PresentationFontCache.exe
ProcessId : 3432
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 3440
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 3452
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 3504
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : NetworkCap.exe
ProcessId : 3644
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : DiagsCap.exe
ProcessId : 3656
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : AppHelperCap.exe
ProcessId : 3664
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : SysInfoCap.exe
ProcessId : 3696
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 3768
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 3816
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 3824
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 3912
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : TouchpointAnalyticsClientService.exe
ProcessId : 3956
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 3968
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 4272
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : SynTPEnhService.exe
ProcessId : 4472
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 4560
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 4576
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 4640
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : Memory Compression
ProcessId : 4648
ParentProcessId : 4
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 4664
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : WmiPrvSE.exe
ProcessId : 4836
ParentProcessId : 1040
CommandLine :
ExecutablePath :
Name : unsecapp.exe
ProcessId : 4968
ParentProcessId : 1040
CommandLine :
ExecutablePath :
Name : WmiPrvSE.exe
ProcessId : 5108
ParentProcessId : 1040
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 4396
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 4704
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 5164
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : vpnagent.exe
ProcessId : 5220
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 5276
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 5336
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : spoolsv.exe
ProcessId : 5404
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 5444
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : activcontrolsvc.exe
ProcessId : 5484
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : armsvc.exe
ProcessId : 5500
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : residentAgent.exe
ProcessId : 5508
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : CmRcService.exe
ProcessId : 5560
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : CxUtilSvc.exe
ProcessId : 5568
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : OfficeClickToRun.exe
ProcessId : 5584
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 5600
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 5608
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : FMService64.exe
ProcessId : 5668
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : HotKeyServiceUWP.exe
ProcessId : 5684
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : ibtsiva.exe
ProcessId : 5692
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : LHAgent.exe
ProcessId : 5700
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : OneApp.IGCC.WinService.exe
ProcessId : 5732
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : pds.exe
ProcessId : 5784
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : LocalSch.EXE
ProcessId : 5792
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 5800
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : esif_uf.exe
ProcessId : 5824
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : issuser.exe
ProcessId : 5884
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : tmcsvc.exe
ProcessId : 5956
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : jhi_service.exe
ProcessId : 5996
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : MicrosoftSearchInBing.exe
ProcessId : 6104
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 6116
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : LMS.exe
ProcessId : 6132
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 4728
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : RtkAudUService64.exe
ProcessId : 4828
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 4616
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : SECOMN64.exe
ProcessId : 6200
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : SoftMon.exe
ProcessId : 6208
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : MsSense.exe
ProcessId : 6216
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : TbtP2pShortcutService.exe
ProcessId : 6276
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : ThunderboltService.exe
ProcessId : 6292
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : MsMpEng.exe
ProcessId : 6324
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : XtuService.exe
ProcessId : 6484
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 6492
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 6508
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 6612
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 6924
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : LanWlanWwanSwitchingServiceUWP.exe
ProcessId : 6932
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : wlanext.exe
ProcessId : 7140
ParentProcessId : 5276
CommandLine :
ExecutablePath :
Name : conhost.exe
ProcessId : 7260
ParentProcessId : 7140
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 7460
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : collector.exe
ProcessId : 8368
ParentProcessId : 5508
CommandLine :
ExecutablePath :
Name : conhost.exe
ProcessId : 8400
ParentProcessId : 8368
CommandLine :
ExecutablePath :
Name : SearchIndexer.exe
ProcessId : 8940
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : NisSrv.exe
ProcessId : 1644
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : dllhost.exe
ProcessId : 9116
ParentProcessId : 1040
CommandLine :
ExecutablePath :
Name : SelfElectController.exe
ProcessId : 10576
ParentProcessId : 5956
CommandLine :
ExecutablePath :
Name : conhost.exe
ProcessId : 10584
ParentProcessId : 10576
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 10876
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 10968
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 10588
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : GoogleCrashHandler.exe
ProcessId : 11540
ParentProcessId : 10784
CommandLine :
ExecutablePath :
Name : GoogleCrashHandler64.exe
ProcessId : 11644
ParentProcessId : 10784
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 11656
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 12132
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 8544
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 13476
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : SgrmBroker.exe
ProcessId : 13724
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : SecurityHealthService.exe
ProcessId : 14584
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 14932
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 15128
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 12008
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 3748
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : SenseCE.exe
ProcessId : 14568
ParentProcessId : 6216
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 7516
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : CcmExec.exe
ProcessId : 5904
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : WmiPrvSE.exe
ProcessId : 15272
ParentProcessId : 1040
CommandLine :
ExecutablePath :
Name : WatchDogService.exe
ProcessId : 9488
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : Microsoft.Management.Services.IntuneWindowsAgent.exe
ProcessId : 6400
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : uhssvc.exe
ProcessId : 6380
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 15532
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : WmiPrvSE.exe
ProcessId : 4536
ParentProcessId : 1040
CommandLine :
ExecutablePath :
Name : WmiPrvSE.exe
ProcessId : 3556
ParentProcessId : 1040
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 17136
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 11416
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 10912
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 20908
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : WmiPrvSE.exe
ProcessId : 6560
ParentProcessId : 1040
CommandLine :
ExecutablePath :
Name : MoUsoCoreWorker.exe
ProcessId : 11560
ParentProcessId : 1040
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 15976
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : csrss.exe
ProcessId : 9136
ParentProcessId : 21992
CommandLine :
ExecutablePath :
Name : winlogon.exe
ProcessId : 6056
ParentProcessId : 21992
CommandLine :
ExecutablePath :
Name : fontdrvhost.exe
ProcessId : 11420
ParentProcessId : 6056
CommandLine :
ExecutablePath :
Name : dwm.exe
ProcessId : 1064
ParentProcessId : 6056
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 10768
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : SynTPEnh.exe
ProcessId : 17056
ParentProcessId : 4472
CommandLine : "C:\WINDOWS\System32\SynTPEnh.exe"
ExecutablePath : C:\WINDOWS\System32\SynTPEnh.exe
Name : SECOCL64.exe
ProcessId : 20380
ParentProcessId : 6200
CommandLine : /exit-mutex-guid={85659686-3F7A-4645-916D-E312F4A6AD9A}
/host-pipe-name=\\.\pipe\{B2180EBB-CA13-4674-8973-07F7BE49B0AE}
ExecutablePath : C:\WINDOWS\System32\SECOCL64.exe
Name : conhost.exe
ProcessId : 8816
ParentProcessId : 20380
CommandLine : \??\C:\WINDOWS\system32\conhost.exe 0x4
ExecutablePath : C:\WINDOWS\system32\conhost.exe
Name : SynTPHelper.exe
ProcessId : 10892
ParentProcessId : 18252
CommandLine :
ExecutablePath :
Name : sihost.exe
ProcessId : 6244
ParentProcessId : 2704
CommandLine : sihost.exe
ExecutablePath : C:\WINDOWS\system32\sihost.exe
Name : svchost.exe
ProcessId : 12608
ParentProcessId : 988
CommandLine : C:\WINDOWS\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
ExecutablePath : C:\WINDOWS\system32\svchost.exe
Name : svchost.exe
ProcessId : 10948
ParentProcessId : 988
CommandLine : C:\WINDOWS\system32\svchost.exe -k UnistackSvcGroup -s
WpnUserService
ExecutablePath : C:\WINDOWS\system32\svchost.exe
Name : taskhostw.exe
ProcessId : 16124
ParentProcessId : 2080
CommandLine : taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
ExecutablePath : C:\WINDOWS\system32\taskhostw.exe
Name : explorer.exe
ProcessId : 2776
ParentProcessId : 21988
CommandLine : C:\WINDOWS\Explorer.EXE
ExecutablePath : C:\WINDOWS\Explorer.EXE
Name : svchost.exe
ProcessId : 6808
ParentProcessId : 988
CommandLine : C:\WINDOWS\system32\svchost.exe -k ClipboardSvcGroup -p -s
cbdhsvc
ExecutablePath : C:\WINDOWS\system32\svchost.exe
Name : StartMenuExperienceHost.exe
ProcessId : 22488
ParentProcessId : 1040
CommandLine : "C:\WINDOWS\SystemApps\
Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHos
t.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
ExecutablePath : C:\WINDOWS\SystemApps\
Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost
.exe
Name : ctfmon.exe
ProcessId : 2092
ParentProcessId : 10968
CommandLine :
ExecutablePath :
Name : RuntimeBroker.exe
ProcessId : 22144
ParentProcessId : 1040
CommandLine : C:\Windows\System32\RuntimeBroker.exe -Embedding
ExecutablePath : C:\Windows\System32\RuntimeBroker.exe
Name : RtkAudUService64.exe
ProcessId : 13940
ParentProcessId : 4828
CommandLine :
ExecutablePath :
Name : rcgui.exe
ProcessId : 18540
ParentProcessId : 5884
CommandLine :
ExecutablePath :
Name : SearchApp.exe
ProcessId : 16968
ParentProcessId : 1040
CommandLine : "C:\WINDOWS\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\
SearchApp.exe"
-ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
ExecutablePath : C:\WINDOWS\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\
SearchApp.exe
Name : RuntimeBroker.exe
ProcessId : 18232
ParentProcessId : 1040
CommandLine : C:\Windows\System32\RuntimeBroker.exe -Embedding
ExecutablePath : C:\Windows\System32\RuntimeBroker.exe
Name : RuntimeBroker.exe
ProcessId : 17412
ParentProcessId : 1040
CommandLine : C:\Windows\System32\RuntimeBroker.exe -Embedding
ExecutablePath : C:\Windows\System32\RuntimeBroker.exe
Name : svchost.exe
ProcessId : 14800
ParentProcessId : 988
CommandLine : C:\WINDOWS\System32\svchost.exe -k UnistackSvcGroup
ExecutablePath : C:\WINDOWS\System32\svchost.exe
Name : SCNotification.exe
ProcessId : 21676
ParentProcessId : 5904
CommandLine : "C:\Windows\CCM\SCNotification.exe"
ExecutablePath : C:\Windows\CCM\SCNotification.exe
Name : WINWORD.EXE
ProcessId : 13456
ParentProcessId : 2776
CommandLine : "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n
"C:\Users\mjaber\Desktop\links\LINKS.docx
ExecutablePath : C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
Name : SecurityHealthSystray.exe
ProcessId : 20684
ParentProcessId : 2776
CommandLine : "C:\Windows\System32\SecurityHealthSystray.exe"
ExecutablePath : C:\Windows\System32\SecurityHealthSystray.exe
Name : RtkAudUService64.exe
ProcessId : 18928
ParentProcessId : 2776
CommandLine : "C:\Windows\System32\DriverStore\FileRepository\
realtekservice.inf_amd64_f31d3fd59f245137\RtkAudUServ
ice64.exe" -background
ExecutablePath : C:\Windows\System32\DriverStore\FileRepository\
realtekservice.inf_amd64_f31d3fd59f245137\RtkAudUServi
ce64.exe
Name : SearchProtocolHost.exe
ProcessId : 14548
ParentProcessId : 8940
CommandLine :
ExecutablePath :
Name : activmgr.exe
ProcessId : 6648
ParentProcessId : 2776
CommandLine : "C:\Program Files\Activ Software\ActivDriver\activmgr.exe"
ExecutablePath : C:\Program Files\Activ Software\ActivDriver\activmgr.exe
Name : TextInputHost.exe
ProcessId : 19876
ParentProcessId : 1040
CommandLine : "C:\WINDOWS\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\
InputApp\TextInputHost.exe"
-ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
ExecutablePath : C:\WINDOWS\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\
InputApp\TextInputHost.exe
Name : dllhost.exe
ProcessId : 10112
ParentProcessId : 1040
CommandLine : C:\WINDOWS\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-
B70B-5A0F49CCDF3F}
ExecutablePath : C:\WINDOWS\system32\DllHost.exe
Name : OneDrive.exe
ProcessId : 19512
ParentProcessId : 2776
CommandLine : "C:\Users\mjaber\AppData\Local\Microsoft\OneDrive\
OneDrive.exe" /background
ExecutablePath : C:\Users\mjaber\AppData\Local\Microsoft\OneDrive\OneDrive.exe
Name : SettingSyncHost.exe
ProcessId : 9484
ParentProcessId : 1040
CommandLine : C:\WINDOWS\system32\SettingSyncHost.exe -Embedding
ExecutablePath : C:\WINDOWS\system32\SettingSyncHost.exe
Name : Teams.exe
ProcessId : 16408
ParentProcessId : 15292
CommandLine : "C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe"
--system-initiated
ExecutablePath : C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe
Name : Teams.exe
ProcessId : 10712
ParentProcessId : 16408
CommandLine : "C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe"
--type=gpu-process
--field-trial-
handle=1652,7308693035464843651,2269878448211151455,131072 --enable-
features=ContextBri
dgeMutability,WebComponentsV0Enabled,WinUseBrowserSpellChecker,WinUseHybridSpellChe
cker --disable-fea
tures=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForS
itePerProcess --gp
u-
preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQ
AAAAgAAAAAAAAACg
AAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAA
ABAAAABQAAABAAAAAA
AAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1692 /prefetch:2
ExecutablePath : C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe
Name : Teams.exe
ProcessId : 14308
ParentProcessId : 16408
CommandLine : "C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe"
--type=utility
--utility-sub-type=network.mojom.NetworkService
--field-trial-
handle=1652,7308693035464843651,2269878448211151455,131072 --enable-
features=ContextBri
dgeMutability,WebComponentsV0Enabled,WinUseBrowserSpellChecker,WinUseHybridSpellChe
cker --disable-fea
tures=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForS
itePerProcess
--lang=en-US --service-sandbox-type=network --enable-wer --ms-
teams-less-cors=522133263
--mojo-platform-channel-handle=2200 /prefetch:8
ExecutablePath : C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe
Name : Teams.exe
ProcessId : 18052
ParentProcessId : 16408
CommandLine : "C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe"
--type=renderer
--autoplay-policy=no-user-gesture-required --disable-background-
timer-throttling
--field-trial-
handle=1652,7308693035464843651,2269878448211151455,131072 --enable-
features=ContextBri
dgeMutability,WebComponentsV0Enabled,WinUseBrowserSpellChecker,WinUseHybridSpellChe
cker --disable-fea
tures=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForS
itePerProcess
--lang=en-US --enable-wer --ms-teams-less-cors=522133263
--app-user-model-id=com.squirrel.Teams.Teams
--app-path="C:\Users\mjaber\AppData\Local\Microsoft\Teams\
current\resources\app.asar"
--enable-sandbox --native-window-open --preload="C:\Users\mjaber\
AppData\Local\Microsoft\Teams\curren
t\resources\app.asar\lib\renderer\notifications\
preload_notifications.js" --background-color=#fff
--enable-spellcheck --enable-websql --disable-electron-site-
instance-overrides
--device-scale-factor=1.5 --num-raster-threads=4 --enable-main-
frame-before-activation
--renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-
platform-channel-handle=2856
/prefetch:1 --msteams-process-type=notificationsManager
ExecutablePath : C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe
Name : Teams.exe
ProcessId : 19092
ParentProcessId : 16408
CommandLine : "C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe"
--type=renderer
--autoplay-policy=no-user-gesture-required --disable-background-
timer-throttling
--field-trial-
handle=1652,7308693035464843651,2269878448211151455,131072 --enable-
features=ContextBri
dgeMutability,WebComponentsV0Enabled,WinUseBrowserSpellChecker,WinUseHybridSpellChe
cker --disable-fea
tures=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForS
itePerProcess
--lang=en-US --enable-wer --ms-teams-less-cors=522133263
--app-user-model-id=com.squirrel.Teams.Teams
--app-path="C:\Users\mjaber\AppData\Local\Microsoft\Teams\
current\resources\app.asar" --webview-tag
--enable-sandbox --native-window-open --preload="C:\Users\mjaber\
AppData\Local\Microsoft\Teams\curren
t\resources\app.asar\lib\renderer\preload.js" --world-safe-
execute-javascript
--background-color=#fff --enable-spellcheck --enable-websql
--disable-electron-site-instance-overrides --device-scale-
factor=1.5 --num-raster-threads=4
--enable-main-frame-before-activation --renderer-client-id=4 --
no-v8-untrusted-code-mitigations
--mojo-platform-channel-handle=3396 /prefetch:1 --msteams-
process-type=main-renderer
--msteams-rendererid=main-renderer
ExecutablePath : C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe
Name : HPTouchpointManagerTray.exe
ProcessId : 21716
ParentProcessId : 18488
CommandLine : "C:\Program Files (x86)\Hewlett-Packard\HP Touchpoint Manager\
Agent\HPTouchpointManagerTray.exe"
ExecutablePath : C:\Program Files (x86)\Hewlett-Packard\HP Touchpoint Manager\
Agent\HPTouchpointManagerTray.exe
Name : Teams.exe
ProcessId : 19416
ParentProcessId : 16408
CommandLine : "C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe"
--type=utility
--utility-sub-type=audio.mojom.AudioService
--field-trial-
handle=1652,7308693035464843651,2269878448211151455,131072 --enable-
features=ContextBri
dgeMutability,WebComponentsV0Enabled,WinUseBrowserSpellChecker,WinUseHybridSpellChe
cker --disable-fea
tures=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForS
itePerProcess
--lang=en-US --service-sandbox-type=audio --enable-wer --ms-
teams-less-cors=522133263
--mojo-platform-channel-handle=3696 /prefetch:8
ExecutablePath : C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe
Name : jusched.exe
ProcessId : 19960
ParentProcessId : 18488
CommandLine : "C:\Program Files (x86)\Common Files\Java\Java Update\
jusched.exe"
ExecutablePath : C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
Name : vpnui.exe
ProcessId : 7376
ParentProcessId : 18488
CommandLine : "C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility
Client\vpnui.exe" -minimized
ExecutablePath : C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility
Client\vpnui.exe
Name : clickshare_native.exe
ProcessId : 16988
ParentProcessId : 7892
CommandLine : "C:\ClickShareApp\ClickShare\app-4.18.0-b8\clickshare_native.exe"
--minimized
ExecutablePath : C:\ClickShareApp\ClickShare\app-4.18.0-b8\clickshare_native.exe
Name : calendarreader64.exe
ProcessId : 22040
ParentProcessId : 18480
CommandLine : "C:\ClickShareApp\ClickShare\app-4.19.1-b5\calendarreader64.exe"
-i 16988
ExecutablePath : C:\ClickShareApp\ClickShare\app-4.19.1-b5\calendarreader64.exe
Name : PresentSense.exe
ProcessId : 4980
ParentProcessId : 17912
CommandLine : "C:\ClickShareApp\ClickShare\app-4.19.1-b5\PresentSense.exe" -p
49201
ExecutablePath : C:\ClickShareApp\ClickShare\app-4.19.1-b5\PresentSense.exe
Name : WebComponent.exe
ProcessId : 20780
ParentProcessId : 18500
CommandLine : "C:\ClickShareApp\ClickShare\app-4.19.1-b5\WebComponent.exe" -
p=49202 -ck=ih2UkrhmIY/9fpg2wUP2tV/VU8p
V/pswmIVeSBNsNvsPEkJduLiV79B4cLi4WIbdPCfE36SZeyQMxM0WU8UIxIQdpR1PIqawxhCunhilYAHOL6
59Xl0yngcrfy9L+ovJ
0o3H1VtwpEwnqknPnQCwG/wCZEmoSrfcipA1V8lA+dg=
ExecutablePath : C:\ClickShareApp\ClickShare\app-4.19.1-b5\WebComponent.exe
pR1PIqawxhCunhilYAHOL659Xl0yngcrfy9L+ovJ0o3H1VtwpEwnqknPnQCwG/wCZEmoSrfcipA1V8lA+dg
=
ExecutablePath : C:\Users\mjaber\AppData\Local\Temp\23cBxbPouNWcc5a4X7mykfsdmj6\
ClickShare Web Component.exe
gAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAA
AASAAAAAAAAAAYAAAA
AgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAA
AAAAAAAA=
--mojo-platform-channel-handle=1636 /prefetch:2
ExecutablePath : C:\Users\mjaber\AppData\Local\Temp\23cBxbPouNWcc5a4X7mykfsdmj6\
ClickShare Web Component.exe
ceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --
lang=en-US
--service-sandbox-type=none --user-data-dir="C:\Users\mjaber\
AppData\Local\Barco\client-web-engine"
--mojo-platform-channel-handle=1856 /prefetch:8
ExecutablePath : C:\Users\mjaber\AppData\Local\Temp\23cBxbPouNWcc5a4X7mykfsdmj6\
ClickShare Web Component.exe
Name : bomgar-scc.exe
ProcessId : 21780
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : bomgar-scc.exe
ProcessId : 19944
ParentProcessId : 21780
CommandLine :
ExecutablePath :
Name : Teams.exe
ProcessId : 4216
ParentProcessId : 16408
CommandLine : "C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe"
--type=renderer
--autoplay-policy=no-user-gesture-required --disable-background-
timer-throttling
--field-trial-
handle=1652,7308693035464843651,2269878448211151455,131072 --enable-
features=ContextBri
dgeMutability,WebComponentsV0Enabled,WinUseBrowserSpellChecker,WinUseHybridSpellChe
cker --disable-fea
tures=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForS
itePerProcess
--lang=en-US --enable-wer --ms-teams-less-cors=522133263
--app-user-model-id=com.squirrel.Teams.Teams
--app-path="C:\Users\mjaber\AppData\Local\Microsoft\Teams\
current\resources\app.asar"
--enable-sandbox --native-window-open --preload="C:\Users\mjaber\
AppData\Local\Microsoft\Teams\curren
t\resources\app.asar\lib\renderer\experienceRenderer\
preload_webview.js" --background-color=#fff
--guest-instance-id=5 --enable-blink-features --disable-blink-
features --hidden-page
--node-integration-in-subframes --enable-spellcheck --enable-
websql
--disable-electron-site-instance-overrides --device-scale-
factor=1.5 --num-raster-threads=4
--enable-main-frame-before-activation --renderer-client-id=9 --
no-v8-untrusted-code-mitigations
--mojo-platform-channel-handle=3940 /prefetch:1 --msteams-
process-type=experience-renderer
ExecutablePath : C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe
Name : Teams.exe
ProcessId : 15048
ParentProcessId : 16408
CommandLine : "C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe"
--type=renderer
--autoplay-policy=no-user-gesture-required --disable-background-
timer-throttling
--field-trial-
handle=1652,7308693035464843651,2269878448211151455,131072 --enable-
features=ContextBri
dgeMutability,WebComponentsV0Enabled,WinUseBrowserSpellChecker,WinUseHybridSpellChe
cker --disable-fea
tures=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForS
itePerProcess
--lang=en-US --enable-wer --ms-teams-less-cors=522133263
--app-user-model-id=com.squirrel.Teams.Teams
--app-path="C:\Users\mjaber\AppData\Local\Microsoft\Teams\
current\resources\app.asar" --no-sandbox
--no-zygote --preload="C:\Users\mjaber\AppData\Local\Microsoft\
Teams\current\resources\app.asar\lib\p
luginhost\preload.js" --context-isolation --background-color=#fff
--enable-spellcheck
--enable-websql --disable-electron-site-instance-overrides --
device-scale-factor=1.5
--num-raster-threads=4 --enable-main-frame-before-activation --
renderer-client-id=10
--no-v8-untrusted-code-mitigations --mojo-platform-channel-
handle=4592 /prefetch:1
--msteams-process-type=pluginHost
ExecutablePath : C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe
Name : chrome.exe
ProcessId : 16084
ParentProcessId : 2776
CommandLine : "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"
ExecutablePath : C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Name : chrome.exe
ProcessId : 20540
ParentProcessId : 16084
CommandLine : "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --
type=crashpad-handler
"--user-data-dir=C:\Users\mjaber\AppData\Local\Google\Chrome\User
Data" /prefetch:7
--monitor-self-annotation=ptype=crashpad-handler
"--database=C:\Users\mjaber\AppData\Local\Google\Chrome\User
Data\Crashpad"
"--metrics-dir=C:\Users\mjaber\AppData\Local\Google\Chrome\User
Data"
--url=https://clients2.google.com/cr/report --annotation=channel=
--annotation=plat=Win64
--annotation=prod=Chrome --annotation=ver=97.0.4692.71
--initial-client-
data=0xf0,0xf4,0xf8,0xcc,0xfc,0x7ffac97ae850,0x7ffac97ae860,0x7ffac97ae870
ExecutablePath : C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Name : chrome.exe
ProcessId : 10688
ParentProcessId : 16084
CommandLine : "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --
type=gpu-process
--field-trial-
handle=1728,11489693762423402073,11501012059268732355,131072 --gpu-
preferences=UAAAAAAA
AADgAAAYAAAAAAAAAAAAAAAAAABgAIAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAA
AAAAASAAAAAAAAAAYA
AAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAA
CAAAAAAAAAA=
--mojo-platform-channel-handle=1736 /prefetch:2
ExecutablePath : C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Name : chrome.exe
ProcessId : 15312
ParentProcessId : 16084
CommandLine : "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --
type=utility
--utility-sub-type=network.mojom.NetworkService
--field-trial-
handle=1728,11489693762423402073,11501012059268732355,131072 --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-
handle=2032 /prefetch:8
ExecutablePath : C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Name : chrome.exe
ProcessId : 9060
ParentProcessId : 16084
CommandLine : "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --
type=utility
--utility-sub-type=storage.mojom.StorageService
--field-trial-
handle=1728,11489693762423402073,11501012059268732355,131072 --lang=en-US
--service-sandbox-type=utility --mojo-platform-channel-
handle=2108 /prefetch:8
ExecutablePath : C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Name : rckvm.exe
ProcessId : 8444
ParentProcessId : 5884
CommandLine :
ExecutablePath :
Name : rckvm.exe
ProcessId : 5312
ParentProcessId : 5884
CommandLine :
ExecutablePath :
Name : ApplicationFrameHost.exe
ProcessId : 18304
ParentProcessId : 1040
CommandLine : C:\WINDOWS\system32\ApplicationFrameHost.exe -Embedding
ExecutablePath : C:\WINDOWS\system32\ApplicationFrameHost.exe
Name : HxOutlook.exe
ProcessId : 21144
ParentProcessId : 1040
CommandLine : "C:\Program Files\WindowsApps\
microsoft.windowscommunicationsapps_16005.14326.20544.0_x64__8wekyb3d8b
bwe\HxOutlook.exe" -
ServerName:microsoft.windowslive.mail.AppXfbjsbkxvprcgqg6q4c9jfr0pn3kv9x5s.mca
ExecutablePath : C:\Program Files\WindowsApps\
microsoft.windowscommunicationsapps_16005.14326.20544.0_x64__8wekyb3d8bb
we\HxOutlook.exe
Name : RuntimeBroker.exe
ProcessId : 10524
ParentProcessId : 1040
CommandLine : C:\Windows\System32\RuntimeBroker.exe -Embedding
ExecutablePath : C:\Windows\System32\RuntimeBroker.exe
Name : HxTsr.exe
ProcessId : 21320
ParentProcessId : 1040
CommandLine : "C:\Program Files\WindowsApps\
microsoft.windowscommunicationsapps_16005.14326.20544.0_x64__8wekyb3d8b
bwe\HxTsr.exe" -ServerName:Hx.IPC.Server
ExecutablePath : C:\Program Files\WindowsApps\
microsoft.windowscommunicationsapps_16005.14326.20544.0_x64__8wekyb3d8bb
we\HxTsr.exe
Name : Microsoft.Photos.exe
ProcessId : 20768
ParentProcessId : 1040
CommandLine : "C:\Program Files\WindowsApps\
Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsof
t.Photos.exe" -
ServerName:App.AppXzst44mncqdg84v7sv6p7yznqwssy6f7f.mca
ExecutablePath : C:\Program
Files\WindowsApps\
Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe
Name : RuntimeBroker.exe
ProcessId : 13380
ParentProcessId : 1040
CommandLine : C:\Windows\System32\RuntimeBroker.exe -Embedding
ExecutablePath : C:\Windows\System32\RuntimeBroker.exe
Name : chrome.exe
ProcessId : 1640
ParentProcessId : 16084
CommandLine : "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --
type=renderer --extension-process
--display-capture-permissions-policy-allowed
--field-trial-
handle=1728,11489693762423402073,11501012059268732355,131072 --lang=en-US
--device-scale-factor=1.5 --num-raster-threads=4 --enable-main-
frame-before-activation
--renderer-client-id=13 --launch-time-ticks=406218574845 --mojo-
platform-channel-handle=5196
/prefetch:1
ExecutablePath : C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Name : chrome.exe
ProcessId : 18140
ParentProcessId : 16084
CommandLine : "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --
type=utility
--utility-sub-type=audio.mojom.AudioService
--field-trial-
handle=1728,11489693762423402073,11501012059268732355,131072 --lang=en-US
--service-sandbox-type=audio --mojo-platform-channel-
handle=3052 /prefetch:8
ExecutablePath : C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Name : SystemSettings.exe
ProcessId : 3844
ParentProcessId : 1040
CommandLine : "C:\Windows\ImmersiveControlPanel\SystemSettings.exe"
-ServerName:microsoft.windows.immersivecontrolpanel
ExecutablePath : C:\Windows\ImmersiveControlPanel\SystemSettings.exe
Name : chrome.exe
ProcessId : 20772
ParentProcessId : 16084
CommandLine : "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --
type=renderer
--display-capture-permissions-policy-allowed
--field-trial-
handle=1728,11489693762423402073,11501012059268732355,131072 --lang=en-US
--device-scale-factor=1.5 --num-raster-threads=4 --enable-main-
frame-before-activation
--renderer-client-id=17 --launch-time-ticks=406244637359 --mojo-
platform-channel-handle=1176
/prefetch:1
ExecutablePath : C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Name : OUTLOOK.EXE
ProcessId : 10564
ParentProcessId : 2776
CommandLine : "C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE"
ExecutablePath : C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
Name : Inspire.exe
ProcessId : 13768
ParentProcessId : 2776
CommandLine : "C:\Program Files (x86)\Activ Software\Inspire\Inspire.exe" "C:\
Users\mjaber\Desktop\Distance
Learning Flipcharts\January 16 2022 Sunday.flipchart"
ExecutablePath : C:\Program Files (x86)\Activ Software\Inspire\Inspire.exe
Name : jucheck.exe
ProcessId : 14160
ParentProcessId : 19960
CommandLine : "C:\Program Files (x86)\Common Files\Java\Java Update\
jucheck.exe" -auto
ExecutablePath : C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe
Name : Video.UI.exe
ProcessId : 20440
ParentProcessId : 1040
CommandLine : "C:\Program Files\WindowsApps\
Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe"
-
ServerName:Microsoft.ZuneVideo.AppX758ya5sqdjd98rx6z7g95nw6jy7bqx9y.mca
ExecutablePath : C:\Program Files\WindowsApps\
Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe
Name : RuntimeBroker.exe
ProcessId : 14432
ParentProcessId : 1040
CommandLine : C:\Windows\System32\RuntimeBroker.exe -Embedding
ExecutablePath : C:\Windows\System32\RuntimeBroker.exe
Name : svchost.exe
ProcessId : 23428
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : msedge.exe
ProcessId : 21112
ParentProcessId : 22640
CommandLine : "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --
no-startup-window /prefetch:5
ExecutablePath : C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
Name : msedge.exe
ProcessId : 3100
ParentProcessId : 21112
CommandLine : "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --
type=crashpad-handler
"--user-data-dir=C:\Users\mjaber\AppData\Local\Microsoft\Edge\
User Data" /prefetch:7
--monitor-self-annotation=ptype=crashpad-handler
"--database=C:\Users\mjaber\AppData\Local\Microsoft\Edge\User
Data\Crashpad"
--annotation=IsOfficialBuild=1 --annotation=channel= --
annotation=chromium-version=97.0.4692.71
"--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\
Application\msedge.exe"
--annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --
annotation=ver=97.0.1072.62
--initial-client-
data=0xf0,0xf4,0xf8,0xcc,0xfc,0x7ffad450db60,0x7ffad450db70,0x7ffad450db80
ExecutablePath : C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
Name : msedge.exe
ProcessId : 24296
ParentProcessId : 21112
CommandLine : "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --
type=gpu-process
--field-trial-
handle=2040,4654209318025211441,15024924724668248072,131072 --gpu-
preferences=UAAAAAAAA
ADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAA
AAAASAAAAAAAAAAYAA
AAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAAC
AAAAAAAAAA=
--mojo-platform-channel-handle=2064 /prefetch:2
ExecutablePath : C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
Name : msedge.exe
ProcessId : 30616
ParentProcessId : 21112
CommandLine : "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --
type=utility
--utility-sub-type=network.mojom.NetworkService
--field-trial-
handle=2040,4654209318025211441,15024924724668248072,131072 --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-
handle=2276 /prefetch:3
ExecutablePath : C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
Name : msedge.exe
ProcessId : 27724
ParentProcessId : 21112
CommandLine : "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --
type=utility
--utility-sub-type=storage.mojom.StorageService
--field-trial-
handle=2040,4654209318025211441,15024924724668248072,131072 --lang=en-US
--service-sandbox-type=utility --mojo-platform-channel-
handle=2868 /prefetch:8
ExecutablePath : C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
Name : audiodg.exe
ProcessId : 8864
ParentProcessId : 4396
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 32440
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : SenseNdr.exe
ProcessId : 32888
ParentProcessId : 6216
CommandLine :
ExecutablePath :
Name : smartscreen.exe
ProcessId : 25848
ParentProcessId : 1040
CommandLine : C:\Windows\System32\smartscreen.exe -Embedding
ExecutablePath : C:\Windows\System32\smartscreen.exe
Name : svchost.exe
ProcessId : 31528
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : SearchFilterHost.exe
ProcessId : 33468
ParentProcessId : 8940
CommandLine :
ExecutablePath :
Name : svchost.exe
ProcessId : 26248
ParentProcessId : 988
CommandLine :
ExecutablePath :
Name : Teams.exe
ProcessId : 28828
ParentProcessId : 16408
CommandLine : "C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe"
--type=renderer
--autoplay-policy=no-user-gesture-required --disable-background-
timer-throttling
--field-trial-
handle=1652,7308693035464843651,2269878448211151455,131072 --enable-
features=ContextBri
dgeMutability,WebComponentsV0Enabled,WinUseBrowserSpellChecker,WinUseHybridSpellChe
cker --disable-fea
tures=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForS
itePerProcess
--lang=en-US --enable-wer --ms-teams-less-cors=522133263
--app-user-model-id=com.squirrel.Teams.Teams
--app-path="C:\Users\mjaber\AppData\Local\Microsoft\Teams\
current\resources\app.asar"
--device-scale-factor=1.5 --num-raster-threads=4 --enable-main-
frame-before-activation
--renderer-client-id=91 --no-v8-untrusted-code-mitigations --
mojo-platform-channel-handle=4848
/prefetch:1
ExecutablePath : C:\Users\mjaber\AppData\Local\Microsoft\Teams\current\Teams.exe
Name : powershell.exe
ProcessId : 33000
ParentProcessId : 20056
CommandLine : powershell.exe /c "Get-CimInstance -className win32_process |
select
Name,ProcessId,ParentProcessId,CommandLine,ExecutablePath"
ExecutablePath : C:\WINDOWS\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
Name : conhost.exe
ProcessId : 30028
ParentProcessId : 33000
CommandLine : \??\C:\WINDOWS\system32\conhost.exe 0x4
ExecutablePath : C:\WINDOWS\system32\conhost.exe
PS>$global:?
True
**********************
Windows PowerShell transcript end
End time: 20220116090659
**********************