Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 15:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b15dc2f5dedcc5exeexeexeex.exe
Resource
win7-20230705-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
b15dc2f5dedcc5exeexeexeex.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
b15dc2f5dedcc5exeexeexeex.exe
-
Size
488KB
-
MD5
b15dc2f5dedcc57f1618d94f7a12b961
-
SHA1
6379fd354dd281c5060862cc8ed8680e1082c92c
-
SHA256
0e498107a9422d9fce63e7e4a6cf2a791823079b5aa5f7ffe260085a65a4804e
-
SHA512
cfa56fa76e5d04a3949741c0492003b79300737fdb7d6f11d927df3079c6379ec5dc133f9c3a1619d360002aa72d649e1cc9eb2553dc341b1f2f9f65e41daab4
-
SSDEEP
12288:/U5rCOTeiDPKVeZ8C1ZklBNc13B6GKsvhNZ:/UQOJDYC3SNcZMYvhN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4136 CCC6.tmp 220 CDA0.tmp 4528 CE8B.tmp 484 CF56.tmp 4544 D040.tmp 708 D10B.tmp 1800 D215.tmp 1848 D2B1.tmp 3196 D3AB.tmp 2660 D467.tmp 2608 D522.tmp 1424 D5BF.tmp 3400 D67A.tmp 3760 D736.tmp 2372 D830.tmp 4456 DA43.tmp 2108 DAC0.tmp 2900 DB9B.tmp 3964 DC75.tmp 3332 DDAE.tmp 3364 DE5A.tmp 3956 DF25.tmp 4280 E000.tmp 3952 E0EA.tmp 1572 E203.tmp 4940 E32C.tmp 3244 E416.tmp 4908 E501.tmp 408 E61A.tmp 2128 E724.tmp 3152 E7D0.tmp 5020 E87B.tmp 5044 E947.tmp 2732 E9C4.tmp 2800 EA8F.tmp 496 EB5A.tmp 4400 EC15.tmp 4016 ECA2.tmp 5052 ED5D.tmp 4304 EDDA.tmp 2216 EEB5.tmp 1380 EF71.tmp 3992 F01D.tmp 2872 F0C8.tmp 1960 F165.tmp 3252 F211.tmp 4984 F2CC.tmp 4956 F3A7.tmp 2148 F453.tmp 2276 F52D.tmp 4788 F5CA.tmp 1780 F656.tmp 3852 F6F3.tmp 3524 F79E.tmp 420 F83B.tmp 4340 F8C7.tmp 4720 F983.tmp 4244 FA3E.tmp 4800 FADB.tmp 1364 FBA6.tmp 4036 FC52.tmp 2068 FCEE.tmp 4076 FD8A.tmp 3972 FE26.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 4136 1792 b15dc2f5dedcc5exeexeexeex.exe 84 PID 1792 wrote to memory of 4136 1792 b15dc2f5dedcc5exeexeexeex.exe 84 PID 1792 wrote to memory of 4136 1792 b15dc2f5dedcc5exeexeexeex.exe 84 PID 4136 wrote to memory of 220 4136 CCC6.tmp 85 PID 4136 wrote to memory of 220 4136 CCC6.tmp 85 PID 4136 wrote to memory of 220 4136 CCC6.tmp 85 PID 220 wrote to memory of 4528 220 CDA0.tmp 86 PID 220 wrote to memory of 4528 220 CDA0.tmp 86 PID 220 wrote to memory of 4528 220 CDA0.tmp 86 PID 4528 wrote to memory of 484 4528 CE8B.tmp 87 PID 4528 wrote to memory of 484 4528 CE8B.tmp 87 PID 4528 wrote to memory of 484 4528 CE8B.tmp 87 PID 484 wrote to memory of 4544 484 CF56.tmp 88 PID 484 wrote to memory of 4544 484 CF56.tmp 88 PID 484 wrote to memory of 4544 484 CF56.tmp 88 PID 4544 wrote to memory of 708 4544 D040.tmp 89 PID 4544 wrote to memory of 708 4544 D040.tmp 89 PID 4544 wrote to memory of 708 4544 D040.tmp 89 PID 708 wrote to memory of 1800 708 D10B.tmp 90 PID 708 wrote to memory of 1800 708 D10B.tmp 90 PID 708 wrote to memory of 1800 708 D10B.tmp 90 PID 1800 wrote to memory of 1848 1800 D215.tmp 91 PID 1800 wrote to memory of 1848 1800 D215.tmp 91 PID 1800 wrote to memory of 1848 1800 D215.tmp 91 PID 1848 wrote to memory of 3196 1848 D2B1.tmp 92 PID 1848 wrote to memory of 3196 1848 D2B1.tmp 92 PID 1848 wrote to memory of 3196 1848 D2B1.tmp 92 PID 3196 wrote to memory of 2660 3196 D3AB.tmp 93 PID 3196 wrote to memory of 2660 3196 D3AB.tmp 93 PID 3196 wrote to memory of 2660 3196 D3AB.tmp 93 PID 2660 wrote to memory of 2608 2660 D467.tmp 94 PID 2660 wrote to memory of 2608 2660 D467.tmp 94 PID 2660 wrote to memory of 2608 2660 D467.tmp 94 PID 2608 wrote to memory of 1424 2608 D522.tmp 95 PID 2608 wrote to memory of 1424 2608 D522.tmp 95 PID 2608 wrote to memory of 1424 2608 D522.tmp 95 PID 1424 wrote to memory of 3400 1424 D5BF.tmp 96 PID 1424 wrote to memory of 3400 1424 D5BF.tmp 96 PID 1424 wrote to memory of 3400 1424 D5BF.tmp 96 PID 3400 wrote to memory of 3760 3400 D67A.tmp 97 PID 3400 wrote to memory of 3760 3400 D67A.tmp 97 PID 3400 wrote to memory of 3760 3400 D67A.tmp 97 PID 3760 wrote to memory of 2372 3760 D736.tmp 98 PID 3760 wrote to memory of 2372 3760 D736.tmp 98 PID 3760 wrote to memory of 2372 3760 D736.tmp 98 PID 2372 wrote to memory of 4456 2372 D830.tmp 99 PID 2372 wrote to memory of 4456 2372 D830.tmp 99 PID 2372 wrote to memory of 4456 2372 D830.tmp 99 PID 4456 wrote to memory of 2108 4456 DA43.tmp 100 PID 4456 wrote to memory of 2108 4456 DA43.tmp 100 PID 4456 wrote to memory of 2108 4456 DA43.tmp 100 PID 2108 wrote to memory of 2900 2108 DAC0.tmp 101 PID 2108 wrote to memory of 2900 2108 DAC0.tmp 101 PID 2108 wrote to memory of 2900 2108 DAC0.tmp 101 PID 2900 wrote to memory of 3964 2900 DB9B.tmp 102 PID 2900 wrote to memory of 3964 2900 DB9B.tmp 102 PID 2900 wrote to memory of 3964 2900 DB9B.tmp 102 PID 3964 wrote to memory of 3332 3964 DC75.tmp 103 PID 3964 wrote to memory of 3332 3964 DC75.tmp 103 PID 3964 wrote to memory of 3332 3964 DC75.tmp 103 PID 3332 wrote to memory of 3364 3332 DDAE.tmp 104 PID 3332 wrote to memory of 3364 3332 DDAE.tmp 104 PID 3332 wrote to memory of 3364 3332 DDAE.tmp 104 PID 3364 wrote to memory of 3956 3364 DE5A.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\b15dc2f5dedcc5exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\b15dc2f5dedcc5exeexeexeex.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\CCC6.tmp"C:\Users\Admin\AppData\Local\Temp\CCC6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\CF56.tmp"C:\Users\Admin\AppData\Local\Temp\CF56.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\D040.tmp"C:\Users\Admin\AppData\Local\Temp\D040.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\D10B.tmp"C:\Users\Admin\AppData\Local\Temp\D10B.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\D215.tmp"C:\Users\Admin\AppData\Local\Temp\D215.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\D467.tmp"C:\Users\Admin\AppData\Local\Temp\D467.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\D522.tmp"C:\Users\Admin\AppData\Local\Temp\D522.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\D67A.tmp"C:\Users\Admin\AppData\Local\Temp\D67A.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\D736.tmp"C:\Users\Admin\AppData\Local\Temp\D736.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\D830.tmp"C:\Users\Admin\AppData\Local\Temp\D830.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\DA43.tmp"C:\Users\Admin\AppData\Local\Temp\DA43.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\DC75.tmp"C:\Users\Admin\AppData\Local\Temp\DC75.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\DF25.tmp"C:\Users\Admin\AppData\Local\Temp\DF25.tmp"23⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\E000.tmp"C:\Users\Admin\AppData\Local\Temp\E000.tmp"24⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"25⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\E203.tmp"C:\Users\Admin\AppData\Local\Temp\E203.tmp"26⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\E32C.tmp"C:\Users\Admin\AppData\Local\Temp\E32C.tmp"27⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\E416.tmp"C:\Users\Admin\AppData\Local\Temp\E416.tmp"28⤵
- Executes dropped EXE
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\E501.tmp"C:\Users\Admin\AppData\Local\Temp\E501.tmp"29⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\E61A.tmp"C:\Users\Admin\AppData\Local\Temp\E61A.tmp"30⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\E724.tmp"C:\Users\Admin\AppData\Local\Temp\E724.tmp"31⤵
- Executes dropped EXE
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\E7D0.tmp"C:\Users\Admin\AppData\Local\Temp\E7D0.tmp"32⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\E87B.tmp"C:\Users\Admin\AppData\Local\Temp\E87B.tmp"33⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\E947.tmp"C:\Users\Admin\AppData\Local\Temp\E947.tmp"34⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"35⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"C:\Users\Admin\AppData\Local\Temp\EA8F.tmp"36⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\EB5A.tmp"C:\Users\Admin\AppData\Local\Temp\EB5A.tmp"37⤵
- Executes dropped EXE
PID:496 -
C:\Users\Admin\AppData\Local\Temp\EC15.tmp"C:\Users\Admin\AppData\Local\Temp\EC15.tmp"38⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"39⤵
- Executes dropped EXE
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"40⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"41⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\EEB5.tmp"C:\Users\Admin\AppData\Local\Temp\EEB5.tmp"42⤵
- Executes dropped EXE
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\EF71.tmp"C:\Users\Admin\AppData\Local\Temp\EF71.tmp"43⤵
- Executes dropped EXE
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"44⤵
- Executes dropped EXE
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"45⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\F165.tmp"C:\Users\Admin\AppData\Local\Temp\F165.tmp"46⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\F211.tmp"C:\Users\Admin\AppData\Local\Temp\F211.tmp"47⤵
- Executes dropped EXE
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"48⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\F3A7.tmp"C:\Users\Admin\AppData\Local\Temp\F3A7.tmp"49⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\F453.tmp"C:\Users\Admin\AppData\Local\Temp\F453.tmp"50⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\F52D.tmp"C:\Users\Admin\AppData\Local\Temp\F52D.tmp"51⤵
- Executes dropped EXE
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\F5CA.tmp"C:\Users\Admin\AppData\Local\Temp\F5CA.tmp"52⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\F656.tmp"C:\Users\Admin\AppData\Local\Temp\F656.tmp"53⤵
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"C:\Users\Admin\AppData\Local\Temp\F6F3.tmp"54⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\F79E.tmp"C:\Users\Admin\AppData\Local\Temp\F79E.tmp"55⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\F83B.tmp"C:\Users\Admin\AppData\Local\Temp\F83B.tmp"56⤵
- Executes dropped EXE
PID:420 -
C:\Users\Admin\AppData\Local\Temp\F8C7.tmp"C:\Users\Admin\AppData\Local\Temp\F8C7.tmp"57⤵
- Executes dropped EXE
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\F983.tmp"C:\Users\Admin\AppData\Local\Temp\F983.tmp"58⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"59⤵
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\FADB.tmp"C:\Users\Admin\AppData\Local\Temp\FADB.tmp"60⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"61⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"62⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"63⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"64⤵
- Executes dropped EXE
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\FE26.tmp"C:\Users\Admin\AppData\Local\Temp\FE26.tmp"65⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\FEC3.tmp"C:\Users\Admin\AppData\Local\Temp\FEC3.tmp"66⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\FF40.tmp"C:\Users\Admin\AppData\Local\Temp\FF40.tmp"67⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"68⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\68.tmp"C:\Users\Admin\AppData\Local\Temp\68.tmp"69⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\134.tmp"C:\Users\Admin\AppData\Local\Temp\134.tmp"70⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\1EF.tmp"C:\Users\Admin\AppData\Local\Temp\1EF.tmp"71⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\28B.tmp"C:\Users\Admin\AppData\Local\Temp\28B.tmp"72⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\328.tmp"C:\Users\Admin\AppData\Local\Temp\328.tmp"73⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\3B4.tmp"C:\Users\Admin\AppData\Local\Temp\3B4.tmp"74⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\47F.tmp"C:\Users\Admin\AppData\Local\Temp\47F.tmp"75⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\50C.tmp"C:\Users\Admin\AppData\Local\Temp\50C.tmp"76⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\589.tmp"C:\Users\Admin\AppData\Local\Temp\589.tmp"77⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\635.tmp"C:\Users\Admin\AppData\Local\Temp\635.tmp"78⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\6E1.tmp"C:\Users\Admin\AppData\Local\Temp\6E1.tmp"79⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\75E.tmp"C:\Users\Admin\AppData\Local\Temp\75E.tmp"80⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\7EA.tmp"C:\Users\Admin\AppData\Local\Temp\7EA.tmp"81⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\8B5.tmp"C:\Users\Admin\AppData\Local\Temp\8B5.tmp"82⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\981.tmp"C:\Users\Admin\AppData\Local\Temp\981.tmp"83⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\A0D.tmp"C:\Users\Admin\AppData\Local\Temp\A0D.tmp"84⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\AD8.tmp"C:\Users\Admin\AppData\Local\Temp\AD8.tmp"85⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\B94.tmp"C:\Users\Admin\AppData\Local\Temp\B94.tmp"86⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp"87⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\CEC.tmp"C:\Users\Admin\AppData\Local\Temp\CEC.tmp"88⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"89⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\E34.tmp"C:\Users\Admin\AppData\Local\Temp\E34.tmp"90⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\ED0.tmp"C:\Users\Admin\AppData\Local\Temp\ED0.tmp"91⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\F9B.tmp"C:\Users\Admin\AppData\Local\Temp\F9B.tmp"92⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\1037.tmp"C:\Users\Admin\AppData\Local\Temp\1037.tmp"93⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\10F3.tmp"C:\Users\Admin\AppData\Local\Temp\10F3.tmp"94⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\11BE.tmp"C:\Users\Admin\AppData\Local\Temp\11BE.tmp"95⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\124B.tmp"C:\Users\Admin\AppData\Local\Temp\124B.tmp"96⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\12C8.tmp"C:\Users\Admin\AppData\Local\Temp\12C8.tmp"97⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\1354.tmp"C:\Users\Admin\AppData\Local\Temp\1354.tmp"98⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\13F0.tmp"C:\Users\Admin\AppData\Local\Temp\13F0.tmp"99⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\149C.tmp"C:\Users\Admin\AppData\Local\Temp\149C.tmp"100⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\1548.tmp"C:\Users\Admin\AppData\Local\Temp\1548.tmp"101⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\15F4.tmp"C:\Users\Admin\AppData\Local\Temp\15F4.tmp"102⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\16A0.tmp"C:\Users\Admin\AppData\Local\Temp\16A0.tmp"103⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\175B.tmp"C:\Users\Admin\AppData\Local\Temp\175B.tmp"104⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\17D8.tmp"C:\Users\Admin\AppData\Local\Temp\17D8.tmp"105⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\1894.tmp"C:\Users\Admin\AppData\Local\Temp\1894.tmp"106⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\1930.tmp"C:\Users\Admin\AppData\Local\Temp\1930.tmp"107⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\19DC.tmp"C:\Users\Admin\AppData\Local\Temp\19DC.tmp"108⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\1A98.tmp"C:\Users\Admin\AppData\Local\Temp\1A98.tmp"109⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\1B24.tmp"C:\Users\Admin\AppData\Local\Temp\1B24.tmp"110⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"111⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"112⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\1D09.tmp"C:\Users\Admin\AppData\Local\Temp\1D09.tmp"113⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"114⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\1E70.tmp"C:\Users\Admin\AppData\Local\Temp\1E70.tmp"115⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\1EFD.tmp"C:\Users\Admin\AppData\Local\Temp\1EFD.tmp"116⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"117⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\2006.tmp"C:\Users\Admin\AppData\Local\Temp\2006.tmp"118⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\20A2.tmp"C:\Users\Admin\AppData\Local\Temp\20A2.tmp"119⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\216E.tmp"C:\Users\Admin\AppData\Local\Temp\216E.tmp"120⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\220A.tmp"C:\Users\Admin\AppData\Local\Temp\220A.tmp"121⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\22A6.tmp"C:\Users\Admin\AppData\Local\Temp\22A6.tmp"122⤵PID:3396
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-