Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:06
Static task
static1
Behavioral task
behavioral1
Sample
770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe
Resource
win10v2004-20220812-en
General
-
Target
770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe
-
Size
54KB
-
MD5
9cb80e012124b9b49f3c27b1cf4d6dd1
-
SHA1
fa55e5f168961f2978222a7e872fe012a37e5fe9
-
SHA256
770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670
-
SHA512
07d82ccf0b5a385d18fde0382873da0facd951d4f33ee420930a6f073e52c23ee29bc80e33f805ea8d3df93e8d1ab3958b9e63b3d77904071b298b7ced1ab70f
-
SSDEEP
1536:5E027/dpXuKPlCVS1we+EQvro7flW3vr3YI6GeG:5Pg/dp+KFqe7aro7d6l
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
TSTheme.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exeC:\\Users\\Admin\\AppData\\Roaming\\appconf32.exe," TSTheme.exe -
Deletes itself 1 IoCs
Processes:
TSTheme.exepid process 1476 TSTheme.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
Processes:
TSTheme.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" TSTheme.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
Processes:
TSTheme.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" TSTheme.exe -
Processes:
TSTheme.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main TSTheme.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exeTSTheme.exepid process 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe 1476 TSTheme.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exeTSTheme.exedescription pid process target process PID 904 wrote to memory of 1476 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe TSTheme.exe PID 904 wrote to memory of 1476 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe TSTheme.exe PID 904 wrote to memory of 1476 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe TSTheme.exe PID 904 wrote to memory of 1476 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe TSTheme.exe PID 904 wrote to memory of 1476 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe TSTheme.exe PID 904 wrote to memory of 1476 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe TSTheme.exe PID 904 wrote to memory of 1476 904 770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe TSTheme.exe PID 1476 wrote to memory of 588 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 588 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 588 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 588 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1684 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1684 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1684 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1684 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1700 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1700 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1700 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1700 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1708 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1708 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1708 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1708 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1252 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1252 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1252 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1252 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 760 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 760 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 760 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 760 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1832 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1832 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1832 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1832 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1676 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1676 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1676 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1676 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1584 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1584 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1584 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1584 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1196 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1196 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1196 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1196 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 844 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 844 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 844 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 844 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 876 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 876 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 876 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 876 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 596 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 596 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 596 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 596 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1920 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1920 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1920 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1920 1476 TSTheme.exe svchost.exe PID 1476 wrote to memory of 1760 1476 TSTheme.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe"C:\Users\Admin\AppData\Local\Temp\770cf0c47d145762552b395689dc294a1d5c4b7973801641e015722e478bc670.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\TSTheme.exeC:\Windows\system32\TSTheme.exe2⤵
- Modifies WinLogon for persistence
- Deletes itself
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:588
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1684
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1700
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1708
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1252
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:760
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1832
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1676
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1584
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1196
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:844
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:876
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:596
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1920
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1760
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1884
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:580
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1528
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2040
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1928
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1468
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1072
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:316
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2032
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2036
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2044
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:932
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:544
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1184
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:856
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1672
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1764
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1628
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:704
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:996
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1580
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1704
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1464
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1936
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1460
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:904
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1368
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1512
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:836
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1564
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1516
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2016
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:608
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1916
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:672
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1536
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1392
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1572
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1000
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:840
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1152
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1616
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1100
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1448
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1632
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1952
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:872
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1188
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1888
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1032
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1904
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1956
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:272
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1604
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1396
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:808
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:592
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1716
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:108
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2056
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2064
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2072
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2080
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2088
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2096
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2104
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2112
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2120
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2128
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2136
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2144
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2152
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2160
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2168
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2176
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2184
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2192
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2200
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2208
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2216
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2224
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2232
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2240
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2248
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2256
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2264
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2276
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2284
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2292
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2300
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2308
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2316
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2328
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2336
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2344
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2352
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2360
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2368
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2376
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2384
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2392
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2400
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2408
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2416
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2424
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2436
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2444
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2452
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2460
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2472
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2480
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2488
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2496
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2504
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2516
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2524
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2532
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2540
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2548
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2556
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2564
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2572
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2580
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2588
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2596
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2604
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2612
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2620
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2628
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2636
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2644
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2652
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2660
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2668