Analysis
-
max time kernel
104s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2025, 06:30
Behavioral task
behavioral1
Sample
b5aa0a354a2b0f7a3688c9ed024e2f04.exe
Resource
win7-20240903-en
15 signatures
150 seconds
General
-
Target
b5aa0a354a2b0f7a3688c9ed024e2f04.exe
-
Size
1.5MB
-
MD5
b5aa0a354a2b0f7a3688c9ed024e2f04
-
SHA1
71d36f38584852072e2ddb3bc991c86d0b7dea50
-
SHA256
94bdebbfd12c3bd62b3bc24c83f71e9a765b19220e9d4a5d2bec383301b5de76
-
SHA512
67d13dbc099daf221e6ef52cca80b4f0dcc1a41a46b33369611e830017938d4ecd3be31afe0af77559dfb4a2473a41d8efc3225276a4a29d18ee18a103f081b0
-
SSDEEP
49152:fRCTPz99vLJM4iEngkRCip4VljKnJxUEifndEHqAC1zI/2cCiMh:fRCDHXt3AiYjKPUEqnde9sk/2nim
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2144-3-0x00000000004D0000-0x00000000006CA000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/2144-0-0x00000000004D0000-0x00000000006CA000-memory.dmp upx behavioral2/memory/2144-3-0x00000000004D0000-0x00000000006CA000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5aa0a354a2b0f7a3688c9ed024e2f04.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 4768 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 91 PID 2144 wrote to memory of 4768 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 91 PID 2144 wrote to memory of 4768 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 91 PID 2144 wrote to memory of 4776 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 92 PID 2144 wrote to memory of 4776 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 92 PID 2144 wrote to memory of 4776 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 92 PID 2144 wrote to memory of 4764 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 93 PID 2144 wrote to memory of 4764 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 93 PID 2144 wrote to memory of 4764 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 93 PID 2144 wrote to memory of 4784 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 94 PID 2144 wrote to memory of 4784 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 94 PID 2144 wrote to memory of 4784 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 94 PID 2144 wrote to memory of 4676 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 95 PID 2144 wrote to memory of 4676 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 95 PID 2144 wrote to memory of 4676 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 95 PID 2144 wrote to memory of 5720 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 96 PID 2144 wrote to memory of 5720 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 96 PID 2144 wrote to memory of 5720 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 96 PID 2144 wrote to memory of 4756 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 97 PID 2144 wrote to memory of 4756 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 97 PID 2144 wrote to memory of 4756 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 97 PID 2144 wrote to memory of 4748 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 98 PID 2144 wrote to memory of 4748 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 98 PID 2144 wrote to memory of 4748 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 98 PID 2144 wrote to memory of 4920 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 99 PID 2144 wrote to memory of 4920 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 99 PID 2144 wrote to memory of 4920 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 99 PID 2144 wrote to memory of 4940 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 100 PID 2144 wrote to memory of 4940 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 100 PID 2144 wrote to memory of 4940 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 100 PID 2144 wrote to memory of 4936 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 101 PID 2144 wrote to memory of 4936 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 101 PID 2144 wrote to memory of 4936 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 101 PID 2144 wrote to memory of 5016 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 102 PID 2144 wrote to memory of 5016 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 102 PID 2144 wrote to memory of 5016 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 102 PID 2144 wrote to memory of 4728 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 103 PID 2144 wrote to memory of 4728 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 103 PID 2144 wrote to memory of 4728 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 103 PID 2144 wrote to memory of 4856 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 104 PID 2144 wrote to memory of 4856 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 104 PID 2144 wrote to memory of 4856 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 104 PID 2144 wrote to memory of 4692 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 105 PID 2144 wrote to memory of 4692 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 105 PID 2144 wrote to memory of 4692 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 105 PID 2144 wrote to memory of 4680 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 106 PID 2144 wrote to memory of 4680 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 106 PID 2144 wrote to memory of 4680 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 106 PID 2144 wrote to memory of 4700 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 107 PID 2144 wrote to memory of 4700 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 107 PID 2144 wrote to memory of 4700 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 107 PID 2144 wrote to memory of 4020 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 108 PID 2144 wrote to memory of 4020 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 108 PID 2144 wrote to memory of 4020 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 108 PID 2144 wrote to memory of 5620 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 109 PID 2144 wrote to memory of 5620 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 109 PID 2144 wrote to memory of 5620 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 109 PID 2144 wrote to memory of 5032 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 110 PID 2144 wrote to memory of 5032 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 110 PID 2144 wrote to memory of 5032 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 110 PID 2144 wrote to memory of 5048 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 111 PID 2144 wrote to memory of 5048 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 111 PID 2144 wrote to memory of 5048 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 111 PID 2144 wrote to memory of 5056 2144 b5aa0a354a2b0f7a3688c9ed024e2f04.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5aa0a354a2b0f7a3688c9ed024e2f04.exe"C:\Users\Admin\AppData\Local\Temp\b5aa0a354a2b0f7a3688c9ed024e2f04.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4768
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4776
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4764
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4784
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4676
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5720
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4756
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4748
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4920
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4940
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4936
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5016
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4728
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4856
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4692
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4680
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4700
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4020
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5620
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5032
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5048
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5056
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:2104
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:3596
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4012
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1080
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:3896
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:3964
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4036
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5524
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1324
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:3576
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:3504
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4668
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4840
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4888
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4820
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4960
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4952
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4968
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4980
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4992
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4032
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4976
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4884
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4868
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5008
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4912
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1952
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4872
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4624
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4192
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:3992
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1012
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4024
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1664
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:628
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:2120
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:3440
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1780
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1300
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4392
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1528
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5588
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1984
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:396
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:6100
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1380
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4396
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4944
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1676
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:3460
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:2880
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4416
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1836
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:2036
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:3208
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1420
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5732
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:2772
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:2680
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1644
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:2760
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:856
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:3320
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:2040
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5020
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1052
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4484
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1260
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:6028
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4436
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:620
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5724
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:4496
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:5864
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:1184
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:2180
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:3060
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵PID:2556
-