Summary Operating System Windows 10 Home 64-bit CPU Intel Core i7 @ 3.00GHz Kaby Lake 14nm Technology RAM 32.0GB Motherboard Dell Inc. 0DXJD9 (U3E1) %1 Chipset Graphics DELL U2417H (1920x1080@64Hz) Storage 931GB Seagate ST1000DM010-2EP102 (SATA ) 26 °C 238GB NVMe KBG40ZNS256G NVM (RAID (SSD)) Optical Drives No optical disk drives detected Audio Realtek Audio Operating System Windows 10 Home 64-bit Computer type: Virtual Installation Date: 7/17/2020 9:47:49 PM Serial Number: Windows Security Center User Account Control (UAC) Enabled Notify level 2 - Default Firewall Enabled Windows Update AutoUpdate Not configured Windows Defender Windows Defender Disabled Antivirus Windows Defender Antivirus Disabled Virus Signature Database Up to date Malwarebytes Antivirus Enabled Virus Signature Database Up to date .NET Frameworks installed v4.8 Full v4.8 Client Internet Explorer Version 11.959.18362.0 PowerShell Version 5.1.18362.1 Environment Variables USERPROFILE C:\Users\RA SystemRoot C:\Windows User Variables OneDrive C:\Users\RA\OneDrive Path C:\Users\RA\AppData\Local\Microsoft\WindowsApps Machine Variables asl.log Destination=file ComSpec C:\Windows\system32\cmd.exe DriverData C:\Windows\System32\Drivers\DriverData NUMBER_OF_PROCESSORS 8 OS Windows_NT Path C:\Windows\system32 C:\Windows C:\Windows\System32\Wbem C:\Windows\System32\WindowsPowerShell\v1.0\ PATHEXT .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC PROCESSOR_ARCHITECTURE AMD64 PROCESSOR_IDENTIFIER Intel64 Family 6 Model 158 Stepping 13, GenuineIntel PROCESSOR_LEVEL 6 PROCESSOR_REVISION 9e0d PSModulePath %ProgramFiles%\WindowsPowerShell\Modules C:\Windows\system32\WindowsPowerShell\v1.0\Modules USERNAME SYSTEM windir C:\Windows Power Profile Active power scheme Balanced Hibernation Enabled Turn Off Monitor after: (On AC Power) 10 min Turn Off Hard Disk after: (On AC Power) 20 min Suspend after: (On AC Power) 30 min Screen saver Enabled Uptime Current Session Current Time 8/1/2020 9:59:54 PM Current Uptime 15,402 sec (0 d, 04 h, 16 m, 42 s) Last Boot Time 8/1/2020 5:43:12 PM Services Running Application Information Running AVCTP service Running Background Tasks Infrastructure Service Running Base Filtering Engine Running cbdhsvc_2593b Running CDPUserSvc_2593b Running CNG Key Isolation Running COM+ Event System Running Connected Devices Platform Service Running Connected User Experiences and Telemetry Running CoreMessaging Running Credential Manager Running Cryptographic Services Running Data Sharing Service Running Data Usage Running DCOM Server Process Launcher Running Delivery Optimization Running DHCP Client Running Diagnostic Policy Service Running Diagnostic Service Host Running Diagnostic System Host Running Display Enhancement Service Running Display Policy Service Running Distributed Link Tracking Client Running DNS Client Running Encrypting File System (EFS) Running Function Discovery Provider Host Running Function Discovery Resource Publication Running Geolocation Service Running Human Interface Device Service Running HV Host Service Running IKE and AuthIP IPsec Keying Modules Running Intel Storage Middleware Service Running Intel SGX AESM Running IP Helper Running Killer Network Service Running Local Session Manager Running Malwarebytes Service Running Microsoft Store Install Service Running Nahimic service Running Network Connection Broker Running Network Connections Running Network List Service Running Network Location Awareness Running Network Setup Service Running Network Store Interface Service Running OneSyncSvc_2593b Running Payments and NFC/SE Manager Running Peer Name Resolution Protocol Running Peer Networking Identity Manager Running Power Running Print Spooler Running Program Compatibility Assistant Service Running Radio Management Service Running Realtek Audio Universal Service Running Remote Access Connection Manager Running Remote Procedure Call (RPC) Running RPC Endpoint Mapper Running Secure Socket Tunneling Protocol Service Running Security Accounts Manager Running Security Center Running Server Running Shell Hardware Detection Running SSDP Discovery Running State Repository Service Running Storage Service Running SysMain Running System Event Notification Service Running System Events Broker Running System Guard Runtime Monitor Broker Running Task Scheduler Running TCP/IP NetBIOS Helper Running Telephony Running Themes Running Time Broker Running Touch Keyboard and Handwriting Panel Service Running Update Orchestrator Service Running User Manager Running User Profile Service Running WarpJITSvc Running Web Account Manager Running Windows Audio Running Windows Audio Endpoint Builder Running Windows Backup Running Windows Biometric Service Running Windows Connection Manager Running Windows Defender Firewall Running Windows Event Log Running Windows Font Cache Service Running Windows License Manager Service Running Windows Management Instrumentation Running Windows Modules Installer Running Windows Push Notifications System Service Running Windows Search Running Windows Security Service Running WinHTTP Web Proxy Auto-Discovery Service Running WLAN AutoConfig Running WpnUserService_2593b Running xTendUtilityService Stopped AarSvc_2593b Stopped ActiveX Installer (AxInstSV) Stopped AllJoyn Router Service Stopped App Readiness Stopped Apple Mobile Device Service Stopped Application Identity Stopped Application Layer Gateway Service Stopped AppX Deployment Service (AppXSVC) Stopped Auto Time Zone Updater Stopped Background Intelligent Transfer Service Stopped BcastDVRUserService_2593b Stopped BitLocker Drive Encryption Service Stopped Block Level Backup Engine Service Stopped Bluetooth Audio Gateway Service Stopped Bluetooth Support Service Stopped BluetoothUserService_2593b Stopped Bonjour Service Stopped Capability Access Manager Service Stopped CaptureService_2593b Stopped Cellular Time Stopped Certificate Propagation Stopped Client License Service (ClipSVC) Stopped COM+ System Application Stopped ConsentUxUserSvc_2593b Stopped CredentialEnrollmentManagerUserSvc_2593b Stopped Dell Digital Delivery Service Stopped Device Association Service Stopped Device Install Service Stopped Device Management Enrollment Service Stopped Device Management Wireless Application Protocol (WAP) Push message Routing Service Stopped Device Setup Manager Stopped DeviceAssociationBrokerSvc_2593b Stopped DevicePickerUserSvc_2593b Stopped DevicesFlowUserSvc_2593b Stopped DevQuery Background Discovery Broker Stopped Diagnostic Execution Service Stopped Distributed Transaction Coordinator Stopped Downloaded Maps Manager Stopped Embedded Mode Stopped Enterprise App Management Service Stopped Extensible Authentication Protocol Stopped File History Service Stopped Google Chrome Elevation Service (GoogleChromeElevationService) Stopped Google Update Service (gupdate) Stopped Google Update Service (gupdatem) Stopped GraphicsPerfSvc Stopped Group Policy Client Stopped Hyper-V Data Exchange Service Stopped Hyper-V Guest Service Interface Stopped Hyper-V Guest Shutdown Service Stopped Hyper-V Heartbeat Service Stopped Hyper-V PowerShell Direct Service Stopped Hyper-V Remote Desktop Virtualization Service Stopped Hyper-V Time Synchronization Service Stopped Hyper-V Volume Shadow Copy Requestor Stopped Intel Optane Memory Service Stopped Intel RST HFC Disable Service Stopped Internet Connection Sharing (ICS) Stopped IP Translation Configuration Service Stopped IPsec Policy Agent Stopped KtmRm for Distributed Transaction Coordinator Stopped Language Experience Service Stopped Link-Layer Topology Discovery Mapper Stopped Local Profile Assistant Service Stopped MessagingService_2593b Stopped Microsoft Diagnostics Hub Standard Collector Service Stopped Microsoft Account Sign-in Assistant Stopped Microsoft iSCSI Initiator Service Stopped Microsoft Passport Stopped Microsoft Passport Container Stopped Microsoft Software Shadow Copy Provider Stopped Microsoft Storage Spaces SMP Stopped Microsoft Windows SMS Router Service. Stopped Natural Authentication Stopped Netlogon Stopped Network Connected Devices Auto-Setup Stopped Network Connectivity Assistant Stopped Optimize drives Stopped Parental Controls Stopped Peer Networking Grouping Stopped Performance Counter DLL Host Stopped Performance Logs & Alerts Stopped Phone Service Stopped PimIndexMaintenanceSvc_2593b Stopped Plug and Play Stopped PNRP Machine Name Publication Service Stopped Portable Device Enumerator Service Stopped Printer Extensions and Notifications Stopped PrintWorkflowUserSvc_2593b Stopped Problem Reports and Solutions Control Panel Support Stopped Quality Windows Audio Video Experience Stopped Recommended Troubleshooting Service Stopped Remote Access Auto Connection Manager Stopped Remote Desktop Configuration Stopped Remote Desktop Services Stopped Remote Desktop Services UserMode Port Redirector Stopped Remote Procedure Call (RPC) Locator Stopped Remote Registry Stopped Retail Demo Service Stopped Routing and Remote Access Stopped Secondary Logon Stopped Sensor Data Service Stopped Sensor Monitoring Service Stopped Sensor Service Stopped Shared PC Account Manager Stopped Smart Card Stopped Smart Card Device Enumeration Service Stopped Smart Card Removal Policy Stopped SNMP Trap Stopped Software Protection Stopped Spatial Data Service Stopped Spot Verifier Stopped Still Image Acquisition Events Stopped Storage Tiers Management Stopped UnistoreSvc_2593b Stopped UPnP Device Host Stopped UserDataSvc_2593b Stopped Virtual Disk Stopped Volume Shadow Copy Stopped Volumetric Audio Compositor Service Stopped WalletService Stopped WebClient Stopped Wi-Fi Direct Services Connection Manager Service Stopped Windows Camera Frame Server Stopped Windows Connect Now - Config Registrar Stopped Windows Defender Antivirus Network Inspection Service Stopped Windows Defender Antivirus Service Stopped Windows Encryption Provider Host Service Stopped Windows Error Reporting Service Stopped Windows Event Collector Stopped Windows Image Acquisition (WIA) Stopped Windows Insider Service Stopped Windows Installer Stopped Windows Management Service Stopped Windows Mixed Reality OpenXR Service Stopped Windows Mobile Hotspot Service Stopped Windows Perception Service Stopped Windows Perception Simulation Service Stopped Windows PushToInstall Service Stopped Windows Remote Management (WS-Management) Stopped Windows Time Stopped Windows Update Stopped Windows Update Medic Service Stopped Wired AutoConfig Stopped WMI Performance Adapter Stopped Workstation Stopped WWAN AutoConfig Stopped Xbox Accessory Management Service Stopped Xbox Live Auth Manager Stopped Xbox Live Game Save Stopped Xbox Live Networking Service Stopped xTendSoftAPService TimeZone TimeZone GMT -6:00 Hours Language English (United States) Location United States Format English (United States) Currency $ Date Format M/d/yyyy Time Format h:mm:ss tt Scheduler 8/1/2020 9:59 PM; GoogleUpdateTaskMachineCore 8/1/2020 9:59 PM; GoogleUpdateTaskMachineUA Hotfixes Installed 8/1/2020 Realtek Semiconductor Corp. - MEDIA - 6/18/2019 12:00:00 AM - 6.0.8734.1 Realtek Semiconductor Corp. MEDIA driver update released in June 2019 7/31/2020 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version 1.321.265.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 7/31/2020 NVIDIA - Display - 26.21.14.4223 NVIDIA Display driver update released in January 2020 7/31/2020 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version 1.321.239.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 7/29/2020 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version 1.321.137.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 7/20/2020 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version 1.319.1916.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 7/19/2020 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version 1.319.1782.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 7/19/2020 9PCWJKS4JSN1-RivetNetworks.KillerControlCenter 9PCWJKS4JSN1-1152921505690478965 7/19/2020 Rivet Networks LLC - SoftwareComponent - 5/22/2019 12:00:00 AM - 2.1.2914.0 Rivet Networks LLC SoftwareComponent driver update released in May 2019 7/18/2020 Intel Corporation - SCSIAdapter - 7/23/2019 12:00:00 AM - 17.5.3.1026 Intel Corporation SCSIAdapter driver update released in July 2019 7/18/2020 2020-07 Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 1909 for x64 (KB4565633) A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 7/18/2020 2020-06 Security Update for Adobe Flash Player for Windows 10 Version 1909 for x64-based Systems (KB4561600) A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 7/18/2020 Dell, Inc. - Firmware - 0.1.2.1 Dell, Inc. Firmware driver update released in March 2020 7/18/2020 Rivet - Net - 7/1/2019 12:00:00 AM - 10.36.701.2019 Rivet Net driver update released in July 2019 7/18/2020 Rivet Networks LLC - Extension - 2.1.3163.0 Rivet Networks LLC Extension driver update released in October 2019 7/18/2020 Windows Malicious Software Removal Tool x64 - v5.82 (KB890830) After the download, this tool runs one time to check your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps remove any infection that is found. If an infection is found, the tool will display a status report the next time that you start your computer. A new version of the tool will be offered every month. If you want to manually run the tool on your computer, you can download a copy from the Microsoft Download Center, or you can run an online version from microsoft.com. This tool is not a replacement for an antivirus product. To help protect your computer, you should use an antivirus product. 7/18/2020 2020-07 Cumulative Update for Windows 10 Version 1909 for x64-based Systems (KB4565483) Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. 7/18/2020 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version 1.319.1722.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 7/18/2020 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version 1.319.1719.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 7/18/2020 Update for Microsoft Defender Antivirus antimalware platform - KB4052623 (Version 4.18.2006.10) This package will update Microsoft Defender Antivirus antimalware platform’s components on the user machine. 7/18/2020 NVIDIA - Display - 26.21.14.4223 NVIDIA Display driver update released in January 2020 7/18/2020 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version 1.319.1706.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 7/18/2020 Realtek - SoftwareComponent - 6/13/2019 12:00:00 AM - 1.0.0.179 Realtek SoftwareComponent driver update released in June 2019 7/18/2020 Intel Corporation - SoftwareComponent - 2.7.100.2 Intel Corporation SoftwareComponent driver update released in March 2020 7/18/2020 A-Volute - SoftwareComponent - 5/23/2019 12:00:00 AM - 1.3.2.0 A-Volute SoftwareComponent driver update released in May 2019 7/18/2020 Realtek - SoftwareComponent - 6/17/2019 12:00:00 AM - 11.0.6000.700 Realtek SoftwareComponent driver update released in June 2019 7/18/2020 Realtek - SoftwareComponent - 6/19/2017 12:00:00 AM - 1.0.0.4 Realtek SoftwareComponent driver update released in June 2017 7/18/2020 Logitech - Other hardware - Logitech USB Input Device Logitech Other hardware software update released in September, 2016 7/18/2020 Intel - System - 4/4/2019 12:00:00 AM - 1914.12.0.1256 Intel System driver update released in April 2019 7/18/2020 INTEL - System - 7/18/1968 12:00:00 AM - 10.1.7.3 INTEL System driver update released in July 1968 7/18/2020 Intel Corporation - System - 2.7.100.2 Intel Corporation System driver update released in March 2020 7/18/2020 Cypress Semiconductor Corporation - UCMCLIENT - 5/15/2019 12:00:00 AM - 1.2.1.25 Cypress Semiconductor Corporation UCMCLIENT driver update released in May 2019 7/18/2020 INTEL - System - 7/18/1968 12:00:00 AM - 10.1.16.7 INTEL System driver update released in July 1968 7/18/2020 Realtek Semiconductor Corp. - Extension - 6/18/2019 12:00:00 AM - 6.0.8734.1 Realtek Semiconductor Corp. Extension driver update released in June 2019 7/18/2020 A-Volute - Extension - 6/12/2019 12:00:00 AM - 1.5.12.0 A-Volute Extension driver update released in June 2019 7/18/2020 Realtek Semiconductor Corp. - MEDIA - 6/18/2019 12:00:00 AM - 6.0.8734.1 Realtek Semiconductor Corp. MEDIA driver update released in June 2019 7/18/2020 9NF8H0H7WMLT-NVIDIACorp.NVIDIAControlPanel 9NF8H0H7WMLT-1152921505690536890 7/18/2020 INTEL - System - 7/18/1968 12:00:00 AM - 10.1.16.7 INTEL System driver update released in July 1968 7/18/2020 NVIDIA - Display - 26.21.14.4223 NVIDIA Display driver update released in January 2020 7/18/2020 Intel Corporation - Bluetooth - 21.50.0.1 Intel Corporation Bluetooth driver update released in September 2019 Not Installed 7/18/2020 Security Intelligence Update for Microsoft Defender Antivirus - KB2267602 (Version 1.319.1719.0) Installation Status Canceled Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. System Folders Application Data C:\ProgramData Cookies C:\Users\RA\AppData\Local\Microsoft\Windows\INetCookies Desktop C:\Users\RA\New folder Documents C:\Users\Public\Documents Fonts C:\Windows\Fonts Global Favorites C:\Users\RA\Favorites Internet History C:\Users\RA\AppData\Local\Microsoft\Windows\History Local Application Data C:\Users\RA\AppData\Local Music C:\Users\Public\Music Path for burning CD C:\Users\RA\AppData\Local\Microsoft\Windows\Burn\Burn Physical Desktop C:\Users\RA\New folder Pictures C:\Users\Public\Pictures Program Files C:\Program Files Public Desktop C:\Users\Public\Desktop Start Menu C:\ProgramData\Microsoft\Windows\Start Menu Start Menu Programs C:\ProgramData\Microsoft\Windows\Start Menu\Programs Startup C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup Templates C:\ProgramData\Microsoft\Windows\Templates Temporary Internet Files C:\Users\RA\AppData\Local\Microsoft\Windows\INetCache User Favorites C:\Users\RA\Favorites Videos C:\Users\Public\Videos Windows Directory C:\Windows Windows/System C:\Windows\system32 Process List aesm_service.exe Process ID 1636 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_bff7913eb62bbf90\aesm_service.exe Memory Usage 13 MB Peak Memory Usage 14 MB ApplicationFrameHost.exe Process ID 9716 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\ApplicationFrameHost.exe Memory Usage 35 MB Peak Memory Usage 36 MB audiodg.exe Process ID 2028 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\audiodg.exe Memory Usage 28 MB Peak Memory Usage 30 MB browser_broker.exe Process ID 9672 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\browser_broker.exe Memory Usage 30 MB Peak Memory Usage 33 MB chrome.exe Process ID 10324 User RA Domain DESKTOP-JV4G808 Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Memory Usage 31 MB Peak Memory Usage 31 MB chrome.exe Process ID 1804 User RA Domain DESKTOP-JV4G808 Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Memory Usage 68 MB Peak Memory Usage 69 MB chrome.exe Process ID 3116 User RA Domain DESKTOP-JV4G808 Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Memory Usage 6.97 MB Peak Memory Usage 6.98 MB chrome.exe Process ID 760 User RA Domain DESKTOP-JV4G808 Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Memory Usage 26 MB Peak Memory Usage 26 MB chrome.exe Process ID 2700 User RA Domain DESKTOP-JV4G808 Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Memory Usage 39 MB Peak Memory Usage 39 MB chrome.exe Process ID 2100 User RA Domain DESKTOP-JV4G808 Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Memory Usage 34 MB Peak Memory Usage 34 MB chrome.exe Process ID 10456 User RA Domain DESKTOP-JV4G808 Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Memory Usage 19 MB Peak Memory Usage 19 MB chrome.exe Process ID 9604 User RA Domain DESKTOP-JV4G808 Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Memory Usage 30 MB Peak Memory Usage 30 MB chrome.exe Process ID 7964 User RA Domain DESKTOP-JV4G808 Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Memory Usage 31 MB Peak Memory Usage 31 MB chrome.exe Process ID 4908 User RA Domain DESKTOP-JV4G808 Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Memory Usage 53 MB Peak Memory Usage 53 MB chrome.exe Process ID 4764 User RA Domain DESKTOP-JV4G808 Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Memory Usage 29 MB Peak Memory Usage 29 MB chrome.exe Process ID 9836 User RA Domain DESKTOP-JV4G808 Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Memory Usage 39 MB Peak Memory Usage 39 MB cmd.exe Process ID 3112 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\cmd.exe Memory Usage 5.17 MB Peak Memory Usage 6.80 MB conhost.exe Process ID 5748 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\conhost.exe Memory Usage 12 MB Peak Memory Usage 13 MB conhost.exe Process ID 11012 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\conhost.exe Memory Usage 21 MB Peak Memory Usage 21 MB conhost.exe Process ID 8796 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\conhost.exe Memory Usage 25 MB Peak Memory Usage 52 MB csrss.exe Process ID 824 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\csrss.exe Memory Usage 4.89 MB Peak Memory Usage 92 MB csrss.exe Process ID 724 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\csrss.exe Memory Usage 4.46 MB Peak Memory Usage 4.64 MB ctfmon.exe Process ID 3308 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\ctfmon.exe Memory Usage 16 MB Peak Memory Usage 16 MB DataExchangeHost.exe Process ID 7384 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\DataExchangeHost.exe Memory Usage 17 MB Peak Memory Usage 21 MB dllhost.exe Process ID 10896 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\dllhost.exe Memory Usage 100 MB Peak Memory Usage 108 MB dllhost.exe Process ID 6220 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\dllhost.exe Memory Usage 7.96 MB Peak Memory Usage 16 MB dllhost.exe Process ID 7800 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\dllhost.exe Memory Usage 17 MB Peak Memory Usage 18 MB dllhost.exe Process ID 1068 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\dllhost.exe Memory Usage 17 MB Peak Memory Usage 22 MB dwm.exe Process ID 1244 User DWM-1 Domain Window Manager Path C:\Windows\System32\dwm.exe Memory Usage 256 MB Peak Memory Usage 313 MB explorer.exe Process ID 6040 User RA Domain DESKTOP-JV4G808 Path C:\Windows\explorer.exe Memory Usage 197 MB Peak Memory Usage 204 MB fontdrvhost.exe Process ID 656 User UMFD-0 Domain Font Driver Host Path C:\Windows\System32\fontdrvhost.exe Memory Usage 2.98 MB Peak Memory Usage 3.13 MB fontdrvhost.exe Process ID 1152 User UMFD-1 Domain Font Driver Host Path C:\Windows\System32\fontdrvhost.exe Memory Usage 8.09 MB Peak Memory Usage 46 MB KillerNetworkService.exe Process ID 4308 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\drivers\RivetNetworks\Killer\KillerNetworkService.exe Memory Usage 119 MB Peak Memory Usage 119 MB LsaIso.exe Process ID 908 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\LsaIso.exe Memory Usage 2.87 MB Peak Memory Usage 2.89 MB lsass.exe Process ID 916 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\lsass.exe Memory Usage 31 MB Peak Memory Usage 34 MB MBAMService.exe Process ID 3852 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe Memory Usage 380 MB Peak Memory Usage 700 MB mbamtray.exe Process ID 9000 User RA Domain DESKTOP-JV4G808 Path C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe Memory Usage 43 MB Peak Memory Usage 43 MB Memory Compression Process ID 2416 User SYSTEM Domain NT AUTHORITY Memory Usage 12 KB Peak Memory Usage 3.51 MB MicrosoftEdge.exe Process ID 2532 User RA Domain DESKTOP-JV4G808 Path C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe Memory Usage 112 MB Peak Memory Usage 119 MB MicrosoftEdgeCP.exe Process ID 5436 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\MicrosoftEdgeCP.exe Memory Usage 26 MB Peak Memory Usage 26 MB MicrosoftEdgeCP.exe Process ID 2664 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\MicrosoftEdgeCP.exe Memory Usage 591 MB Peak Memory Usage 685 MB MicrosoftEdgeCP.exe Process ID 10828 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\MicrosoftEdgeCP.exe Memory Usage 26 MB Peak Memory Usage 26 MB MicrosoftEdgeCP.exe Process ID 6848 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\MicrosoftEdgeCP.exe Memory Usage 118 MB Peak Memory Usage 255 MB MicrosoftEdgeCP.exe Process ID 5760 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\MicrosoftEdgeCP.exe Memory Usage 863 MB Peak Memory Usage 1.06 GB MicrosoftEdgeCP.exe Process ID 3688 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\MicrosoftEdgeCP.exe Memory Usage 200 MB Peak Memory Usage 252 MB MicrosoftEdgeSH.exe Process ID 2848 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\MicrosoftEdgeSH.exe Memory Usage 23 MB Peak Memory Usage 40 MB mmc.exe Process ID 336 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\mmc.exe Memory Usage 16 MB Peak Memory Usage 26 MB mmc.exe Process ID 10656 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\mmc.exe Memory Usage 15 MB Peak Memory Usage 58 MB NahimicService.exe Process ID 4060 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\NahimicService.exe Memory Usage 10 MB Peak Memory Usage 11 MB notepad.exe Process ID 11176 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\notepad.exe Memory Usage 39 MB Peak Memory Usage 43 MB perfmon.exe Process ID 10520 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\perfmon.exe Memory Usage 225 MB Peak Memory Usage 272 MB PickerHost.exe Process ID 500 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\PickerHost.exe Memory Usage 41 MB Peak Memory Usage 46 MB powershell.exe Process ID 7612 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Memory Usage 124 MB Peak Memory Usage 187 MB Registry Process ID 144 User SYSTEM Domain NT AUTHORITY Memory Usage 70 MB Peak Memory Usage 105 MB RstMwService.exe Process ID 4076 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\iastorac.inf_amd64_ecb9604542bb4ba6\RstMwService.exe Memory Usage 8.07 MB Peak Memory Usage 8.30 MB RtkAudUService64.exe Process ID 9048 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\RtkAudUService64.exe Memory Usage 7.82 MB Peak Memory Usage 7.95 MB RtkAudUService64.exe Process ID 3176 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\RtkAudUService64.exe Memory Usage 9.40 MB Peak Memory Usage 11 MB RuntimeBroker.exe Process ID 6768 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 36 MB Peak Memory Usage 39 MB RuntimeBroker.exe Process ID 7192 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 31 MB Peak Memory Usage 32 MB RuntimeBroker.exe Process ID 9492 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 21 MB Peak Memory Usage 21 MB RuntimeBroker.exe Process ID 8924 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 23 MB Peak Memory Usage 28 MB RuntimeBroker.exe Process ID 9656 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 43 MB Peak Memory Usage 44 MB SearchFilterHost.exe Process ID 10460 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SearchFilterHost.exe Memory Usage 6.07 MB Peak Memory Usage 6.11 MB SearchIndexer.exe Process ID 752 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SearchIndexer.exe Memory Usage 46 MB Peak Memory Usage 66 MB SearchProtocolHost.exe Process ID 7780 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SearchProtocolHost.exe Memory Usage 13 MB Peak Memory Usage 13 MB SearchUI.exe Process ID 6976 User RA Domain DESKTOP-JV4G808 Path C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe Memory Usage 147 MB Peak Memory Usage 168 MB Secure System Process ID 72 User SYSTEM Domain NT AUTHORITY Memory Usage 88 KB Peak Memory Usage 124 KB SecurityHealthService.exe Process ID 7296 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SecurityHealthService.exe Memory Usage 16 MB Peak Memory Usage 19 MB services.exe Process ID 888 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\services.exe Memory Usage 9.89 MB Peak Memory Usage 15 MB SgrmBroker.exe Process ID 5020 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SgrmBroker.exe Memory Usage 6.33 MB Peak Memory Usage 8.21 MB ShellExperienceHost.exe Process ID 7036 User RA Domain DESKTOP-JV4G808 Path C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe Memory Usage 53 MB Peak Memory Usage 55 MB sihost.exe Process ID 2944 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\sihost.exe Memory Usage 29 MB Peak Memory Usage 29 MB smartscreen.exe Process ID 7128 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\smartscreen.exe Memory Usage 40 MB Peak Memory Usage 52 MB smss.exe Process ID 632 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\smss.exe Memory Usage 1.20 MB Peak Memory Usage 1.24 MB Speccy64.exe Process ID 268 User RA Domain DESKTOP-JV4G808 Path C:\Program Files\Speccy\Speccy64.exe Memory Usage 28 MB Peak Memory Usage 28 MB spoolsv.exe Process ID 3608 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\spoolsv.exe Memory Usage 14 MB Peak Memory Usage 14 MB StartMenuExperienceHost.exe Process ID 6448 User RA Domain DESKTOP-JV4G808 Path C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe Memory Usage 74 MB Peak Memory Usage 77 MB svchost.exe Process ID 4040 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.74 MB Peak Memory Usage 8.04 MB svchost.exe Process ID 4052 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 32 MB Peak Memory Usage 47 MB svchost.exe Process ID 4068 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 13 MB svchost.exe Process ID 4084 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 12 MB svchost.exe Process ID 4092 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 20 MB Peak Memory Usage 21 MB svchost.exe Process ID 3408 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.40 MB Peak Memory Usage 5.58 MB svchost.exe Process ID 4564 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.70 MB Peak Memory Usage 8.89 MB svchost.exe Process ID 4588 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 16 MB Peak Memory Usage 16 MB svchost.exe Process ID 4624 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.69 MB Peak Memory Usage 15 MB svchost.exe Process ID 5096 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 12 MB svchost.exe Process ID 6136 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\svchost.exe Memory Usage 24 MB Peak Memory Usage 24 MB svchost.exe Process ID 2260 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\svchost.exe Memory Usage 25 MB Peak Memory Usage 25 MB svchost.exe Process ID 9952 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.75 MB Peak Memory Usage 7.06 MB svchost.exe Process ID 10124 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.23 MB Peak Memory Usage 5.43 MB svchost.exe Process ID 4692 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 12 MB svchost.exe Process ID 9512 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 20 MB Peak Memory Usage 22 MB svchost.exe Process ID 9548 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 19 MB Peak Memory Usage 19 MB svchost.exe Process ID 9844 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.35 MB Peak Memory Usage 14 MB svchost.exe Process ID 8708 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 14 MB svchost.exe Process ID 3988 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.33 MB Peak Memory Usage 8.59 MB svchost.exe Process ID 1928 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.76 MB Peak Memory Usage 6.95 MB svchost.exe Process ID 2472 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.32 MB Peak Memory Usage 9.60 MB svchost.exe Process ID 1112 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 11 MB svchost.exe Process ID 3096 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.15 MB Peak Memory Usage 7.26 MB svchost.exe Process ID 6788 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 15 MB Peak Memory Usage 39 MB svchost.exe Process ID 7292 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 11 MB svchost.exe Process ID 9072 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 10 MB Peak Memory Usage 11 MB svchost.exe Process ID 1524 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 12 MB svchost.exe Process ID 11184 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 19 MB svchost.exe Process ID 716 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.30 MB Peak Memory Usage 9.57 MB svchost.exe Process ID 9396 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 10 MB Peak Memory Usage 10 MB svchost.exe Process ID 9224 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 15 MB Peak Memory Usage 19 MB svchost.exe Process ID 1592 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 10 MB Peak Memory Usage 10 MB svchost.exe Process ID 6548 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.52 MB Peak Memory Usage 10 MB svchost.exe Process ID 104 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 26 MB Peak Memory Usage 40 MB svchost.exe Process ID 10136 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.35 MB Peak Memory Usage 7.48 MB svchost.exe Process ID 704 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 15 MB Peak Memory Usage 15 MB svchost.exe Process ID 1048 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.11 MB Peak Memory Usage 8.60 MB svchost.exe Process ID 1392 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.07 MB Peak Memory Usage 5.31 MB svchost.exe Process ID 1528 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 17 MB Peak Memory Usage 20 MB svchost.exe Process ID 1536 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 15 MB Peak Memory Usage 15 MB svchost.exe Process ID 7880 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.29 MB Peak Memory Usage 7.39 MB svchost.exe Process ID 1584 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 12 MB svchost.exe Process ID 1608 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 11 MB svchost.exe Process ID 1724 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.98 MB Peak Memory Usage 6.00 MB svchost.exe Process ID 1732 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.63 MB Peak Memory Usage 8.75 MB svchost.exe Process ID 1772 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.85 MB Peak Memory Usage 6.04 MB svchost.exe Process ID 1824 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.78 MB Peak Memory Usage 9.95 MB svchost.exe Process ID 1892 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.54 MB Peak Memory Usage 7.83 MB svchost.exe Process ID 2040 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 11 MB svchost.exe Process ID 1472 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.79 MB Peak Memory Usage 7.12 MB svchost.exe Process ID 1448 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 12 MB svchost.exe Process ID 2064 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.96 MB Peak Memory Usage 9.03 MB svchost.exe Process ID 2184 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.14 MB Peak Memory Usage 9.21 MB svchost.exe Process ID 2328 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.59 MB Peak Memory Usage 5.77 MB svchost.exe Process ID 2336 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 13 MB Peak Memory Usage 20 MB svchost.exe Process ID 2344 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.61 MB Peak Memory Usage 7.77 MB svchost.exe Process ID 2456 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.89 MB Peak Memory Usage 8.22 MB svchost.exe Process ID 2632 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.40 MB Peak Memory Usage 6.65 MB svchost.exe Process ID 2488 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.64 MB Peak Memory Usage 7.93 MB svchost.exe Process ID 10728 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.95 MB Peak Memory Usage 6.02 MB svchost.exe Process ID 2496 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.78 MB Peak Memory Usage 12 MB svchost.exe Process ID 2612 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 18 MB Peak Memory Usage 20 MB svchost.exe Process ID 2976 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\svchost.exe Memory Usage 24 MB Peak Memory Usage 26 MB svchost.exe Process ID 624 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 14 MB Peak Memory Usage 18 MB svchost.exe Process ID 2668 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.30 MB Peak Memory Usage 8.13 MB svchost.exe Process ID 3192 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 15 MB Peak Memory Usage 18 MB svchost.exe Process ID 3268 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 13 MB Peak Memory Usage 14 MB svchost.exe Process ID 3344 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.55 MB Peak Memory Usage 10.00 MB svchost.exe Process ID 3352 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.29 MB Peak Memory Usage 7.99 MB svchost.exe Process ID 3360 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 15 MB Peak Memory Usage 15 MB svchost.exe Process ID 3428 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 14 MB Peak Memory Usage 15 MB svchost.exe Process ID 3648 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 16 MB Peak Memory Usage 19 MB svchost.exe Process ID 3868 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.53 MB Peak Memory Usage 7.73 MB svchost.exe Process ID 4016 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 19 MB Peak Memory Usage 76 MB svchost.exe Process ID 4024 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 33 MB Peak Memory Usage 91 MB svchost.exe Process ID 5536 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.36 MB Peak Memory Usage 6.37 MB svchost.exe Process ID 8872 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.64 MB Peak Memory Usage 5.68 MB svchost.exe Process ID 6680 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 14 MB Peak Memory Usage 14 MB System Process ID 4 Memory Usage 3.32 MB Peak Memory Usage 16 MB System Idle Process Process ID 0 SystemSettings.exe Process ID 7984 User RA Domain DESKTOP-JV4G808 Path C:\Windows\ImmersiveControlPanel\SystemSettings.exe Memory Usage 484 KB Peak Memory Usage 80 MB SystemSettingsAdminFlows.exe Process ID 172 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\SystemSettingsAdminFlows.exe Memory Usage 12 MB Peak Memory Usage 12 MB taskhostw.exe Process ID 3164 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\taskhostw.exe Memory Usage 19 MB Peak Memory Usage 24 MB Taskmgr.exe Process ID 10808 User RA Domain DESKTOP-JV4G808 Path C:\Windows\System32\Taskmgr.exe Memory Usage 66 MB Peak Memory Usage 78 MB TiWorker.exe Process ID 9916 User SYSTEM Domain NT AUTHORITY Path C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.18362.957_none_5f2e9e6258ea82f2\TiWorker.exe Memory Usage 29 MB Peak Memory Usage 41 MB TrustedInstaller.exe Process ID 2536 User SYSTEM Domain NT AUTHORITY Path C:\Windows\servicing\TrustedInstaller.exe Memory Usage 7.03 MB Peak Memory Usage 7.16 MB Windows.WARP.JITService.exe Process ID 5872 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\Windows.WARP.JITService.exe Memory Usage 7.11 MB Peak Memory Usage 7.36 MB Windows.WARP.JITService.exe Process ID 9412 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\Windows.WARP.JITService.exe Memory Usage 7.79 MB Peak Memory Usage 8.04 MB Windows.WARP.JITService.exe Process ID 10936 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\Windows.WARP.JITService.exe Memory Usage 7.65 MB Peak Memory Usage 8.27 MB Windows.WARP.JITService.exe Process ID 10440 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\Windows.WARP.JITService.exe Memory Usage 7.96 MB Peak Memory Usage 8.33 MB Windows.WARP.JITService.exe Process ID 8376 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\Windows.WARP.JITService.exe Memory Usage 8.81 MB Peak Memory Usage 9.03 MB WindowsInternal.ComposableShell.Experiences.TextInput.InputApp.exe Process ID 5548 User RA Domain DESKTOP-JV4G808 Path C:\Windows\SystemApps\InputApp_cw5n1h2txyewy\WindowsInternal.ComposableShell.Experiences.TextInput.InputApp.exe Memory Usage 38 MB Peak Memory Usage 38 MB wininit.exe Process ID 816 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\wininit.exe Memory Usage 6.13 MB Peak Memory Usage 6.42 MB winlogon.exe Process ID 1096 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\winlogon.exe Memory Usage 11 MB Peak Memory Usage 20 MB WmiPrvSE.exe Process ID 3808 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\wbem\WmiPrvSE.exe Memory Usage 12 MB Peak Memory Usage 12 MB WmiPrvSE.exe Process ID 10588 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\wbem\WmiPrvSE.exe Memory Usage 8.43 MB Peak Memory Usage 8.43 MB xTendUtility.exe Process ID 5712 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\drivers\RivetNetworks\Killer\xTendUtility.exe Memory Usage 7.15 MB Peak Memory Usage 7.50 MB xTendUtilityService.exe Process ID 5028 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\drivers\RivetNetworks\Killer\xTendUtilityService.exe Memory Usage 16 MB Peak Memory Usage 16 MB Security Options Accounts: Administrator account status Disabled Accounts: Block Microsoft accounts Not Defined Accounts: Guest account status Disabled Accounts: Limit local account use of blank passwords to console logon only Enabled Accounts: Rename administrator account Administrator Accounts: Rename guest account Guest Audit: Audit the access of global system objects Disabled Audit: Audit the use of Backup and Restore privilege Disabled Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings Not Defined Audit: Shut down system immediately if unable to log security audits Disabled DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined Devices: Allow undock without having to log on Enabled Devices: Allowed to format and eject removable media Not Defined Devices: Prevent users from installing printer drivers Disabled Devices: Restrict CD-ROM access to locally logged-on user only Not Defined Devices: Restrict floppy access to locally logged-on user only Not Defined Domain controller: Allow server operators to schedule tasks Not Defined Domain controller: LDAP server channel binding token requirements Not Defined Domain controller: LDAP server signing requirements Not Defined Domain controller: Refuse machine account password changes Not Defined Domain member: Digitally encrypt or sign secure channel data (always) Enabled Domain member: Digitally encrypt secure channel data (when possible) Enabled Domain member: Digitally sign secure channel data (when possible) Enabled Domain member: Disable machine account password changes Disabled Domain member: Maximum machine account password age 30 days Domain member: Require strong (Windows 2000 or later) session key Enabled Interactive logon: Display user information when the session is locked Not Defined Interactive logon: Do not require CTRL+ALT+DEL Not Defined Interactive logon: Don't display last signed-in Disabled Interactive logon: Don't display username at sign-in Not Defined Interactive logon: Machine account lockout threshold Not Defined Interactive logon: Machine inactivity limit Not Defined Interactive logon: Message text for users attempting to log on Interactive logon: Message title for users attempting to log on Interactive logon: Number of previous logons to cache (in case domain controller is not available) 10 logons Interactive logon: Prompt user to change password before expiration 5 days Interactive logon: Require Domain Controller authentication to unlock workstation Disabled Interactive logon: Require Windows Hello for Business or smart card Disabled Interactive logon: Smart card removal behavior No Action Microsoft network client: Digitally sign communications (always) Disabled Microsoft network client: Digitally sign communications (if server agrees) Enabled Microsoft network client: Send unencrypted password to third-party SMB servers Disabled Microsoft network server: Amount of idle time required before suspending session 15 minutes Microsoft network server: Attempt S4U2Self to obtain claim information Not Defined Microsoft network server: Digitally sign communications (always) Disabled Microsoft network server: Digitally sign communications (if client agrees) Disabled Microsoft network server: Disconnect clients when logon hours expire Enabled Microsoft network server: Server SPN target name validation level Not Defined Network access: Do not allow anonymous enumeration of SAM accounts Enabled Network access: Do not allow anonymous enumeration of SAM accounts and shares Disabled Network access: Do not allow storage of passwords and credentials for network authentication Disabled Network access: Let Everyone permissions apply to anonymous users Disabled Network access: Named Pipes that can be accessed anonymously Network access: Remotely accessible registry paths System\CurrentControlSet\Control\ProductOptions,System\CurrentControlSet\Control\Server Applications,Software\Microsoft\Windows NT\CurrentVersion Network access: Remotely accessible registry paths and sub-paths System\CurrentControlSet\Control\Print\Printers,System\CurrentControlSet\Services\Eventlog,Software\Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion\Print,Software\Microsoft\Windows NT\CurrentVersion\Windows,System\CurrentControlSet\Control\ContentIndex,System\CurrentControlSet\Control\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration,Software\Microsoft\Windows NT\CurrentVersion\Perflib,System\CurrentControlSet\Services\SysmonLog Network access: Restrict anonymous access to Named Pipes and Shares Enabled Network access: Restrict clients allowed to make remote calls to SAM Network access: Shares that can be accessed anonymously Not Defined Network access: Sharing and security model for local accounts Classic - local users authenticate as themselves Network security: Allow Local System to use computer identity for NTLM Not Defined Network security: Allow LocalSystem NULL session fallback Not Defined Network security: Allow PKU2U authentication requests to this computer to use online identities. Not Defined Network security: Configure encryption types allowed for Kerberos Not Defined Network security: Do not store LAN Manager hash value on next password change Enabled Network security: Force logoff when logon hours expire Disabled Network security: LAN Manager authentication level Not Defined Network security: LDAP client signing requirements Negotiate signing Network security: Minimum session security for NTLM SSP based (including secure RPC) clients Require 128-bit encryption Network security: Minimum session security for NTLM SSP based (including secure RPC) servers Require 128-bit encryption Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication Not Defined Network security: Restrict NTLM: Add server exceptions in this domain Not Defined Network security: Restrict NTLM: Audit Incoming NTLM Traffic Not Defined Network security: Restrict NTLM: Audit NTLM authentication in this domain Not Defined Network security: Restrict NTLM: Incoming NTLM traffic Not Defined Network security: Restrict NTLM: NTLM authentication in this domain Not Defined Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers Not Defined Recovery console: Allow automatic administrative logon Disabled Recovery console: Allow floppy copy and access to all drives and all folders Disabled Shutdown: Allow system to be shut down without having to log on Enabled Shutdown: Clear virtual memory pagefile Disabled System cryptography: Force strong key protection for user keys stored on the computer Not Defined System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing Disabled System objects: Require case insensitivity for non-Windows subsystems Enabled System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) Enabled System settings: Optional subsystems System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies Disabled User Account Control: Admin Approval Mode for the Built-in Administrator account Not Defined User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop Disabled User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode Prompt for consent for non-Windows binaries User Account Control: Behavior of the elevation prompt for standard users Prompt for credentials User Account Control: Detect application installations and prompt for elevation Enabled User Account Control: Only elevate executables that are signed and validated Disabled User Account Control: Only elevate UIAccess applications that are installed in secure locations Enabled User Account Control: Run all administrators in Admin Approval Mode Enabled User Account Control: Switch to the secure desktop when prompting for elevation Enabled User Account Control: Virtualize file and registry write failures to per-user locations Enabled Device Tree ACPI x64-based PC Microsoft ACPI-Compliant System ACPI Fan ACPI Fan ACPI Fan ACPI Fan ACPI Fan ACPI Fixed Feature Button ACPI Power Button ACPI Sleep Button ACPI Thermal Zone Cypress UCM Client Peripheral Driver Cypress UCM Client Peripheral Driver Intel Core i7-9700 CPU @ 3.00GHz Intel Core i7-9700 CPU @ 3.00GHz Intel Core i7-9700 CPU @ 3.00GHz Intel Core i7-9700 CPU @ 3.00GHz Intel Core i7-9700 CPU @ 3.00GHz Intel Core i7-9700 CPU @ 3.00GHz Intel Core i7-9700 CPU @ 3.00GHz Intel Core i7-9700 CPU @ 3.00GHz Intel Power Engine Plug-in Microsoft Windows Management Interface for ACPI Microsoft Windows Management Interface for ACPI Microsoft Windows Management Interface for ACPI Microsoft Windows Management Interface for ACPI Microsoft Windows Management Interface for ACPI Microsoft Windows Management Interface for ACPI Microsoft Windows Management Interface for ACPI Motherboard resources Trusted Platform Module 2.0 PCI Express Root Complex Intel Gaussian Mixture Model - 1911 Intel Management Engine Interface Intel Serial IO GPIO Host Controller - INT3450 Intel Serial IO I2C Host Controller - A368 Intel SMBus - A323 Intel SPI (flash) Controller - A324 Intel Thermal Subsystem - A379 Motherboard resources Motherboard resources Motherboard resources Motherboard resources Motherboard resources PCI standard host CPU bridge PCI standard RAM Controller PCI-to-PCI Bridge Unknown Device Unknown Device Unknown Device High Definition Audio Controller Unknown Device Intel(R) USB 3.1 eXtensible Host Controller - 1.10 (Microsoft) USB Root Hub (USB 3.0) Generic SuperSpeed USB Hub Generic USB Hub USB Composite Device USB Input Device HID Keyboard Device USB Input Device HID Keyboard Device HID-compliant consumer control device HID-compliant device HID-compliant device HID-compliant system controller USB Input Device HID-compliant mouse USB Composite Device USB Input Device HID Keyboard Device USB Input Device HID-compliant consumer control device HID-compliant mouse HID-compliant system controller Unknown Device USB Input Device Unknown Device Unknown Device Unknown Device Intel(R) Chipset SATA/PCIe RST Premium Controller NVMe KBG40ZNS256G NVM ST1000DM010-2EP102 Intel(R) PCI Express Root Port #5 - A33C Killer E2500 Gigabit Ethernet Controller Killer Networking Software Intel(R) 300 Series Chipset Family LPC Controller (H370) - A304 Communications Port (COM1) High precision event timer Motherboard resources Motherboard resources Motherboard resources Numeric data processor Programmable interrupt controller System CMOS/real time clock System timer High Definition Audio Controller Realtek(R) Audio A-Volute Nh3 Audio Effects Component Realtek Asio Component Realtek Audio Effects Component Realtek Audio Universal Service Realtek Hardware Support Application Speakers (Realtek Audio) Intel(R) Software Guard Extensions Device Intel Software Guard Extensions Software Microsoft UEFI-Compliant System System Firmware 1.2.1 CPU Intel Core i7 Cores 8 Threads 8 Name Intel Core i7 Code Name Kaby Lake Technology 14nm Specification Intel Core i7-9700 CPU @ 3.00GHz Family 6 Extended Family 6 Model E Extended Model 9E Stepping D Instructions MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, Intel 64, NX, AES, AVX, AVX2, FMA3 Virtualization Not supported Hyperthreading Not supported Caches L1 Data Cache Size 8 x 32 KBytes L1 Instructions Cache Size 8 x 32 KBytes L2 Unified Cache Size 8 x 256 KBytes L3 Unified Cache Size 12288 KBytes Cores Core 0 Core Speed 3000.1 MHz Multiplier x -1.0 Threads APIC ID: 0 Core 1 Core Speed 3000.1 MHz Multiplier x -1.0 Threads APIC ID: 2 Core 2 Core Speed 3000.2 MHz Multiplier x -1.0 Threads APIC ID: 4 Core 3 Core Speed 3000.1 MHz Multiplier x -1.0 Threads APIC ID: 6 Core 4 Core Speed 3000.1 MHz Multiplier x -1.0 Threads APIC ID: 8 Core 5 Core Speed 3000.1 MHz Multiplier x -1.0 Threads APIC ID: 10 Core 6 Core Speed 3000.1 MHz Multiplier x -1.0 Threads APIC ID: 12 Core 7 Core Speed 3000.0 MHz Multiplier x -1.0 Threads APIC ID: 14 RAM Memory Size 32590 MBytes Physical Memory Memory Usage 22 % Total Physical 32 GB Available Physical 25 GB Total Virtual 37 GB Available Virtual 30 GB SPD Number Of SPD Modules 0 Motherboard Manufacturer Dell Inc. Model 0DXJD9 (U3E1) Version A01 BIOS Brand Dell Inc. Version 1.2.1 Date 3/20/2020 PCI Data Slot PCI-E Slot Type PCI-E Slot Usage Available Data lanes x1 Slot Designation SLOT1 Characteristics 3.3V, PME Slot Number 0 Slot PCI-E Gen 3 Slot Type PCI-E Gen 3 Slot Usage In Use Data lanes x16 Slot Designation SLOT2 Characteristics 3.3V, PME Slot Number 1 Slot PCI-E Gen 2 x16 Slot Type PCI-E Gen 2 x16 Slot Usage Available Data lanes x4 Slot Designation SLOT4 Characteristics 3.3V, PME Slot Number 2 Slot Unknown Slot Type Unknown Slot Usage In Use Data lanes x4 Slot Designation SLOT5_M.2 Characteristics 3.3V, PME Slot Number 3 Slot Unknown Slot Type Unknown Slot Usage Available Data lanes x1 Slot Designation SLOT6_M.2 Characteristics 3.3V, PME Slot Number 4 Graphics Monitor Name DELL U2417H on Microsoft Basic Display Driver Current Resolution 1920x1080 pixels Work Resolution 1920x1040 pixels State Enabled, Primary Monitor Width 1920 Monitor Height 1080 Monitor BPP 32 bits per pixel Monitor Frequency 64 Hz Device \\.\DISPLAY5\Monitor0 Storage Hard drives ST1000DM010-2EP102 Manufacturer Seagate Heads 16 Cylinders 121,601 Tracks 31,008,255 Sectors 1,953,520,065 SATA type SATA-III 6.0Gb/s Device type Fixed ATA Standard ATA8-ACS Serial Number ZN1DCSBN Firmware Version Number 1001 LBA Size 48-bit LBA Power On Count 107 times Power On Time 8.3 days Speed 7200 RPM Features S.M.A.R.T., APM, NCQ Max. Transfer Mode SATA III 6.0Gb/s Used Transfer Mode SATA III 6.0Gb/s Interface SATA Capacity 931 GB Real size 1,000,204,886,016 bytes RAID Type None S.M.A.R.T Status Good Temperature 26 °C Temperature Range OK (less than 50 °C) S.M.A.R.T attributes 01 Attribute name Read Error Rate Real value 0 Current 82 Worst 63 Threshold 6 Raw Value 000A9B4B26 Status Good 03 Attribute name Spin-Up Time Real value 0 ms Current 97 Worst 97 Threshold 0 Raw Value 0000000000 Status Good 04 Attribute name Start/Stop Count Real value 187 Current 100 Worst 100 Threshold 20 Raw Value 00000000BB Status Good 05 Attribute name Reallocated Sectors Count Real value 0 Current 100 Worst 100 Threshold 10 Raw Value 0000000000 Status Good 07 Attribute name Seek Error Rate Real value 0 Current 64 Worst 60 Threshold 45 Raw Value 00002D4B3F Status Good 09 Attribute name Power-On Hours (POH) Real value 8d 8h Current 100 Worst 100 Threshold 0 Raw Value 00000000C8 Status Good 0A Attribute name Spin Retry Count Real value 0 Current 100 Worst 100 Threshold 97 Raw Value 0000000000 Status Good 0C Attribute name Device Power Cycle Count Real value 107 Current 100 Worst 100 Threshold 20 Raw Value 000000006B Status Good B7 Attribute name SATA Downshift Error Count Real value 0 Current 100 Worst 100 Threshold 0 Raw Value 0000000000 Status Good B8 Attribute name End-to-End error / IOEDC Real value 0 Current 100 Worst 100 Threshold 99 Raw Value 0000000000 Status Good BB Attribute name Reported Uncorrectable Errors Real value 0 Current 100 Worst 100 Threshold 0 Raw Value 0000000000 Status Good BC Attribute name Command Timeout Real value 0 Current 100 Worst 100 Threshold 0 Raw Value 0000000000 Status Good BD Attribute name High Fly Writes (WDC) Real value 0 Current 100 Worst 100 Threshold 0 Raw Value 0000000000 Status Good BE Attribute name Airflow Temperature Real value 24 °C Current 76 Worst 64 Threshold 40 Raw Value 001F130018 Status Good C1 Attribute name Load/Unload Cycle Count Real value 189 Current 100 Worst 100 Threshold 0 Raw Value 00000000BD Status Good C2 Attribute name Temperature Real value 24 °C Current 24 Worst 19 Threshold 0 Raw Value 0000000018 Status Good C3 Attribute name Hardware ECC Recovered Real value 0 Current 5 Worst 3 Threshold 0 Raw Value 000A9B4B26 Status Good C5 Attribute name Current Pending Sector Count Real value 0 Current 100 Worst 100 Threshold 0 Raw Value 0000000000 Status Good C6 Attribute name Uncorrectable Sector Count Real value 0 Current 100 Worst 100 Threshold 0 Raw Value 0000000000 Status Good C7 Attribute name UltraDMA CRC Error Count Real value 0 Current 200 Worst 200 Threshold 0 Raw Value 0000000000 Status Good F0 Attribute name Head Flying Hours Real value 7d 9h Current 100 Worst 253 Threshold 0 Raw Value 00000000B1 Status Good F1 Attribute name Total LBAs Written Real value 227,841,600 Current 100 Worst 253 Threshold 0 Raw Value 000D949640 Status Good F2 Attribute name Total LBAs Read Real value 265,294,658 Current 100 Worst 253 Threshold 0 Raw Value 000FD01342 Status Good Partition 0 Partition ID Disk #0, Partition #0 Size 931 GB NVMe KBG40ZNS256G NVM (SSD) Serial Number 20CPC8E4PTLL Firmware Version Number 10410104 Interface RAID Capacity 238 GB Real size 256,060,514,304 bytes RAID Type Software RAID S.M.A.R.T S.M.A.R.T not supported Partition 0 Partition ID Disk #1, Partition #0 Size 529 MB Partition 1 Partition ID Disk #1, Partition #1 File System FAT32 Volume Serial Number 5265FB21 Size 95 MB Used Space 26.2 MB (27%) Free Space 68 MB (73%) Partition 2 Partition ID Disk #1, Partition #2 Disk Letter C: File System NTFS Volume Serial Number E267A9E5 Size 237 GB Used Space 42 GB (18%) Free Space 194 GB (82%) Optical Drives No optical disk drives detected Audio Sound Card Realtek Audio Peripherals HID Keyboard Device Device Kind Keyboard Device Name HID Keyboard Device Vendor ECHELON Location USB Input Device Driver Date 6-21-2006 Version 10.0.18362.1 File C:\Windows\system32\DRIVERS\kbdhid.sys File C:\Windows\system32\DRIVERS\kbdclass.sys HID Keyboard Device Device Kind Keyboard Device Name HID Keyboard Device Vendor Logitech Location USB Input Device Driver Date 6-21-2006 Version 10.0.18362.1 File C:\Windows\system32\DRIVERS\kbdhid.sys File C:\Windows\system32\DRIVERS\kbdclass.sys HID Keyboard Device Device Kind Keyboard Device Name HID Keyboard Device Vendor ECHELON Location USB Input Device Driver Date 6-21-2006 Version 10.0.18362.1 File C:\Windows\system32\DRIVERS\kbdhid.sys File C:\Windows\system32\DRIVERS\kbdclass.sys HID-compliant mouse Device Kind Mouse Device Name HID-compliant mouse Vendor Logitech Location USB Input Device Driver Date 6-21-2006 Version 10.0.18362.1 File C:\Windows\system32\DRIVERS\mouhid.sys File C:\Windows\system32\DRIVERS\mouclass.sys HID-compliant mouse Device Kind Mouse Device Name HID-compliant mouse Vendor ECHELON Location USB Input Device Driver Date 6-21-2006 Version 10.0.18362.1 File C:\Windows\system32\DRIVERS\mouhid.sys File C:\Windows\system32\DRIVERS\mouclass.sys Printers Network You are connected to the internet Connected through Killer E2500 Gigabit Ethernet Controller IP Address 192.168.1.7 Subnet mask 255.255.255.0 Gateway server 192.168.1.1 Preferred DNS server 192.168.1.1 DHCP Enabled DHCP server 192.168.1.1 External IP Address 140.82.139.190 Adapter Type Ethernet NetBIOS over TCP/IP Enabled via DHCP NETBIOS Node Type Hybrid node Link Speed 27.6 KBps Computer Name NetBIOS Name DNS Name DESKTOP-JV4G808 Membership Stand-alone Remote Desktop Disabled Console State Active Domain DESKTOP-JV4G808 WinInet Info LAN Connection Local system uses a local area network to connect to the Internet Local system has RAS to connect to the Internet Wi-Fi Info Wi-Fi not enabled WinHTTPInfo WinHTTPSessionProxyType No proxy Session Proxy Session Proxy Bypass Connect Retries 5 Connect Timeout (ms) 60,000 HTTP Version HTTP 1.1 Max Connects Per 1.0 Servers INFINITE Max Connects Per Servers INFINITE Max HTTP automatic redirects 10 Max HTTP status continue 10 Send Timeout (ms) 30,000 IEProxy Auto Detect No IEProxy Auto Config IEProxy IEProxy Bypass Default Proxy Config Access Type No proxy Default Config Proxy Default Config Proxy Bypass Sharing and Discovery Network Discovery Disabled File and Printer Sharing Disabled File and printer sharing service Enabled Simple File Sharing Enabled Administrative Shares Enabled Network access: Sharing and security model for local accounts Classic - local users authenticate as themselves Adapters List Enabled Killer E2500 Gigabit Ethernet Controller Connection Name Ethernet NetBIOS over TCPIP Yes DHCP enabled Yes MAC Address A4-BB-6D-B6-A8-21 IP Address 192.168.1.7 Subnet mask 255.255.255.0 Gateway server 192.168.1.1 DHCP 192.168.1.1 DNS Server 192.168.1.1 Network Shares No network shares Current TCP Connections C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (760) Local 192.168.1.7:52717 ESTABLISHED Remote 35.186.235.23:80 (Querying... ) (HTTP) Local 192.168.1.7:52718 ESTABLISHED Remote 216.58.194.72:80 (Querying... ) (HTTP) Local 192.168.1.7:52719 ESTABLISHED Remote 216.58.194.72:443 (Querying... ) (HTTPS) Local 192.168.1.7:52720 ESTABLISHED Remote 216.58.194.35:443 (Querying... ) (HTTPS) Local 192.168.1.7:52722 ESTABLISHED Remote 172.217.14.174:443 (Querying... ) (HTTPS) Local 192.168.1.7:52712 ESTABLISHED Remote 151.101.2.202:80 (Querying... ) (HTTP) Local 192.168.1.7:52723 ESTABLISHED Remote 216.58.194.46:443 (Querying... ) (HTTPS) Local 192.168.1.7:52724 ESTABLISHED Remote 216.58.194.67:443 (Querying... ) (HTTPS) Local 192.168.1.7:52725 ESTABLISHED Remote 172.217.6.129:443 (Querying... ) (HTTPS) Local 192.168.1.7:52726 ESTABLISHED Remote 216.58.194.130:443 (Querying... ) (HTTPS) Local 192.168.1.7:52727 ESTABLISHED Remote 172.217.1.230:443 (Querying... ) (HTTPS) Local 192.168.1.7:52728 ESTABLISHED Remote 172.217.12.38:443 (Querying... ) (HTTPS) Local 192.168.1.7:52730 ESTABLISHED Remote 172.217.1.131:443 (Querying... ) (HTTPS) Local 192.168.1.7:52731 SYN-SENT Remote 172.217.14.174:443 (Querying... ) (HTTPS) Local 192.168.1.7:52732 SYN-SENT Remote 172.217.14.162:443 (Querying... ) (HTTPS) Local 192.168.1.7:52733 SYN-SENT Remote 172.217.12.78:443 (Querying... ) (HTTPS) Local 192.168.1.7:52734 SYN-SENT Remote 172.217.12.74:443 (Querying... ) (HTTPS) Local 192.168.1.7:52706 ESTABLISHED Remote 172.217.9.163:443 (Querying... ) (HTTPS) Local 192.168.1.7:52707 ESTABLISHED Remote 172.217.14.164:80 (Querying... ) (HTTP) Local 192.168.1.7:52708 ESTABLISHED Remote 172.217.14.164:80 (Querying... ) (HTTP) Local 192.168.1.7:52710 ESTABLISHED Remote 172.217.14.164:443 (Querying... ) (HTTPS) Local 192.168.1.7:52711 ESTABLISHED Remote 151.101.2.202:80 (Querying... ) (HTTP) Local 192.168.1.7:52729 FIN-WAIT-1 Remote 216.58.194.67:443 (Querying... ) (HTTPS) Local 192.168.1.7:52713 ESTABLISHED Remote 172.217.9.174:443 (Querying... ) (HTTPS) Local 192.168.1.7:52714 ESTABLISHED Remote 172.217.12.78:443 (Querying... ) (HTTPS) Local 192.168.1.7:52715 ESTABLISHED Remote 216.58.194.109:443 (Querying... ) (HTTPS) Local 192.168.1.7:52716 ESTABLISHED Remote 164.58.87.15:443 (Querying... ) (HTTPS) C:\Windows\System32\MicrosoftEdgeCP.exe (5760) Local 192.168.1.7:52684 ESTABLISHED Remote 184.26.61.105:443 (Querying... ) (HTTPS) Local 192.168.1.7:52685 ESTABLISHED Remote 184.26.61.105:443 (Querying... ) (HTTPS) Local 192.168.1.7:52687 ESTABLISHED Remote 184.26.61.105:443 (Querying... ) (HTTPS) Local 192.168.1.7:52688 ESTABLISHED Remote 184.26.61.105:443 (Querying... ) (HTTPS) Local 192.168.1.7:52697 CLOSE-WAIT Remote 3.21.62.78:443 (Querying... ) (HTTPS) Local 192.168.1.7:52704 ESTABLISHED Remote 172.217.6.162:443 (Querying... ) (HTTPS) Local 192.168.1.7:52705 ESTABLISHED Remote 172.217.6.162:443 (Querying... ) (HTTPS) lsass.exe (916) Local 0.0.0.0:49664 LISTEN MBAMService.exe (3852) Local 192.168.1.7:49855 CLOSE-WAIT Remote 143.204.166.93:443 (Querying... ) (HTTPS) Local 127.0.0.1:43227 LISTEN services.exe (888) Local 0.0.0.0:49671 LISTEN spoolsv.exe (3608) Local 0.0.0.0:49668 LISTEN svchost.exe (1528) Local 0.0.0.0:49666 LISTEN svchost.exe (1536) Local 0.0.0.0:49667 LISTEN svchost.exe (3360) Local 0.0.0.0:5040 LISTEN svchost.exe (4092) Local 192.168.1.7:49884 ESTABLISHED Remote 52.242.211.89:443 (Querying... ) (HTTPS) svchost.exe (704) Local 0.0.0.0:135 (DCE) LISTEN System Process Local 192.168.1.7:51484 TIME-WAIT Remote 193.122.128.135:443 (Querying... ) (HTTPS) Local 192.168.1.7:52635 TIME-WAIT Remote 23.65.11.27:80 (Querying... ) (HTTP) Local 192.168.1.7:52649 TIME-WAIT Remote 152.199.5.184:443 (Querying... ) (HTTPS) Local 192.168.1.7:52637 TIME-WAIT Remote 216.58.194.46:80 (Querying... ) (HTTP) Local 192.168.1.7:52654 TIME-WAIT Remote 192.184.69.149:443 (Querying... ) (HTTPS) Local 192.168.1.7:52655 TIME-WAIT Remote 192.184.69.149:443 (Querying... ) (HTTPS) Local 192.168.1.7:52656 TIME-WAIT Remote 104.18.12.5:443 (Querying... ) (HTTPS) Local 192.168.1.7:52657 TIME-WAIT Remote 104.18.12.5:443 (Querying... ) (HTTPS) Local 192.168.1.7:52679 TIME-WAIT Remote 108.177.9.154:443 (Querying... ) (HTTPS) Local 192.168.1.7:52680 TIME-WAIT Remote 108.177.9.154:443 (Querying... ) (HTTPS) Local 192.168.1.7:52694 TIME-WAIT Remote 172.217.9.2:443 (Querying... ) (HTTPS) Local 192.168.1.7:52638 TIME-WAIT Remote 172.217.2.238:80 (Querying... ) (HTTP) Local 192.168.1.7:52693 TIME-WAIT Remote 172.217.9.2:443 (Querying... ) (HTTPS) Local 192.168.1.7:52692 TIME-WAIT Remote 216.58.193.134:443 (Querying... ) (HTTPS) Local 192.168.1.7:51216 TIME-WAIT Remote 172.217.1.226:443 (Querying... ) (HTTPS) Local 192.168.1.7:51265 TIME-WAIT Remote 216.58.193.130:443 (Querying... ) (HTTPS) Local 192.168.1.7:51287 TIME-WAIT Remote 172.217.1.130:443 (Querying... ) (HTTPS) Local 192.168.1.7:51482 TIME-WAIT Remote 150.136.156.92:443 (Querying... ) (HTTPS) Local 192.168.1.7:52691 TIME-WAIT Remote 216.58.193.134:443 (Querying... ) (HTTPS) Local 192.168.1.7:51486 TIME-WAIT Remote 34.98.64.218:443 (Querying... ) (HTTPS) Local 192.168.1.7:51492 TIME-WAIT Remote 34.98.64.218:443 (Querying... ) (HTTPS) Local 192.168.1.7:51700 TIME-WAIT Remote 172.217.6.162:443 (Querying... ) (HTTPS) Local 192.168.1.7:51777 TIME-WAIT Remote 216.58.206.99:443 (Querying... ) (HTTPS) Local 192.168.1.7:52134 TIME-WAIT Remote 204.237.133.122:443 (Querying... ) (HTTPS) Local 192.168.1.7:52173 TIME-WAIT Remote 104.36.113.17:443 (Querying... ) (HTTPS) Local 192.168.1.7:52524 TIME-WAIT Remote 146.20.132.133:443 (Querying... ) (HTTPS) Local 192.168.1.7:52528 TIME-WAIT Remote 146.20.132.116:443 (Querying... ) (HTTPS) Local 192.168.1.7:52567 TIME-WAIT Remote 23.54.187.27:80 (Querying... ) (HTTP) Local 192.168.1.7:52568 TIME-WAIT Remote 23.54.187.27:80 (Querying... ) (HTTP) Local 192.168.1.7:52634 TIME-WAIT Remote 72.21.91.29:80 (Querying... ) (HTTP) System Process Local 0.0.0.0:445 (Windows shares) LISTEN Local 0.0.0.0:5357 LISTEN Local 192.168.1.7:139 (NetBIOS session service) LISTEN wininit.exe (816) Local 0.0.0.0:49665 LISTEN Generated with Speccy v1.32.740