Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
b51110921b9aef0cdd27185abab2552d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b51110921b9aef0cdd27185abab2552d.exe
Resource
win10v2004-20240226-en
General
-
Target
b51110921b9aef0cdd27185abab2552d.exe
-
Size
609KB
-
MD5
b51110921b9aef0cdd27185abab2552d
-
SHA1
11d86cc07fc330b889478ad9da1c789222708131
-
SHA256
e539dbd7601cef1ef9c552077b228c0b698d426d2d9fc2be4d2d41b4df328d31
-
SHA512
edef1bf3f2a8135a599231d5c18cf060ccd7c5970b74566cd5da56b8d462ba54c23b0a3de3d0aed26315e2479c118e1aadc2f48706efbb130d19a9264599d408
-
SSDEEP
12288:NXWkRjK3nC4lLMrL0Nh4eoj1mliehPWWkHvGdmpnOCRZDA95lv7Oc1AifYJF:N1jKFBojshxe0Gtgag+F
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2260 WScript.exe -
Executes dropped EXE 27 IoCs
pid Process 2736 svchost.exe 2688 svchost.exe 2668 svchost.exe 2244 svchost.exe 2440 svchost.exe 2452 svchost.exe 2636 svchost.exe 2760 svchost.exe 1088 svchost.exe 692 svchost.exe 1468 svchost.exe 2628 svchost.exe 1556 svchost.exe 1636 svchost.exe 1228 svchost.exe 1408 svchost.exe 636 svchost.exe 1140 svchost.exe 1564 svchost.exe 928 svchost.exe 1652 svchost.exe 992 svchost.exe 952 svchost.exe 2316 svchost.exe 3036 svchost.exe 520 svchost.exe 556 svchost.exe -
Loads dropped DLL 64 IoCs
pid Process 2892 b51110921b9aef0cdd27185abab2552d.exe 2892 b51110921b9aef0cdd27185abab2552d.exe 2892 b51110921b9aef0cdd27185abab2552d.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2440 svchost.exe 2440 svchost.exe 2440 svchost.exe 2452 svchost.exe 2452 svchost.exe 2452 svchost.exe 2636 svchost.exe 2636 svchost.exe 2636 svchost.exe 2760 svchost.exe 2760 svchost.exe 2760 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 692 svchost.exe 692 svchost.exe 692 svchost.exe 1468 svchost.exe 1468 svchost.exe 1468 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1636 svchost.exe 1636 svchost.exe 1636 svchost.exe 1228 svchost.exe 1228 svchost.exe 1228 svchost.exe 1408 svchost.exe 1408 svchost.exe 1408 svchost.exe 636 svchost.exe 636 svchost.exe 636 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 928 svchost.exe 928 svchost.exe 928 svchost.exe 1652 svchost.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\25321\svchost.exe b51110921b9aef0cdd27185abab2552d.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File created C:\Windows\SysWOW64\25321\AntiOpenProcess.dll b51110921b9aef0cdd27185abab2552d.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File created C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\svchost.exe b51110921b9aef0cdd27185abab2552d.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File created C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2892 b51110921b9aef0cdd27185abab2552d.exe 2892 b51110921b9aef0cdd27185abab2552d.exe 2892 b51110921b9aef0cdd27185abab2552d.exe 2892 b51110921b9aef0cdd27185abab2552d.exe 2892 b51110921b9aef0cdd27185abab2552d.exe 2892 b51110921b9aef0cdd27185abab2552d.exe 2892 b51110921b9aef0cdd27185abab2552d.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2688 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2440 svchost.exe 2440 svchost.exe 2440 svchost.exe 2440 svchost.exe 2440 svchost.exe 2440 svchost.exe 2440 svchost.exe 2452 svchost.exe 2452 svchost.exe 2452 svchost.exe 2452 svchost.exe 2452 svchost.exe 2452 svchost.exe 2452 svchost.exe 2636 svchost.exe 2636 svchost.exe 2636 svchost.exe 2636 svchost.exe 2636 svchost.exe 2636 svchost.exe 2636 svchost.exe 2760 svchost.exe 2760 svchost.exe 2760 svchost.exe 2760 svchost.exe 2760 svchost.exe 2760 svchost.exe 2760 svchost.exe 1088 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2736 2892 b51110921b9aef0cdd27185abab2552d.exe 28 PID 2892 wrote to memory of 2736 2892 b51110921b9aef0cdd27185abab2552d.exe 28 PID 2892 wrote to memory of 2736 2892 b51110921b9aef0cdd27185abab2552d.exe 28 PID 2892 wrote to memory of 2736 2892 b51110921b9aef0cdd27185abab2552d.exe 28 PID 2736 wrote to memory of 2688 2736 svchost.exe 29 PID 2736 wrote to memory of 2688 2736 svchost.exe 29 PID 2736 wrote to memory of 2688 2736 svchost.exe 29 PID 2736 wrote to memory of 2688 2736 svchost.exe 29 PID 2688 wrote to memory of 2668 2688 svchost.exe 30 PID 2688 wrote to memory of 2668 2688 svchost.exe 30 PID 2688 wrote to memory of 2668 2688 svchost.exe 30 PID 2688 wrote to memory of 2668 2688 svchost.exe 30 PID 2668 wrote to memory of 2244 2668 svchost.exe 31 PID 2668 wrote to memory of 2244 2668 svchost.exe 31 PID 2668 wrote to memory of 2244 2668 svchost.exe 31 PID 2668 wrote to memory of 2244 2668 svchost.exe 31 PID 2244 wrote to memory of 2440 2244 svchost.exe 32 PID 2244 wrote to memory of 2440 2244 svchost.exe 32 PID 2244 wrote to memory of 2440 2244 svchost.exe 32 PID 2244 wrote to memory of 2440 2244 svchost.exe 32 PID 2440 wrote to memory of 2452 2440 svchost.exe 91 PID 2440 wrote to memory of 2452 2440 svchost.exe 91 PID 2440 wrote to memory of 2452 2440 svchost.exe 91 PID 2440 wrote to memory of 2452 2440 svchost.exe 91 PID 2452 wrote to memory of 2636 2452 svchost.exe 34 PID 2452 wrote to memory of 2636 2452 svchost.exe 34 PID 2452 wrote to memory of 2636 2452 svchost.exe 34 PID 2452 wrote to memory of 2636 2452 svchost.exe 34 PID 2636 wrote to memory of 2760 2636 svchost.exe 100 PID 2636 wrote to memory of 2760 2636 svchost.exe 100 PID 2636 wrote to memory of 2760 2636 svchost.exe 100 PID 2636 wrote to memory of 2760 2636 svchost.exe 100 PID 2760 wrote to memory of 1088 2760 svchost.exe 103 PID 2760 wrote to memory of 1088 2760 svchost.exe 103 PID 2760 wrote to memory of 1088 2760 svchost.exe 103 PID 2760 wrote to memory of 1088 2760 svchost.exe 103 PID 1088 wrote to memory of 692 1088 svchost.exe 40 PID 1088 wrote to memory of 692 1088 svchost.exe 40 PID 1088 wrote to memory of 692 1088 svchost.exe 40 PID 1088 wrote to memory of 692 1088 svchost.exe 40 PID 692 wrote to memory of 1468 692 svchost.exe 123 PID 692 wrote to memory of 1468 692 svchost.exe 123 PID 692 wrote to memory of 1468 692 svchost.exe 123 PID 692 wrote to memory of 1468 692 svchost.exe 123 PID 1468 wrote to memory of 2628 1468 svchost.exe 43 PID 1468 wrote to memory of 2628 1468 svchost.exe 43 PID 1468 wrote to memory of 2628 1468 svchost.exe 43 PID 1468 wrote to memory of 2628 1468 svchost.exe 43 PID 2628 wrote to memory of 1556 2628 svchost.exe 44 PID 2628 wrote to memory of 1556 2628 svchost.exe 44 PID 2628 wrote to memory of 1556 2628 svchost.exe 44 PID 2628 wrote to memory of 1556 2628 svchost.exe 44 PID 1556 wrote to memory of 1636 1556 svchost.exe 45 PID 1556 wrote to memory of 1636 1556 svchost.exe 45 PID 1556 wrote to memory of 1636 1556 svchost.exe 45 PID 1556 wrote to memory of 1636 1556 svchost.exe 45 PID 2440 wrote to memory of 564 2440 svchost.exe 41 PID 2440 wrote to memory of 564 2440 svchost.exe 41 PID 2440 wrote to memory of 564 2440 svchost.exe 41 PID 2440 wrote to memory of 564 2440 svchost.exe 41 PID 2244 wrote to memory of 1540 2244 svchost.exe 46 PID 2244 wrote to memory of 1540 2244 svchost.exe 46 PID 2244 wrote to memory of 1540 2244 svchost.exe 46 PID 2244 wrote to memory of 1540 2244 svchost.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\b51110921b9aef0cdd27185abab2552d.exe"C:\Users\Admin\AppData\Local\Temp\b51110921b9aef0cdd27185abab2552d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1636 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1228 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1408 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:636 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1140 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1564 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:928 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:992 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:952 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2316 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:520 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe28⤵
- Executes dropped EXE
PID:556 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe29⤵PID:2980
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe30⤵PID:2488
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe31⤵PID:2748
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe32⤵PID:2520
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe33⤵PID:3016
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe34⤵PID:2128
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe35⤵PID:2712
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe36⤵PID:2156
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe37⤵PID:2120
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe38⤵PID:1112
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe39⤵PID:2624
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe40⤵PID:1532
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe41⤵PID:2900
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe42⤵PID:1888
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe43⤵PID:536
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe44⤵PID:1672
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe45⤵PID:2452
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe46⤵PID:948
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe47⤵PID:2324
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe48⤵PID:2044
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe49⤵PID:2004
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe50⤵PID:1088
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe51⤵PID:2656
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe52⤵PID:1696
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe53⤵PID:2696
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe54⤵PID:1680
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe55⤵PID:2516
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe56⤵PID:1808
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe57⤵PID:2720
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe58⤵PID:3056
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe59⤵PID:1856
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe60⤵PID:1736
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe61⤵PID:772
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe62⤵PID:1668
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe63⤵PID:2656
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe64⤵PID:1512
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe65⤵PID:1932
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe66⤵PID:2772
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe67⤵PID:2488
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe68⤵PID:1264
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe69⤵PID:2152
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe70⤵PID:2000
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe71⤵PID:1496
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe72⤵PID:2432
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe73⤵PID:1388
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe74⤵PID:1568
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe75⤵PID:3092
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe76⤵PID:3128
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe77⤵PID:3152
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe78⤵PID:3180
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe79⤵PID:3220
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe80⤵PID:3260
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe81⤵PID:3288
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe82⤵PID:3352
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe83⤵PID:3380
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe84⤵PID:3452
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe85⤵PID:3544
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe86⤵PID:3592
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe87⤵PID:3652
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe88⤵PID:3712
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe89⤵PID:3764
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe90⤵PID:3828
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe91⤵PID:3896
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe92⤵PID:3952
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe93⤵PID:4012
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe94⤵PID:4060
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe95⤵PID:4092
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe96⤵PID:3204
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe97⤵PID:3300
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe98⤵PID:2148
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe99⤵PID:3412
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe100⤵PID:3484
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe101⤵PID:2324
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe102⤵PID:3672
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe103⤵PID:1884
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe104⤵PID:2656
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe105⤵PID:988
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe106⤵PID:4088
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe107⤵PID:3464
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe108⤵PID:2100
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe109⤵PID:2776
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe110⤵PID:2672
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe111⤵PID:3324
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe112⤵PID:4116
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe113⤵PID:4136
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe114⤵PID:4160
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe115⤵PID:4180
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe116⤵PID:4204
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe117⤵PID:4236
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe118⤵PID:4264
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe119⤵PID:4284
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe120⤵PID:4312
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe121⤵PID:4332
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe122⤵PID:4356
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-