Process PID CPU Description Company Name
System Idle Process 0 95.45
Interrupts n/a Hardware Interrupts
DPCs n/a Deferred Procedure Calls
System 4
SMSS.EXE 564 Windows NT Session Manager Microsoft Corporation
CSRSS.EXE 640 Client Server Runtime Process Microsoft Corporation
WINLOGON.EXE 668 Windows NT Logon Application Microsoft Corporation
SERVICES.EXE 720 3.03 Services and Controller app Microsoft Corporation
ATI2EVXX.EXE 880 ATI External Event Utility EXE Module ATI Technologies Inc.
SVCHOST.EXE 892 Generic Host Process for Win32 Services Microsoft Corporation
TIMPlatform.exe 528 TIMPlatform tencent
AgentSvr.exe 3172 Microsoft Agent Server Microsoft Corporation
SVCHOST.EXE 972 Generic Host Process for Win32 Services Microsoft Corporation
SVCHOST.EXE 1068 Generic Host Process for Win32 Services Microsoft Corporation
SVCHOST.EXE 1124 Generic Host Process for Win32 Services Microsoft Corporation
SVCHOST.EXE 1280 Generic Host Process for Win32 Services Microsoft Corporation
SPOOLSV.EXE 1536 Spooler SubSystem App Microsoft Corporation
CCenter.exe 1772 CCenter rising
RavMonD.exe 1808 RavMon Beijing Rising Technology Co., Ltd.
RavStub.exe 456 Rising Rav Stub Beijing Rising Technology Co., Ltd.
SVCHOST.EXE 1924 Generic Host Process for Win32 Services Microsoft Corporation
ALG.EXE 644 Application Layer Gateway Service Microsoft Corporation
LSASS.EXE 732 LSA Shell (Export Version) Microsoft Corporation
EXPLORER.EXE 1632 Windows Explorer Microsoft Corporation
SysExplr.exe 1384
RavMon.exe 1312 RavMon Rising realtime monitor Beijing Rising Technology Co., Ltd.
RavTimer.exe 1392 RavTimer Beijing Rising Technology Co., Ltd.
YLive.exe 1476 YLive
yassistse.exe 1296 AssistSetting Yahoo!
CTFMON.EXE 1432 CTF Loader Microsoft Corporation
QQ.exe 1756 QQ TENCENT
QQPet.exe 252 QQ宠物 腾讯公司
iexplore.exe 2924 Internet Explorer Microsoft Corporation
Thunder.exe 3092 Thunder Networking Technologies,LTD
RsAgent.exe 2808 RsAgent Application Beijing Rising Technology Co., Ltd.
procexp.exe 3348 1.52 Sysinternals Process Explorer Sysinternals
Process: Pid: 720
Type Name
Desktop \Default
Directory \Windows
Directory \BaseNamed
Objects
Directory \KnownDlls
Event \BaseNamed
Objects\DINPUTWINMM
Event \BaseNamed
Objects\SC_AutoStartComplete
Event \BaseNamed
Objects\SvcctrlStartEvent_A3752DX
Event \BaseNamed
Objects\ScNetDrvMsg
Event \BaseNamed
Objects\WBEM_ESS_OPEN_FOR_BUSINESS
Event \BaseNamed
Objects\PnP_No_Pending_Install_Events
Event \BaseNamed
Objects\userenv: User Profile setup event
File \Device\KsecDD
File C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9
File \Device\NamedPipe\ntsvcs
File \Device\NamedPipe\ntsvcs
File \Device\NamedPipe\scerpc
File \Device\NamedPipe\scerpc
File \Device\NamedPipe\net\NtControlPipe1
File \Device\NamedPipe\net\NtControlPipe2
File \Device\NamedPipe\net\NtControlPipe3
File \Device\NamedPipe\net\NtControlPipe3
File C:\WINDOWS\system32\config\AppEvent.Evt
File C:\WINDOWS\system32\config\SecEvent.Evt
File C:\WINDOWS\system32\config\SysEvent.Evt
File \Device\NamedPipe\net\NtControlPipe4
File \Device\NamedPipe\net\NtControlPipe5
File \Device\NamedPipe\net\NtControlPipe0
File \Device\NamedPipe\net\NtControlPipe6
File \Device\NamedPipe\net\NtControlPipe7
File \Device\NamedPipe\net\NtControlPipe8
File \Device\NamedPipe\net\NtControlPipe11
File \Device\NamedPipe\net\NtControlPipe10
File \Device\NamedPipe\net\NtControlPipe12
File \Device\NamedPipe\ntsvcs
File \Device\NamedPipe\PIPE_EVENTROOT\CIMV2SCM EVENT PROVIDER
File \Device\NamedPipe\net\NtControlPipe13
File C:\WINDOWS\system32\
Key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32
Key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32
Key HKLM\SYSTEM\ControlSet001\Control\NetworkProvider\Order
Key HKLM
Key HKLM\SYSTEM\ControlSet001\Control\ServiceGroupOrder
Key HKU\S-1-5-19
Key HKLM\SYSTEM\ControlSet001\Control\ServiceCurrent
Key HKLM\SYSTEM\ControlSet001\Services\Eventlog
Key HKLM\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName
Key HKU
Key HKU\S-1-5-20
Key HKU\.DEFAULT
Key HKU\S-1-5-20
Key HKLM\SYSTEM\ControlSet001\Control\Nls\Locale
Key HKU\S-1-5-19
Key HKLM\SYSTEM\ControlSet001\Control\Nls\Locale\Alternate Sorts
Key HKLM\SYSTEM\ControlSet001\Control\Nls\Language Groups
Key HKLM\SYSTEM\ControlSet001\Services
Key HKLM\SYSTEM\ControlSet001\Enum
Key HKLM\SYSTEM\ControlSet001\Control\Class
Key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PerHwIdStorage
KeyedEvent \Kernel
Objects\CritSecOutOfMemoryEvent
Mutant \BaseNamed
Objects\SHIMLIB_LOG_MUTEX
Mutant \BaseNamed
Objects\ShimCacheMutex
Mutant \BaseNamed
Objects\PnP_Init_Mutex
Port \RPC Control\ntsvcs
Port \ErrorLogPort
Process (880)
Process SVCHOST.EXE(892)
Process SVCHOST.EXE(972)
Process (1068)
Process SVCHOST.EXE(1124)
Process SVCHOST.EXE(1280)
Process SPOOLSV.EXE(1536)
Process CCenter.exe(1772)
Process RavMonD.exe(1808)
Process (1924)
Process ALG.EXE(644)
Section \BaseNamed
Objects\ShimSharedMemory
Section \BaseNamed
Objects\mc2IInjT$2d0
Semaphore \BaseNamed
Objects\shell.{A48F1A32-A340-11D1-BC6B-00A0C90312E1}
Thread (720): 784
Thread (720): 792
Thread (720): 796
Thread (720): 860
Thread (720): 864
Thread (720): 868
Thread (720): 876
Thread (720): 852
Thread (720): 908
Thread (720): 960
Thread (720): 1572
Thread (720): 1140
Thread (720): 1768
Thread (720): 1892
Thread (720): 1136
Thread (720): 404
Thread (720): 424
Thread (720): 416
Token NT AUTHORITY\NETWORK SERVICE
Token NT AUTHORITY\LOCAL SERVICE
Token NT AUTHORITY\NETWORK SERVICE
Token 0D4AFEEE17EB4C4\p
Token NT AUTHORITY\LOCAL SERVICE
WindowStation \Windows\WindowStations\Service-0x0-3e7$
WindowStation \Windows\WindowStations\Service-0x0-3e7$
有病毒吗