Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 14:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe
Resource
win7-20240705-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe
Resource
win10v2004-20240709-en
0 signatures
150 seconds
General
-
Target
41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe
-
Size
17KB
-
MD5
41fc8d2013bb5f15968fcc4f8cb48f76
-
SHA1
3f29e244eb7122827e02a675fd56b356ec95cf08
-
SHA256
0e9996124fd897dfa6cbdd7844b993795856793be89e6af8f5a3bc382a16fba2
-
SHA512
b3fdb833a48c333006d8d45b489689eba84355161a5677ae68096fa7b85604937ffab97ec5683a97b19dc6c1c21cd96bb3399f4da9ca58c6339b19d9f84c54cf
-
SSDEEP
384:cKJPVHpv5qat4kD+59chtnN6qRleTtKfE51ELAKzn1M:bNYayu+sXnQaeTCEvoBn+
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 6964 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2212 daemon.exe 1712 daemon.exe 2204 daemon.exe 2336 daemon.exe 2980 daemon.exe 3060 daemon.exe 1360 daemon.exe 1648 daemon.exe 2988 daemon.exe 3036 daemon.exe 2516 daemon.exe 1076 daemon.exe 2624 daemon.exe 2684 daemon.exe 2536 daemon.exe 2660 daemon.exe 3000 daemon.exe 2568 daemon.exe 2776 daemon.exe 2196 daemon.exe 2576 daemon.exe 2464 daemon.exe 2412 daemon.exe 2420 daemon.exe 2428 daemon.exe 1132 daemon.exe 2148 daemon.exe 1340 daemon.exe 2136 daemon.exe 2476 daemon.exe 2708 daemon.exe 1180 daemon.exe 1112 daemon.exe 1292 daemon.exe 1596 daemon.exe 1872 daemon.exe 1476 daemon.exe 888 daemon.exe 1168 daemon.exe 1208 daemon.exe 2596 daemon.exe 2220 daemon.exe 2304 daemon.exe 2012 daemon.exe 1336 daemon.exe 1216 daemon.exe 1128 daemon.exe 724 daemon.exe 1388 daemon.exe 584 daemon.exe 2032 daemon.exe 2036 daemon.exe 1088 daemon.exe 2040 daemon.exe 2592 daemon.exe 2020 daemon.exe 2004 daemon.exe 2780 daemon.exe 2916 daemon.exe 2892 daemon.exe 2900 daemon.exe 2796 daemon.exe 2764 daemon.exe 2640 daemon.exe -
Loads dropped DLL 64 IoCs
pid Process 1720 41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe 1720 41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe 2212 daemon.exe 2212 daemon.exe 1712 daemon.exe 1712 daemon.exe 2204 daemon.exe 2204 daemon.exe 2336 daemon.exe 2336 daemon.exe 2980 daemon.exe 2980 daemon.exe 3060 daemon.exe 3060 daemon.exe 1360 daemon.exe 1360 daemon.exe 1648 daemon.exe 1648 daemon.exe 2988 daemon.exe 2988 daemon.exe 3036 daemon.exe 3036 daemon.exe 2516 daemon.exe 2516 daemon.exe 1076 daemon.exe 1076 daemon.exe 2624 daemon.exe 2624 daemon.exe 2684 daemon.exe 2684 daemon.exe 2536 daemon.exe 2536 daemon.exe 2660 daemon.exe 2660 daemon.exe 3000 daemon.exe 3000 daemon.exe 2568 daemon.exe 2568 daemon.exe 2776 daemon.exe 2776 daemon.exe 2196 daemon.exe 2196 daemon.exe 2576 daemon.exe 2576 daemon.exe 2464 daemon.exe 2464 daemon.exe 2412 daemon.exe 2412 daemon.exe 2420 daemon.exe 2420 daemon.exe 2428 daemon.exe 2428 daemon.exe 1132 daemon.exe 1132 daemon.exe 2148 daemon.exe 2148 daemon.exe 1340 daemon.exe 1340 daemon.exe 2136 daemon.exe 2136 daemon.exe 2476 daemon.exe 2476 daemon.exe 2708 daemon.exe 2708 daemon.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File created C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe daemon.exe File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found File opened for modification C:\Windows\SysWOW64\dllcache\cache\daemon.exe Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1720 41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe 2212 daemon.exe 1712 daemon.exe 2204 daemon.exe 2336 daemon.exe 2980 daemon.exe 3060 daemon.exe 1360 daemon.exe 1648 daemon.exe 2988 daemon.exe 3036 daemon.exe 2516 daemon.exe 1076 daemon.exe 2624 daemon.exe 2684 daemon.exe 2536 daemon.exe 2660 daemon.exe 3000 daemon.exe 2568 daemon.exe 2776 daemon.exe 2196 daemon.exe 2576 daemon.exe 2464 daemon.exe 2412 daemon.exe 2420 daemon.exe 2428 daemon.exe 1132 daemon.exe 2148 daemon.exe 1340 daemon.exe 2136 daemon.exe 2476 daemon.exe 2708 daemon.exe 1180 daemon.exe 1112 daemon.exe 1292 daemon.exe 1596 daemon.exe 1872 daemon.exe 1476 daemon.exe 888 daemon.exe 1168 daemon.exe 1208 daemon.exe 2596 daemon.exe 2220 daemon.exe 2304 daemon.exe 2012 daemon.exe 1336 daemon.exe 1216 daemon.exe 1128 daemon.exe 724 daemon.exe 1388 daemon.exe 584 daemon.exe 2032 daemon.exe 2036 daemon.exe 1088 daemon.exe 2040 daemon.exe 2592 daemon.exe 2020 daemon.exe 2004 daemon.exe 2780 daemon.exe 2916 daemon.exe 2892 daemon.exe 2900 daemon.exe 2796 daemon.exe 2764 daemon.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1720 41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2212 daemon.exe Token: SeIncBasePriorityPrivilege 1712 daemon.exe Token: SeIncBasePriorityPrivilege 2204 daemon.exe Token: SeIncBasePriorityPrivilege 2336 daemon.exe Token: SeIncBasePriorityPrivilege 2980 daemon.exe Token: SeIncBasePriorityPrivilege 3060 daemon.exe Token: SeIncBasePriorityPrivilege 1360 daemon.exe Token: SeIncBasePriorityPrivilege 1648 daemon.exe Token: SeIncBasePriorityPrivilege 2988 daemon.exe Token: SeIncBasePriorityPrivilege 3036 daemon.exe Token: SeIncBasePriorityPrivilege 2516 daemon.exe Token: SeIncBasePriorityPrivilege 1076 daemon.exe Token: SeIncBasePriorityPrivilege 2624 daemon.exe Token: SeIncBasePriorityPrivilege 2684 daemon.exe Token: SeIncBasePriorityPrivilege 2536 daemon.exe Token: SeIncBasePriorityPrivilege 2660 daemon.exe Token: SeIncBasePriorityPrivilege 3000 daemon.exe Token: SeIncBasePriorityPrivilege 2568 daemon.exe Token: SeIncBasePriorityPrivilege 2776 daemon.exe Token: SeIncBasePriorityPrivilege 2196 daemon.exe Token: SeIncBasePriorityPrivilege 2576 daemon.exe Token: SeIncBasePriorityPrivilege 2464 daemon.exe Token: SeIncBasePriorityPrivilege 2412 daemon.exe Token: SeIncBasePriorityPrivilege 2420 daemon.exe Token: SeIncBasePriorityPrivilege 2428 daemon.exe Token: SeIncBasePriorityPrivilege 1132 daemon.exe Token: SeIncBasePriorityPrivilege 2148 daemon.exe Token: SeIncBasePriorityPrivilege 1340 daemon.exe Token: SeIncBasePriorityPrivilege 2136 daemon.exe Token: SeIncBasePriorityPrivilege 2476 daemon.exe Token: SeIncBasePriorityPrivilege 2708 daemon.exe Token: SeIncBasePriorityPrivilege 1180 daemon.exe Token: SeIncBasePriorityPrivilege 1112 daemon.exe Token: SeIncBasePriorityPrivilege 1292 daemon.exe Token: SeIncBasePriorityPrivilege 1596 daemon.exe Token: SeIncBasePriorityPrivilege 1872 daemon.exe Token: SeIncBasePriorityPrivilege 1476 daemon.exe Token: SeIncBasePriorityPrivilege 888 daemon.exe Token: SeIncBasePriorityPrivilege 1168 daemon.exe Token: SeIncBasePriorityPrivilege 1208 daemon.exe Token: SeIncBasePriorityPrivilege 2596 daemon.exe Token: SeIncBasePriorityPrivilege 2220 daemon.exe Token: SeIncBasePriorityPrivilege 2304 daemon.exe Token: SeIncBasePriorityPrivilege 2012 daemon.exe Token: SeIncBasePriorityPrivilege 1336 daemon.exe Token: SeIncBasePriorityPrivilege 1216 daemon.exe Token: SeIncBasePriorityPrivilege 1128 daemon.exe Token: SeIncBasePriorityPrivilege 724 daemon.exe Token: SeIncBasePriorityPrivilege 1388 daemon.exe Token: SeIncBasePriorityPrivilege 584 daemon.exe Token: SeIncBasePriorityPrivilege 2032 daemon.exe Token: SeIncBasePriorityPrivilege 2036 daemon.exe Token: SeIncBasePriorityPrivilege 1088 daemon.exe Token: SeIncBasePriorityPrivilege 2040 daemon.exe Token: SeIncBasePriorityPrivilege 2592 daemon.exe Token: SeIncBasePriorityPrivilege 2020 daemon.exe Token: SeIncBasePriorityPrivilege 2004 daemon.exe Token: SeIncBasePriorityPrivilege 2780 daemon.exe Token: SeIncBasePriorityPrivilege 2916 daemon.exe Token: SeIncBasePriorityPrivilege 2892 daemon.exe Token: SeIncBasePriorityPrivilege 2900 daemon.exe Token: SeIncBasePriorityPrivilege 2796 daemon.exe Token: SeIncBasePriorityPrivilege 2764 daemon.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1720 41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe 1720 41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe 2212 daemon.exe 2212 daemon.exe 1712 daemon.exe 1712 daemon.exe 2204 daemon.exe 2204 daemon.exe 2336 daemon.exe 2336 daemon.exe 2980 daemon.exe 2980 daemon.exe 3060 daemon.exe 3060 daemon.exe 1360 daemon.exe 1360 daemon.exe 1648 daemon.exe 1648 daemon.exe 2988 daemon.exe 2988 daemon.exe 3036 daemon.exe 3036 daemon.exe 2516 daemon.exe 2516 daemon.exe 1076 daemon.exe 1076 daemon.exe 2624 daemon.exe 2624 daemon.exe 2684 daemon.exe 2684 daemon.exe 2536 daemon.exe 2536 daemon.exe 2660 daemon.exe 2660 daemon.exe 3000 daemon.exe 3000 daemon.exe 2568 daemon.exe 2568 daemon.exe 2776 daemon.exe 2776 daemon.exe 2196 daemon.exe 2196 daemon.exe 2576 daemon.exe 2576 daemon.exe 2464 daemon.exe 2464 daemon.exe 2412 daemon.exe 2412 daemon.exe 2420 daemon.exe 2420 daemon.exe 2428 daemon.exe 2428 daemon.exe 1132 daemon.exe 1132 daemon.exe 2148 daemon.exe 2148 daemon.exe 1340 daemon.exe 1340 daemon.exe 2136 daemon.exe 2136 daemon.exe 2476 daemon.exe 2476 daemon.exe 2708 daemon.exe 2708 daemon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2212 1720 41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2212 1720 41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2212 1720 41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2212 1720 41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe 30 PID 2212 wrote to memory of 1712 2212 daemon.exe 31 PID 2212 wrote to memory of 1712 2212 daemon.exe 31 PID 2212 wrote to memory of 1712 2212 daemon.exe 31 PID 2212 wrote to memory of 1712 2212 daemon.exe 31 PID 1712 wrote to memory of 2204 1712 daemon.exe 32 PID 1712 wrote to memory of 2204 1712 daemon.exe 32 PID 1712 wrote to memory of 2204 1712 daemon.exe 32 PID 1712 wrote to memory of 2204 1712 daemon.exe 32 PID 2204 wrote to memory of 2336 2204 daemon.exe 33 PID 2204 wrote to memory of 2336 2204 daemon.exe 33 PID 2204 wrote to memory of 2336 2204 daemon.exe 33 PID 2204 wrote to memory of 2336 2204 daemon.exe 33 PID 2336 wrote to memory of 2980 2336 daemon.exe 34 PID 2336 wrote to memory of 2980 2336 daemon.exe 34 PID 2336 wrote to memory of 2980 2336 daemon.exe 34 PID 2336 wrote to memory of 2980 2336 daemon.exe 34 PID 2980 wrote to memory of 3060 2980 daemon.exe 35 PID 2980 wrote to memory of 3060 2980 daemon.exe 35 PID 2980 wrote to memory of 3060 2980 daemon.exe 35 PID 2980 wrote to memory of 3060 2980 daemon.exe 35 PID 3060 wrote to memory of 1360 3060 daemon.exe 36 PID 3060 wrote to memory of 1360 3060 daemon.exe 36 PID 3060 wrote to memory of 1360 3060 daemon.exe 36 PID 3060 wrote to memory of 1360 3060 daemon.exe 36 PID 1360 wrote to memory of 1648 1360 daemon.exe 37 PID 1360 wrote to memory of 1648 1360 daemon.exe 37 PID 1360 wrote to memory of 1648 1360 daemon.exe 37 PID 1360 wrote to memory of 1648 1360 daemon.exe 37 PID 1648 wrote to memory of 2988 1648 daemon.exe 38 PID 1648 wrote to memory of 2988 1648 daemon.exe 38 PID 1648 wrote to memory of 2988 1648 daemon.exe 38 PID 1648 wrote to memory of 2988 1648 daemon.exe 38 PID 2988 wrote to memory of 3036 2988 daemon.exe 39 PID 2988 wrote to memory of 3036 2988 daemon.exe 39 PID 2988 wrote to memory of 3036 2988 daemon.exe 39 PID 2988 wrote to memory of 3036 2988 daemon.exe 39 PID 3036 wrote to memory of 2516 3036 daemon.exe 40 PID 3036 wrote to memory of 2516 3036 daemon.exe 40 PID 3036 wrote to memory of 2516 3036 daemon.exe 40 PID 3036 wrote to memory of 2516 3036 daemon.exe 40 PID 2516 wrote to memory of 1076 2516 daemon.exe 41 PID 2516 wrote to memory of 1076 2516 daemon.exe 41 PID 2516 wrote to memory of 1076 2516 daemon.exe 41 PID 2516 wrote to memory of 1076 2516 daemon.exe 41 PID 1076 wrote to memory of 2624 1076 daemon.exe 42 PID 1076 wrote to memory of 2624 1076 daemon.exe 42 PID 1076 wrote to memory of 2624 1076 daemon.exe 42 PID 1076 wrote to memory of 2624 1076 daemon.exe 42 PID 2624 wrote to memory of 2684 2624 daemon.exe 43 PID 2624 wrote to memory of 2684 2624 daemon.exe 43 PID 2624 wrote to memory of 2684 2624 daemon.exe 43 PID 2624 wrote to memory of 2684 2624 daemon.exe 43 PID 2684 wrote to memory of 2536 2684 daemon.exe 44 PID 2684 wrote to memory of 2536 2684 daemon.exe 44 PID 2684 wrote to memory of 2536 2684 daemon.exe 44 PID 2684 wrote to memory of 2536 2684 daemon.exe 44 PID 2536 wrote to memory of 2660 2536 daemon.exe 45 PID 2536 wrote to memory of 2660 2536 daemon.exe 45 PID 2536 wrote to memory of 2660 2536 daemon.exe 45 PID 2536 wrote to memory of 2660 2536 daemon.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41fc8d2013bb5f15968fcc4f8cb48f76_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1132 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2476 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1128 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:724 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:584 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe54⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe64⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe65⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe66⤵PID:2904
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe67⤵PID:2896
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe68⤵PID:1932
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe69⤵PID:2504
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe70⤵PID:1696
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe71⤵PID:2632
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe72⤵PID:1936
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe73⤵PID:1904
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe74⤵PID:2240
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe75⤵PID:2248
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe76⤵PID:2116
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe77⤵PID:2448
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe78⤵PID:2260
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe79⤵PID:1692
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe80⤵PID:2100
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe81⤵PID:408
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe82⤵PID:2736
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe83⤵
- Drops file in System32 directory
PID:2716 -
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe84⤵PID:348
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe85⤵PID:1140
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe86⤵PID:296
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe87⤵PID:2584
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe88⤵PID:1424
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe89⤵PID:1672
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe90⤵PID:960
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe91⤵PID:1288
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe92⤵PID:1044
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe93⤵PID:1812
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe94⤵PID:2832
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe95⤵PID:900
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe96⤵PID:1004
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe97⤵PID:2272
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe98⤵PID:612
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe99⤵PID:1800
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe100⤵PID:880
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe101⤵PID:2084
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe102⤵PID:528
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe103⤵PID:376
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe104⤵PID:1520
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe105⤵PID:1400
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe106⤵PID:2236
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe107⤵PID:1104
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe108⤵PID:2724
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe109⤵PID:264
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe110⤵PID:3056
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe111⤵PID:536
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe112⤵PID:2264
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe113⤵PID:1756
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe114⤵PID:1536
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe115⤵PID:1920
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe116⤵PID:1084
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe117⤵PID:2856
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe118⤵PID:2836
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe119⤵PID:2860
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe120⤵PID:2848
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe121⤵PID:2852
-
C:\Windows\SysWOW64\dllcache\cache\daemon.exeC:\Windows\system32\dllcache\cache\daemon.exe122⤵PID:2356
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-