Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
65s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe
Resource
win10v2004-20220812-en
General
-
Target
0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe
-
Size
32KB
-
MD5
0634f2cf47a45ab72a43627c78cb75f9
-
SHA1
2986d6b70c8719be8d1751fb18efa87de639d27a
-
SHA256
0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7
-
SHA512
aa2b2680010d5628cb1525adf1611a1949306b3f101494dd0b9e8b5c6869ba3df5e2e63004c8ebcdc35460d8b0b13e55c6177cef8a0474753ad122abcadf4841
-
SSDEEP
768:/mkwp8FegObig49DpDYUV3MKvG+xOha5/9:/mkf1d9Lsu9
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2580 windows.exe 2128 windows.exe 1380 windows.exe 4960 windows.exe 524 windows.exe 4944 windows.exe 4940 windows.exe 1352 windows.exe 4360 windows.exe 1992 windows.exe 2992 windows.exe 4136 windows.exe 1876 windows.exe 3848 windows.exe 4232 windows.exe 4060 windows.exe 2228 windows.exe 4440 windows.exe 4280 windows.exe 1608 windows.exe 3656 windows.exe 4508 windows.exe 2676 windows.exe 4016 windows.exe 4552 windows.exe 4024 windows.exe 984 windows.exe 4396 windows.exe 3976 windows.exe 1548 windows.exe 4560 windows.exe 3436 windows.exe 644 windows.exe 4848 windows.exe 2740 windows.exe 2144 windows.exe 540 windows.exe 3380 windows.exe 2924 windows.exe 440 windows.exe 1092 windows.exe 4780 windows.exe 4656 windows.exe 1728 windows.exe 656 windows.exe 536 windows.exe 3644 windows.exe 5080 windows.exe 1416 windows.exe 1436 windows.exe 3464 windows.exe 2672 windows.exe 2148 windows.exe 2316 windows.exe 4048 windows.exe 4804 windows.exe 2272 windows.exe 4856 windows.exe 4644 windows.exe 3224 windows.exe 3304 windows.exe 2244 windows.exe 4064 windows.exe 3548 windows.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Internet Explorer = "C:\\Windows\\Sse.exe" 0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Explorer = "C:\\Windows\\Windows.exe" 0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Sse.exe 0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe File opened for modification C:\Windows\Windows.exe 0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2004 0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe 2580 windows.exe 2128 windows.exe 1380 windows.exe 4960 windows.exe 524 windows.exe 4944 windows.exe 4940 windows.exe 1352 windows.exe 4360 windows.exe 1992 windows.exe 2992 windows.exe 4136 windows.exe 1876 windows.exe 3848 windows.exe 4232 windows.exe 4060 windows.exe 2228 windows.exe 4440 windows.exe 4280 windows.exe 1608 windows.exe 3656 windows.exe 4508 windows.exe 2676 windows.exe 4016 windows.exe 4552 windows.exe 4024 windows.exe 984 windows.exe 4396 windows.exe 3976 windows.exe 1548 windows.exe 4560 windows.exe 3436 windows.exe 644 windows.exe 4848 windows.exe 2740 windows.exe 2144 windows.exe 540 windows.exe 3380 windows.exe 2924 windows.exe 440 windows.exe 1092 windows.exe 4780 windows.exe 4656 windows.exe 1728 windows.exe 656 windows.exe 536 windows.exe 3644 windows.exe 5080 windows.exe 1416 windows.exe 1436 windows.exe 3464 windows.exe 2672 windows.exe 2148 windows.exe 2316 windows.exe 4048 windows.exe 4804 windows.exe 2272 windows.exe 4856 windows.exe 4644 windows.exe 3224 windows.exe 3304 windows.exe 2244 windows.exe 4064 windows.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2580 2004 0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe 80 PID 2004 wrote to memory of 2580 2004 0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe 80 PID 2004 wrote to memory of 2580 2004 0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe 80 PID 2580 wrote to memory of 2128 2580 windows.exe 81 PID 2580 wrote to memory of 2128 2580 windows.exe 81 PID 2580 wrote to memory of 2128 2580 windows.exe 81 PID 2128 wrote to memory of 1380 2128 windows.exe 82 PID 2128 wrote to memory of 1380 2128 windows.exe 82 PID 2128 wrote to memory of 1380 2128 windows.exe 82 PID 1380 wrote to memory of 4960 1380 windows.exe 83 PID 1380 wrote to memory of 4960 1380 windows.exe 83 PID 1380 wrote to memory of 4960 1380 windows.exe 83 PID 4960 wrote to memory of 524 4960 windows.exe 84 PID 4960 wrote to memory of 524 4960 windows.exe 84 PID 4960 wrote to memory of 524 4960 windows.exe 84 PID 524 wrote to memory of 4944 524 windows.exe 85 PID 524 wrote to memory of 4944 524 windows.exe 85 PID 524 wrote to memory of 4944 524 windows.exe 85 PID 4944 wrote to memory of 4940 4944 windows.exe 86 PID 4944 wrote to memory of 4940 4944 windows.exe 86 PID 4944 wrote to memory of 4940 4944 windows.exe 86 PID 4940 wrote to memory of 1352 4940 windows.exe 87 PID 4940 wrote to memory of 1352 4940 windows.exe 87 PID 4940 wrote to memory of 1352 4940 windows.exe 87 PID 1352 wrote to memory of 4360 1352 windows.exe 88 PID 1352 wrote to memory of 4360 1352 windows.exe 88 PID 1352 wrote to memory of 4360 1352 windows.exe 88 PID 4360 wrote to memory of 1992 4360 windows.exe 89 PID 4360 wrote to memory of 1992 4360 windows.exe 89 PID 4360 wrote to memory of 1992 4360 windows.exe 89 PID 1992 wrote to memory of 2992 1992 windows.exe 90 PID 1992 wrote to memory of 2992 1992 windows.exe 90 PID 1992 wrote to memory of 2992 1992 windows.exe 90 PID 2992 wrote to memory of 4136 2992 windows.exe 91 PID 2992 wrote to memory of 4136 2992 windows.exe 91 PID 2992 wrote to memory of 4136 2992 windows.exe 91 PID 4136 wrote to memory of 1876 4136 windows.exe 92 PID 4136 wrote to memory of 1876 4136 windows.exe 92 PID 4136 wrote to memory of 1876 4136 windows.exe 92 PID 1876 wrote to memory of 3848 1876 windows.exe 93 PID 1876 wrote to memory of 3848 1876 windows.exe 93 PID 1876 wrote to memory of 3848 1876 windows.exe 93 PID 3848 wrote to memory of 4232 3848 windows.exe 94 PID 3848 wrote to memory of 4232 3848 windows.exe 94 PID 3848 wrote to memory of 4232 3848 windows.exe 94 PID 4232 wrote to memory of 4060 4232 windows.exe 95 PID 4232 wrote to memory of 4060 4232 windows.exe 95 PID 4232 wrote to memory of 4060 4232 windows.exe 95 PID 4060 wrote to memory of 2228 4060 windows.exe 96 PID 4060 wrote to memory of 2228 4060 windows.exe 96 PID 4060 wrote to memory of 2228 4060 windows.exe 96 PID 2228 wrote to memory of 4440 2228 windows.exe 97 PID 2228 wrote to memory of 4440 2228 windows.exe 97 PID 2228 wrote to memory of 4440 2228 windows.exe 97 PID 4440 wrote to memory of 4280 4440 windows.exe 98 PID 4440 wrote to memory of 4280 4440 windows.exe 98 PID 4440 wrote to memory of 4280 4440 windows.exe 98 PID 4280 wrote to memory of 1608 4280 windows.exe 99 PID 4280 wrote to memory of 1608 4280 windows.exe 99 PID 4280 wrote to memory of 1608 4280 windows.exe 99 PID 1608 wrote to memory of 3656 1608 windows.exe 100 PID 1608 wrote to memory of 3656 1608 windows.exe 100 PID 1608 wrote to memory of 3656 1608 windows.exe 100 PID 3656 wrote to memory of 4508 3656 windows.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe"C:\Users\Admin\AppData\Local\Temp\0ab202ede9f46153efef47c565681eb716f273cc40e46b04bad9d93278c5c0f7.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\windows.exeC:\Windows\windows.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\windows.exeC:\Windows\windows.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\windows.exeC:\Windows\windows.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\windows.exeC:\Windows\windows.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\windows.exeC:\Windows\windows.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\windows.exeC:\Windows\windows.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\windows.exeC:\Windows\windows.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\windows.exeC:\Windows\windows.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\windows.exeC:\Windows\windows.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\windows.exeC:\Windows\windows.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\windows.exeC:\Windows\windows.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\windows.exeC:\Windows\windows.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\windows.exeC:\Windows\windows.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\windows.exeC:\Windows\windows.exe15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\windows.exeC:\Windows\windows.exe16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\windows.exeC:\Windows\windows.exe17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\windows.exeC:\Windows\windows.exe18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\windows.exeC:\Windows\windows.exe19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\windows.exeC:\Windows\windows.exe20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\windows.exeC:\Windows\windows.exe21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\windows.exeC:\Windows\windows.exe22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\windows.exeC:\Windows\windows.exe23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4508 -
C:\Windows\windows.exeC:\Windows\windows.exe24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Windows\windows.exeC:\Windows\windows.exe25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4016 -
C:\Windows\windows.exeC:\Windows\windows.exe26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4552 -
C:\Windows\windows.exeC:\Windows\windows.exe27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4024 -
C:\Windows\windows.exeC:\Windows\windows.exe28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:984 -
C:\Windows\windows.exeC:\Windows\windows.exe29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4396 -
C:\Windows\windows.exeC:\Windows\windows.exe30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3976 -
C:\Windows\windows.exeC:\Windows\windows.exe31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Windows\windows.exeC:\Windows\windows.exe32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4560 -
C:\Windows\windows.exeC:\Windows\windows.exe33⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3436 -
C:\Windows\windows.exeC:\Windows\windows.exe34⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:644 -
C:\Windows\windows.exeC:\Windows\windows.exe35⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4848 -
C:\Windows\windows.exeC:\Windows\windows.exe36⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Windows\windows.exeC:\Windows\windows.exe37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Windows\windows.exeC:\Windows\windows.exe38⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:540 -
C:\Windows\windows.exeC:\Windows\windows.exe39⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3380 -
C:\Windows\windows.exeC:\Windows\windows.exe40⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Windows\windows.exeC:\Windows\windows.exe41⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:440 -
C:\Windows\windows.exeC:\Windows\windows.exe42⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Windows\windows.exeC:\Windows\windows.exe43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780 -
C:\Windows\windows.exeC:\Windows\windows.exe44⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4656 -
C:\Windows\windows.exeC:\Windows\windows.exe45⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Windows\windows.exeC:\Windows\windows.exe46⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:656 -
C:\Windows\windows.exeC:\Windows\windows.exe47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536 -
C:\Windows\windows.exeC:\Windows\windows.exe48⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3644 -
C:\Windows\windows.exeC:\Windows\windows.exe49⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5080 -
C:\Windows\windows.exeC:\Windows\windows.exe50⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1416 -
C:\Windows\windows.exeC:\Windows\windows.exe51⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436 -
C:\Windows\windows.exeC:\Windows\windows.exe52⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3464 -
C:\Windows\windows.exeC:\Windows\windows.exe53⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\Windows\windows.exeC:\Windows\windows.exe54⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Windows\windows.exeC:\Windows\windows.exe55⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2316 -
C:\Windows\windows.exeC:\Windows\windows.exe56⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4048 -
C:\Windows\windows.exeC:\Windows\windows.exe57⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4804 -
C:\Windows\windows.exeC:\Windows\windows.exe58⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Windows\windows.exeC:\Windows\windows.exe59⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4856 -
C:\Windows\windows.exeC:\Windows\windows.exe60⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4644 -
C:\Windows\windows.exeC:\Windows\windows.exe61⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3224 -
C:\Windows\windows.exeC:\Windows\windows.exe62⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3304 -
C:\Windows\windows.exeC:\Windows\windows.exe63⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Windows\windows.exeC:\Windows\windows.exe64⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4064 -
C:\Windows\windows.exeC:\Windows\windows.exe65⤵
- Executes dropped EXE
PID:3548 -
C:\Windows\windows.exeC:\Windows\windows.exe66⤵PID:3764
-
C:\Windows\windows.exeC:\Windows\windows.exe67⤵PID:3984
-
C:\Windows\windows.exeC:\Windows\windows.exe68⤵PID:1856
-
C:\Windows\windows.exeC:\Windows\windows.exe69⤵PID:4304
-
C:\Windows\windows.exeC:\Windows\windows.exe70⤵PID:3364
-
C:\Windows\windows.exeC:\Windows\windows.exe71⤵PID:4340
-
C:\Windows\windows.exeC:\Windows\windows.exe72⤵PID:1636
-
C:\Windows\windows.exeC:\Windows\windows.exe73⤵PID:3248
-
C:\Windows\windows.exeC:\Windows\windows.exe74⤵PID:1844
-
C:\Windows\windows.exeC:\Windows\windows.exe75⤵PID:68
-
C:\Windows\windows.exeC:\Windows\windows.exe76⤵PID:1476
-
C:\Windows\windows.exeC:\Windows\windows.exe77⤵PID:1304
-
C:\Windows\windows.exeC:\Windows\windows.exe78⤵PID:1752
-
C:\Windows\windows.exeC:\Windows\windows.exe79⤵PID:3892
-
C:\Windows\windows.exeC:\Windows\windows.exe80⤵PID:3148
-
C:\Windows\windows.exeC:\Windows\windows.exe81⤵PID:4912
-
C:\Windows\windows.exeC:\Windows\windows.exe82⤵PID:3988
-
C:\Windows\windows.exeC:\Windows\windows.exe83⤵PID:3676
-
C:\Windows\windows.exeC:\Windows\windows.exe84⤵PID:1472
-
C:\Windows\windows.exeC:\Windows\windows.exe85⤵PID:4716
-
C:\Windows\windows.exeC:\Windows\windows.exe86⤵PID:4720
-
C:\Windows\windows.exeC:\Windows\windows.exe87⤵PID:1604
-
C:\Windows\windows.exeC:\Windows\windows.exe88⤵PID:1736
-
C:\Windows\windows.exeC:\Windows\windows.exe89⤵PID:3160
-
C:\Windows\windows.exeC:\Windows\windows.exe90⤵PID:3760
-
C:\Windows\windows.exeC:\Windows\windows.exe91⤵PID:1420
-
C:\Windows\windows.exeC:\Windows\windows.exe92⤵PID:2900
-
C:\Windows\windows.exeC:\Windows\windows.exe93⤵PID:2620
-
C:\Windows\windows.exeC:\Windows\windows.exe94⤵PID:1068
-
C:\Windows\windows.exeC:\Windows\windows.exe95⤵PID:2796
-
C:\Windows\windows.exeC:\Windows\windows.exe96⤵PID:3196
-
C:\Windows\windows.exeC:\Windows\windows.exe97⤵PID:5064
-
C:\Windows\windows.exeC:\Windows\windows.exe98⤵PID:4028
-
C:\Windows\windows.exeC:\Windows\windows.exe99⤵PID:3220
-
C:\Windows\windows.exeC:\Windows\windows.exe100⤵PID:2912
-
C:\Windows\windows.exeC:\Windows\windows.exe101⤵PID:2596
-
C:\Windows\windows.exeC:\Windows\windows.exe102⤵PID:2208
-
C:\Windows\windows.exeC:\Windows\windows.exe103⤵PID:4260
-
C:\Windows\windows.exeC:\Windows\windows.exe104⤵PID:60
-
C:\Windows\windows.exeC:\Windows\windows.exe105⤵PID:3488
-
C:\Windows\windows.exeC:\Windows\windows.exe106⤵PID:4892
-
C:\Windows\windows.exeC:\Windows\windows.exe107⤵PID:1652
-
C:\Windows\windows.exeC:\Windows\windows.exe108⤵PID:3168
-
C:\Windows\windows.exeC:\Windows\windows.exe109⤵PID:4268
-
C:\Windows\windows.exeC:\Windows\windows.exe110⤵PID:3624
-
C:\Windows\windows.exeC:\Windows\windows.exe111⤵PID:2444
-
C:\Windows\windows.exeC:\Windows\windows.exe112⤵PID:1832
-
C:\Windows\windows.exeC:\Windows\windows.exe113⤵PID:3960
-
C:\Windows\windows.exeC:\Windows\windows.exe114⤵PID:1112
-
C:\Windows\windows.exeC:\Windows\windows.exe115⤵PID:1952
-
C:\Windows\windows.exeC:\Windows\windows.exe116⤵PID:1524
-
C:\Windows\windows.exeC:\Windows\windows.exe117⤵PID:1580
-
C:\Windows\windows.exeC:\Windows\windows.exe118⤵PID:4056
-
C:\Windows\windows.exeC:\Windows\windows.exe119⤵PID:5156
-
C:\Windows\windows.exeC:\Windows\windows.exe120⤵PID:5228
-
C:\Windows\windows.exeC:\Windows\windows.exe121⤵PID:5320
-
C:\Windows\windows.exeC:\Windows\windows.exe122⤵PID:5500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-