Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 08:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a136c295fbdae5exeexeexeex.exe
Resource
win7-20230705-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a136c295fbdae5exeexeexeex.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
a136c295fbdae5exeexeexeex.exe
-
Size
488KB
-
MD5
a136c295fbdae5d7df8437ceba24d173
-
SHA1
e0618e93ec7be73111bffb860dbe7f72f2fe9991
-
SHA256
185c14f7280eb9df82c381a630f6a4a78b20f64963703a1ef104462ec594e4c3
-
SHA512
858d76b5feecc3641d1e0d499de525c88761c4eed6330f673044f14200ddbd70e6ef6d47ea02617edebdd4c8fef9b28e8b9c457181b0bfc84d1f258ea3ae27fe
-
SSDEEP
12288:/U5rCOTeiDOocRA1mwOOAXmG8fWe0XdxmFNZ:/UQOJDOocRCamGF4N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4508 D2E0.tmp 2116 D3AB.tmp 2692 D467.tmp 656 D542.tmp 4664 D5FD.tmp 2424 D6C8.tmp 2012 D755.tmp 2968 D830.tmp 4852 D8DB.tmp 4956 D987.tmp 3960 DA33.tmp 568 DAEF.tmp 3252 DB7B.tmp 1204 DD12.tmp 3744 DDBD.tmp 4168 DE89.tmp 2724 DF44.tmp 3932 E000.tmp 216 E0BB.tmp 352 E167.tmp 4356 E261.tmp 1148 E34B.tmp 2172 E426.tmp 3148 E4F1.tmp 3452 E5BC.tmp 4436 E678.tmp 4600 E781.tmp 1668 E86C.tmp 1768 E947.tmp 5012 EB1B.tmp 4720 EBD7.tmp 112 ECC1.tmp 5004 ED6D.tmp 1324 EE19.tmp 796 EEC5.tmp 1748 EF71.tmp 748 F01D.tmp 2824 F0A9.tmp 2408 F165.tmp 3948 F211.tmp 1704 F2AD.tmp 2820 F368.tmp 2216 F405.tmp 1224 F482.tmp 3064 F50E.tmp 3008 F5CA.tmp 4524 F647.tmp 2488 F6E3.tmp 3668 F78F.tmp 412 F86A.tmp 4988 F925.tmp 2856 FA2F.tmp 492 FAAC.tmp 324 FB86.tmp 1484 FC23.tmp 4084 FCAF.tmp 5044 FD6B.tmp 3944 FDF7.tmp 4392 FE84.tmp 3692 FF20.tmp 4192 FFCC.tmp 5008 49.tmp 3284 B7.tmp 468 143.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 4508 2480 a136c295fbdae5exeexeexeex.exe 83 PID 2480 wrote to memory of 4508 2480 a136c295fbdae5exeexeexeex.exe 83 PID 2480 wrote to memory of 4508 2480 a136c295fbdae5exeexeexeex.exe 83 PID 4508 wrote to memory of 2116 4508 D2E0.tmp 84 PID 4508 wrote to memory of 2116 4508 D2E0.tmp 84 PID 4508 wrote to memory of 2116 4508 D2E0.tmp 84 PID 2116 wrote to memory of 2692 2116 D3AB.tmp 85 PID 2116 wrote to memory of 2692 2116 D3AB.tmp 85 PID 2116 wrote to memory of 2692 2116 D3AB.tmp 85 PID 2692 wrote to memory of 656 2692 D467.tmp 87 PID 2692 wrote to memory of 656 2692 D467.tmp 87 PID 2692 wrote to memory of 656 2692 D467.tmp 87 PID 656 wrote to memory of 4664 656 D542.tmp 88 PID 656 wrote to memory of 4664 656 D542.tmp 88 PID 656 wrote to memory of 4664 656 D542.tmp 88 PID 4664 wrote to memory of 2424 4664 D5FD.tmp 89 PID 4664 wrote to memory of 2424 4664 D5FD.tmp 89 PID 4664 wrote to memory of 2424 4664 D5FD.tmp 89 PID 2424 wrote to memory of 2012 2424 D6C8.tmp 90 PID 2424 wrote to memory of 2012 2424 D6C8.tmp 90 PID 2424 wrote to memory of 2012 2424 D6C8.tmp 90 PID 2012 wrote to memory of 2968 2012 D755.tmp 91 PID 2012 wrote to memory of 2968 2012 D755.tmp 91 PID 2012 wrote to memory of 2968 2012 D755.tmp 91 PID 2968 wrote to memory of 4852 2968 D830.tmp 92 PID 2968 wrote to memory of 4852 2968 D830.tmp 92 PID 2968 wrote to memory of 4852 2968 D830.tmp 92 PID 4852 wrote to memory of 4956 4852 D8DB.tmp 93 PID 4852 wrote to memory of 4956 4852 D8DB.tmp 93 PID 4852 wrote to memory of 4956 4852 D8DB.tmp 93 PID 4956 wrote to memory of 3960 4956 D987.tmp 94 PID 4956 wrote to memory of 3960 4956 D987.tmp 94 PID 4956 wrote to memory of 3960 4956 D987.tmp 94 PID 3960 wrote to memory of 568 3960 DA33.tmp 95 PID 3960 wrote to memory of 568 3960 DA33.tmp 95 PID 3960 wrote to memory of 568 3960 DA33.tmp 95 PID 568 wrote to memory of 3252 568 DAEF.tmp 96 PID 568 wrote to memory of 3252 568 DAEF.tmp 96 PID 568 wrote to memory of 3252 568 DAEF.tmp 96 PID 3252 wrote to memory of 1204 3252 DB7B.tmp 97 PID 3252 wrote to memory of 1204 3252 DB7B.tmp 97 PID 3252 wrote to memory of 1204 3252 DB7B.tmp 97 PID 1204 wrote to memory of 3744 1204 DD12.tmp 98 PID 1204 wrote to memory of 3744 1204 DD12.tmp 98 PID 1204 wrote to memory of 3744 1204 DD12.tmp 98 PID 3744 wrote to memory of 4168 3744 DDBD.tmp 99 PID 3744 wrote to memory of 4168 3744 DDBD.tmp 99 PID 3744 wrote to memory of 4168 3744 DDBD.tmp 99 PID 4168 wrote to memory of 2724 4168 DE89.tmp 100 PID 4168 wrote to memory of 2724 4168 DE89.tmp 100 PID 4168 wrote to memory of 2724 4168 DE89.tmp 100 PID 2724 wrote to memory of 3932 2724 DF44.tmp 101 PID 2724 wrote to memory of 3932 2724 DF44.tmp 101 PID 2724 wrote to memory of 3932 2724 DF44.tmp 101 PID 3932 wrote to memory of 216 3932 E000.tmp 102 PID 3932 wrote to memory of 216 3932 E000.tmp 102 PID 3932 wrote to memory of 216 3932 E000.tmp 102 PID 216 wrote to memory of 352 216 E0BB.tmp 103 PID 216 wrote to memory of 352 216 E0BB.tmp 103 PID 216 wrote to memory of 352 216 E0BB.tmp 103 PID 352 wrote to memory of 4356 352 E167.tmp 104 PID 352 wrote to memory of 4356 352 E167.tmp 104 PID 352 wrote to memory of 4356 352 E167.tmp 104 PID 4356 wrote to memory of 1148 4356 E261.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\a136c295fbdae5exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\a136c295fbdae5exeexeexeex.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\D2E0.tmp"C:\Users\Admin\AppData\Local\Temp\D2E0.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\D467.tmp"C:\Users\Admin\AppData\Local\Temp\D467.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\D542.tmp"C:\Users\Admin\AppData\Local\Temp\D542.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\D755.tmp"C:\Users\Admin\AppData\Local\Temp\D755.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\D830.tmp"C:\Users\Admin\AppData\Local\Temp\D830.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\D987.tmp"C:\Users\Admin\AppData\Local\Temp\D987.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\DA33.tmp"C:\Users\Admin\AppData\Local\Temp\DA33.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\DAEF.tmp"C:\Users\Admin\AppData\Local\Temp\DAEF.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\DB7B.tmp"C:\Users\Admin\AppData\Local\Temp\DB7B.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\DD12.tmp"C:\Users\Admin\AppData\Local\Temp\DD12.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\DE89.tmp"C:\Users\Admin\AppData\Local\Temp\DE89.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\DF44.tmp"C:\Users\Admin\AppData\Local\Temp\DF44.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\E000.tmp"C:\Users\Admin\AppData\Local\Temp\E000.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\E167.tmp"C:\Users\Admin\AppData\Local\Temp\E167.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Local\Temp\E261.tmp"C:\Users\Admin\AppData\Local\Temp\E261.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\E34B.tmp"C:\Users\Admin\AppData\Local\Temp\E34B.tmp"23⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\E426.tmp"C:\Users\Admin\AppData\Local\Temp\E426.tmp"24⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"25⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"26⤵
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\E678.tmp"C:\Users\Admin\AppData\Local\Temp\E678.tmp"27⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\E781.tmp"C:\Users\Admin\AppData\Local\Temp\E781.tmp"28⤵
- Executes dropped EXE
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\E86C.tmp"C:\Users\Admin\AppData\Local\Temp\E86C.tmp"29⤵
- Executes dropped EXE
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\E947.tmp"C:\Users\Admin\AppData\Local\Temp\E947.tmp"30⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\EB1B.tmp"C:\Users\Admin\AppData\Local\Temp\EB1B.tmp"31⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"32⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"33⤵
- Executes dropped EXE
PID:112 -
C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"34⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\EE19.tmp"C:\Users\Admin\AppData\Local\Temp\EE19.tmp"35⤵
- Executes dropped EXE
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\EEC5.tmp"C:\Users\Admin\AppData\Local\Temp\EEC5.tmp"36⤵
- Executes dropped EXE
PID:796 -
C:\Users\Admin\AppData\Local\Temp\EF71.tmp"C:\Users\Admin\AppData\Local\Temp\EF71.tmp"37⤵
- Executes dropped EXE
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"38⤵
- Executes dropped EXE
PID:748 -
C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"39⤵
- Executes dropped EXE
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\F165.tmp"C:\Users\Admin\AppData\Local\Temp\F165.tmp"40⤵
- Executes dropped EXE
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\F211.tmp"C:\Users\Admin\AppData\Local\Temp\F211.tmp"41⤵
- Executes dropped EXE
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"42⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\F368.tmp"C:\Users\Admin\AppData\Local\Temp\F368.tmp"43⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\F405.tmp"C:\Users\Admin\AppData\Local\Temp\F405.tmp"44⤵
- Executes dropped EXE
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\F482.tmp"C:\Users\Admin\AppData\Local\Temp\F482.tmp"45⤵
- Executes dropped EXE
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\F50E.tmp"C:\Users\Admin\AppData\Local\Temp\F50E.tmp"46⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\F5CA.tmp"C:\Users\Admin\AppData\Local\Temp\F5CA.tmp"47⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\F647.tmp"C:\Users\Admin\AppData\Local\Temp\F647.tmp"48⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"49⤵
- Executes dropped EXE
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\F78F.tmp"C:\Users\Admin\AppData\Local\Temp\F78F.tmp"50⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\F86A.tmp"C:\Users\Admin\AppData\Local\Temp\F86A.tmp"51⤵
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\F925.tmp"C:\Users\Admin\AppData\Local\Temp\F925.tmp"52⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"53⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"54⤵
- Executes dropped EXE
PID:492 -
C:\Users\Admin\AppData\Local\Temp\FB86.tmp"C:\Users\Admin\AppData\Local\Temp\FB86.tmp"55⤵
- Executes dropped EXE
PID:324 -
C:\Users\Admin\AppData\Local\Temp\FC23.tmp"C:\Users\Admin\AppData\Local\Temp\FC23.tmp"56⤵
- Executes dropped EXE
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"57⤵
- Executes dropped EXE
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"58⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"59⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\FE84.tmp"C:\Users\Admin\AppData\Local\Temp\FE84.tmp"60⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\FF20.tmp"C:\Users\Admin\AppData\Local\Temp\FF20.tmp"61⤵
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"62⤵
- Executes dropped EXE
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\49.tmp"C:\Users\Admin\AppData\Local\Temp\49.tmp"63⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\B7.tmp"C:\Users\Admin\AppData\Local\Temp\B7.tmp"64⤵
- Executes dropped EXE
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\143.tmp"C:\Users\Admin\AppData\Local\Temp\143.tmp"65⤵
- Executes dropped EXE
PID:468 -
C:\Users\Admin\AppData\Local\Temp\20E.tmp"C:\Users\Admin\AppData\Local\Temp\20E.tmp"66⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\2CA.tmp"C:\Users\Admin\AppData\Local\Temp\2CA.tmp"67⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\366.tmp"C:\Users\Admin\AppData\Local\Temp\366.tmp"68⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\3F3.tmp"C:\Users\Admin\AppData\Local\Temp\3F3.tmp"69⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\4CD.tmp"C:\Users\Admin\AppData\Local\Temp\4CD.tmp"70⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\55A.tmp"C:\Users\Admin\AppData\Local\Temp\55A.tmp"71⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\606.tmp"C:\Users\Admin\AppData\Local\Temp\606.tmp"72⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\6D1.tmp"C:\Users\Admin\AppData\Local\Temp\6D1.tmp"73⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\77D.tmp"C:\Users\Admin\AppData\Local\Temp\77D.tmp"74⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\819.tmp"C:\Users\Admin\AppData\Local\Temp\819.tmp"75⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\8C5.tmp"C:\Users\Admin\AppData\Local\Temp\8C5.tmp"76⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\942.tmp"C:\Users\Admin\AppData\Local\Temp\942.tmp"77⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\9DE.tmp"C:\Users\Admin\AppData\Local\Temp\9DE.tmp"78⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\A9A.tmp"C:\Users\Admin\AppData\Local\Temp\A9A.tmp"79⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\B46.tmp"C:\Users\Admin\AppData\Local\Temp\B46.tmp"80⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\BB3.tmp"C:\Users\Admin\AppData\Local\Temp\BB3.tmp"81⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp"82⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\CAD.tmp"C:\Users\Admin\AppData\Local\Temp\CAD.tmp"83⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"84⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\E34.tmp"C:\Users\Admin\AppData\Local\Temp\E34.tmp"85⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\EC0.tmp"C:\Users\Admin\AppData\Local\Temp\EC0.tmp"86⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\F8B.tmp"C:\Users\Admin\AppData\Local\Temp\F8B.tmp"87⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\1028.tmp"C:\Users\Admin\AppData\Local\Temp\1028.tmp"88⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\10A5.tmp"C:\Users\Admin\AppData\Local\Temp\10A5.tmp"89⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\1141.tmp"C:\Users\Admin\AppData\Local\Temp\1141.tmp"90⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\11CE.tmp"C:\Users\Admin\AppData\Local\Temp\11CE.tmp"91⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\123B.tmp"C:\Users\Admin\AppData\Local\Temp\123B.tmp"92⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\12E7.tmp"C:\Users\Admin\AppData\Local\Temp\12E7.tmp"93⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\1364.tmp"C:\Users\Admin\AppData\Local\Temp\1364.tmp"94⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\13D1.tmp"C:\Users\Admin\AppData\Local\Temp\13D1.tmp"95⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\146D.tmp"C:\Users\Admin\AppData\Local\Temp\146D.tmp"96⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\1539.tmp"C:\Users\Admin\AppData\Local\Temp\1539.tmp"97⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\15C5.tmp"C:\Users\Admin\AppData\Local\Temp\15C5.tmp"98⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\1642.tmp"C:\Users\Admin\AppData\Local\Temp\1642.tmp"99⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\16EE.tmp"C:\Users\Admin\AppData\Local\Temp\16EE.tmp"100⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\177B.tmp"C:\Users\Admin\AppData\Local\Temp\177B.tmp"101⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\17F8.tmp"C:\Users\Admin\AppData\Local\Temp\17F8.tmp"102⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\1894.tmp"C:\Users\Admin\AppData\Local\Temp\1894.tmp"103⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\1940.tmp"C:\Users\Admin\AppData\Local\Temp\1940.tmp"104⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\19DC.tmp"C:\Users\Admin\AppData\Local\Temp\19DC.tmp"105⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\1A78.tmp"C:\Users\Admin\AppData\Local\Temp\1A78.tmp"106⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\1B34.tmp"C:\Users\Admin\AppData\Local\Temp\1B34.tmp"107⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\1BFF.tmp"C:\Users\Admin\AppData\Local\Temp\1BFF.tmp"108⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"109⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\1D47.tmp"C:\Users\Admin\AppData\Local\Temp\1D47.tmp"110⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\1DC4.tmp"C:\Users\Admin\AppData\Local\Temp\1DC4.tmp"111⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"112⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"113⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2025.tmp"C:\Users\Admin\AppData\Local\Temp\2025.tmp"114⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\20A2.tmp"C:\Users\Admin\AppData\Local\Temp\20A2.tmp"115⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\215E.tmp"C:\Users\Admin\AppData\Local\Temp\215E.tmp"116⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\21DB.tmp"C:\Users\Admin\AppData\Local\Temp\21DB.tmp"117⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\22A6.tmp"C:\Users\Admin\AppData\Local\Temp\22A6.tmp"118⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\2352.tmp"C:\Users\Admin\AppData\Local\Temp\2352.tmp"119⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\23FE.tmp"C:\Users\Admin\AppData\Local\Temp\23FE.tmp"120⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\249A.tmp"C:\Users\Admin\AppData\Local\Temp\249A.tmp"121⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\2536.tmp"C:\Users\Admin\AppData\Local\Temp\2536.tmp"122⤵PID:4524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-