Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2023, 20:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
10dae2fdf87b11exe_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
10dae2fdf87b11exe_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
10dae2fdf87b11exe_JC.exe
-
Size
486KB
-
MD5
10dae2fdf87b11707b5821ecbefe6537
-
SHA1
03824a3523b3b8db91bba42a5422a77a1836f9ae
-
SHA256
9d85f961320cbefa830e5a76d952dec4b2fda4092e80f216d3f18ba880f8ad99
-
SHA512
1d6b445abb692a6c2e21eeda62c95fcfebba4bd0752be8d82b6c730c5dc64124abd7e5573ac9dee63a596385171d436fbf4fda9386b804fcaf922957b327fdb0
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7OBmN/6YVxTN4oJh1j+vR7Ozkt20GAzcUcvNf:/U5rCOTeiDsm5PijPtmbSjcNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4976 AE22.tmp 4108 AEDD.tmp 2056 AF89.tmp 988 B026.tmp 208 B13F.tmp 2356 B1FA.tmp 3260 B2A6.tmp 3876 B333.tmp 2300 B3B0.tmp 4208 B45C.tmp 4348 B508.tmp 5044 B5A4.tmp 2188 B66F.tmp 4188 B70B.tmp 5096 B805.tmp 2632 B8F0.tmp 2960 B9BB.tmp 2916 BA95.tmp 2668 BB80.tmp 372 BC3B.tmp 1760 BCF7.tmp 4988 BDB2.tmp 2332 BE4F.tmp 3672 BF1A.tmp 1076 C014.tmp 3232 C0C0.tmp 4912 C1C9.tmp 3724 C2A4.tmp 2736 C38E.tmp 4024 C469.tmp 116 C573.tmp 3224 C69C.tmp 3808 C7B5.tmp 3200 C880.tmp 3064 C91C.tmp 4636 C9A9.tmp 3352 CA84.tmp 5100 CB10.tmp 1980 CB9D.tmp 3040 CC58.tmp 1528 CD23.tmp 3256 CE4C.tmp 3460 CEF8.tmp 1548 CF94.tmp 3116 D021.tmp 4976 D0AE.tmp 4456 D169.tmp 3120 D1F6.tmp 2368 D2B1.tmp 1796 D34E.tmp 3840 D3CB.tmp 1284 D457.tmp 1280 D4D4.tmp 820 D551.tmp 4184 D5BF.tmp 1680 D64B.tmp 2476 D6F7.tmp 4932 D793.tmp 2584 D83F.tmp 4212 D8EB.tmp 5044 D987.tmp 212 DA24.tmp 1960 DA91.tmp 1464 DAFE.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2828 wrote to memory of 4976 2828 10dae2fdf87b11exe_JC.exe 85 PID 2828 wrote to memory of 4976 2828 10dae2fdf87b11exe_JC.exe 85 PID 2828 wrote to memory of 4976 2828 10dae2fdf87b11exe_JC.exe 85 PID 4976 wrote to memory of 4108 4976 AE22.tmp 86 PID 4976 wrote to memory of 4108 4976 AE22.tmp 86 PID 4976 wrote to memory of 4108 4976 AE22.tmp 86 PID 4108 wrote to memory of 2056 4108 AEDD.tmp 87 PID 4108 wrote to memory of 2056 4108 AEDD.tmp 87 PID 4108 wrote to memory of 2056 4108 AEDD.tmp 87 PID 2056 wrote to memory of 988 2056 AF89.tmp 88 PID 2056 wrote to memory of 988 2056 AF89.tmp 88 PID 2056 wrote to memory of 988 2056 AF89.tmp 88 PID 988 wrote to memory of 208 988 B026.tmp 89 PID 988 wrote to memory of 208 988 B026.tmp 89 PID 988 wrote to memory of 208 988 B026.tmp 89 PID 208 wrote to memory of 2356 208 B13F.tmp 90 PID 208 wrote to memory of 2356 208 B13F.tmp 90 PID 208 wrote to memory of 2356 208 B13F.tmp 90 PID 2356 wrote to memory of 3260 2356 B1FA.tmp 91 PID 2356 wrote to memory of 3260 2356 B1FA.tmp 91 PID 2356 wrote to memory of 3260 2356 B1FA.tmp 91 PID 3260 wrote to memory of 3876 3260 B2A6.tmp 92 PID 3260 wrote to memory of 3876 3260 B2A6.tmp 92 PID 3260 wrote to memory of 3876 3260 B2A6.tmp 92 PID 3876 wrote to memory of 2300 3876 B333.tmp 93 PID 3876 wrote to memory of 2300 3876 B333.tmp 93 PID 3876 wrote to memory of 2300 3876 B333.tmp 93 PID 2300 wrote to memory of 4208 2300 B3B0.tmp 94 PID 2300 wrote to memory of 4208 2300 B3B0.tmp 94 PID 2300 wrote to memory of 4208 2300 B3B0.tmp 94 PID 4208 wrote to memory of 4348 4208 B45C.tmp 95 PID 4208 wrote to memory of 4348 4208 B45C.tmp 95 PID 4208 wrote to memory of 4348 4208 B45C.tmp 95 PID 4348 wrote to memory of 5044 4348 B508.tmp 96 PID 4348 wrote to memory of 5044 4348 B508.tmp 96 PID 4348 wrote to memory of 5044 4348 B508.tmp 96 PID 5044 wrote to memory of 2188 5044 B5A4.tmp 98 PID 5044 wrote to memory of 2188 5044 B5A4.tmp 98 PID 5044 wrote to memory of 2188 5044 B5A4.tmp 98 PID 2188 wrote to memory of 4188 2188 B66F.tmp 100 PID 2188 wrote to memory of 4188 2188 B66F.tmp 100 PID 2188 wrote to memory of 4188 2188 B66F.tmp 100 PID 4188 wrote to memory of 5096 4188 B70B.tmp 101 PID 4188 wrote to memory of 5096 4188 B70B.tmp 101 PID 4188 wrote to memory of 5096 4188 B70B.tmp 101 PID 5096 wrote to memory of 2632 5096 B805.tmp 102 PID 5096 wrote to memory of 2632 5096 B805.tmp 102 PID 5096 wrote to memory of 2632 5096 B805.tmp 102 PID 2632 wrote to memory of 2960 2632 B8F0.tmp 104 PID 2632 wrote to memory of 2960 2632 B8F0.tmp 104 PID 2632 wrote to memory of 2960 2632 B8F0.tmp 104 PID 2960 wrote to memory of 2916 2960 B9BB.tmp 105 PID 2960 wrote to memory of 2916 2960 B9BB.tmp 105 PID 2960 wrote to memory of 2916 2960 B9BB.tmp 105 PID 2916 wrote to memory of 2668 2916 BA95.tmp 106 PID 2916 wrote to memory of 2668 2916 BA95.tmp 106 PID 2916 wrote to memory of 2668 2916 BA95.tmp 106 PID 2668 wrote to memory of 372 2668 BB80.tmp 107 PID 2668 wrote to memory of 372 2668 BB80.tmp 107 PID 2668 wrote to memory of 372 2668 BB80.tmp 107 PID 372 wrote to memory of 1760 372 BC3B.tmp 108 PID 372 wrote to memory of 1760 372 BC3B.tmp 108 PID 372 wrote to memory of 1760 372 BC3B.tmp 108 PID 1760 wrote to memory of 4988 1760 BCF7.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\10dae2fdf87b11exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\10dae2fdf87b11exe_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\AE22.tmp"C:\Users\Admin\AppData\Local\Temp\AE22.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\AEDD.tmp"C:\Users\Admin\AppData\Local\Temp\AEDD.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\AF89.tmp"C:\Users\Admin\AppData\Local\Temp\AF89.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\B026.tmp"C:\Users\Admin\AppData\Local\Temp\B026.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\B13F.tmp"C:\Users\Admin\AppData\Local\Temp\B13F.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\B1FA.tmp"C:\Users\Admin\AppData\Local\Temp\B1FA.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\B333.tmp"C:\Users\Admin\AppData\Local\Temp\B333.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\B3B0.tmp"C:\Users\Admin\AppData\Local\Temp\B3B0.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\B45C.tmp"C:\Users\Admin\AppData\Local\Temp\B45C.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\B508.tmp"C:\Users\Admin\AppData\Local\Temp\B508.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\B66F.tmp"C:\Users\Admin\AppData\Local\Temp\B66F.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\B70B.tmp"C:\Users\Admin\AppData\Local\Temp\B70B.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\B805.tmp"C:\Users\Admin\AppData\Local\Temp\B805.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\B8F0.tmp"C:\Users\Admin\AppData\Local\Temp\B8F0.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\B9BB.tmp"C:\Users\Admin\AppData\Local\Temp\B9BB.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\BA95.tmp"C:\Users\Admin\AppData\Local\Temp\BA95.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\BB80.tmp"C:\Users\Admin\AppData\Local\Temp\BB80.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\BCF7.tmp"C:\Users\Admin\AppData\Local\Temp\BCF7.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"23⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"24⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\BF1A.tmp"C:\Users\Admin\AppData\Local\Temp\BF1A.tmp"25⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\C014.tmp"C:\Users\Admin\AppData\Local\Temp\C014.tmp"26⤵
- Executes dropped EXE
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"27⤵
- Executes dropped EXE
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\C1C9.tmp"C:\Users\Admin\AppData\Local\Temp\C1C9.tmp"28⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"29⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\C38E.tmp"C:\Users\Admin\AppData\Local\Temp\C38E.tmp"30⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\C469.tmp"C:\Users\Admin\AppData\Local\Temp\C469.tmp"31⤵
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\C573.tmp"C:\Users\Admin\AppData\Local\Temp\C573.tmp"32⤵
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\C69C.tmp"C:\Users\Admin\AppData\Local\Temp\C69C.tmp"33⤵
- Executes dropped EXE
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"34⤵
- Executes dropped EXE
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\C880.tmp"C:\Users\Admin\AppData\Local\Temp\C880.tmp"35⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\C91C.tmp"C:\Users\Admin\AppData\Local\Temp\C91C.tmp"36⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\C9A9.tmp"C:\Users\Admin\AppData\Local\Temp\C9A9.tmp"37⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\CA84.tmp"C:\Users\Admin\AppData\Local\Temp\CA84.tmp"38⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\CB10.tmp"C:\Users\Admin\AppData\Local\Temp\CB10.tmp"39⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"40⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\CC58.tmp"C:\Users\Admin\AppData\Local\Temp\CC58.tmp"41⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\CD23.tmp"C:\Users\Admin\AppData\Local\Temp\CD23.tmp"42⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"43⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"44⤵
- Executes dropped EXE
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\CF94.tmp"C:\Users\Admin\AppData\Local\Temp\CF94.tmp"45⤵
- Executes dropped EXE
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\D021.tmp"C:\Users\Admin\AppData\Local\Temp\D021.tmp"46⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"47⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\D169.tmp"C:\Users\Admin\AppData\Local\Temp\D169.tmp"48⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"49⤵
- Executes dropped EXE
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"50⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\D34E.tmp"C:\Users\Admin\AppData\Local\Temp\D34E.tmp"51⤵
- Executes dropped EXE
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"52⤵
- Executes dropped EXE
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\D457.tmp"C:\Users\Admin\AppData\Local\Temp\D457.tmp"53⤵
- Executes dropped EXE
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"54⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\D551.tmp"C:\Users\Admin\AppData\Local\Temp\D551.tmp"55⤵
- Executes dropped EXE
PID:820 -
C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"56⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\D64B.tmp"C:\Users\Admin\AppData\Local\Temp\D64B.tmp"57⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"58⤵
- Executes dropped EXE
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\D793.tmp"C:\Users\Admin\AppData\Local\Temp\D793.tmp"59⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\D83F.tmp"C:\Users\Admin\AppData\Local\Temp\D83F.tmp"60⤵
- Executes dropped EXE
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"61⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\D987.tmp"C:\Users\Admin\AppData\Local\Temp\D987.tmp"62⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\DA24.tmp"C:\Users\Admin\AppData\Local\Temp\DA24.tmp"63⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\DA91.tmp"C:\Users\Admin\AppData\Local\Temp\DA91.tmp"64⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\DAFE.tmp"C:\Users\Admin\AppData\Local\Temp\DAFE.tmp"65⤵
- Executes dropped EXE
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"66⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"67⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\DC66.tmp"C:\Users\Admin\AppData\Local\Temp\DC66.tmp"68⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\DCD3.tmp"C:\Users\Admin\AppData\Local\Temp\DCD3.tmp"69⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\DD40.tmp"C:\Users\Admin\AppData\Local\Temp\DD40.tmp"70⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"71⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"72⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\DEF6.tmp"C:\Users\Admin\AppData\Local\Temp\DEF6.tmp"73⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\DF92.tmp"C:\Users\Admin\AppData\Local\Temp\DF92.tmp"74⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\E01F.tmp"C:\Users\Admin\AppData\Local\Temp\E01F.tmp"75⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\E09C.tmp"C:\Users\Admin\AppData\Local\Temp\E09C.tmp"76⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\E128.tmp"C:\Users\Admin\AppData\Local\Temp\E128.tmp"77⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\E196.tmp"C:\Users\Admin\AppData\Local\Temp\E196.tmp"78⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\E232.tmp"C:\Users\Admin\AppData\Local\Temp\E232.tmp"79⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\E2BF.tmp"C:\Users\Admin\AppData\Local\Temp\E2BF.tmp"80⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\E34B.tmp"C:\Users\Admin\AppData\Local\Temp\E34B.tmp"81⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\E3E8.tmp"C:\Users\Admin\AppData\Local\Temp\E3E8.tmp"82⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\E474.tmp"C:\Users\Admin\AppData\Local\Temp\E474.tmp"83⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\E520.tmp"C:\Users\Admin\AppData\Local\Temp\E520.tmp"84⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\E59D.tmp"C:\Users\Admin\AppData\Local\Temp\E59D.tmp"85⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\E687.tmp"C:\Users\Admin\AppData\Local\Temp\E687.tmp"86⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\E724.tmp"C:\Users\Admin\AppData\Local\Temp\E724.tmp"87⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\E7D0.tmp"C:\Users\Admin\AppData\Local\Temp\E7D0.tmp"88⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\E87B.tmp"C:\Users\Admin\AppData\Local\Temp\E87B.tmp"89⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\E908.tmp"C:\Users\Admin\AppData\Local\Temp\E908.tmp"90⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\E9A4.tmp"C:\Users\Admin\AppData\Local\Temp\E9A4.tmp"91⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\EA21.tmp"C:\Users\Admin\AppData\Local\Temp\EA21.tmp"92⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\EA9E.tmp"C:\Users\Admin\AppData\Local\Temp\EA9E.tmp"93⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\EB1B.tmp"C:\Users\Admin\AppData\Local\Temp\EB1B.tmp"94⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"C:\Users\Admin\AppData\Local\Temp\EBB8.tmp"95⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\EC54.tmp"C:\Users\Admin\AppData\Local\Temp\EC54.tmp"96⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\ECE0.tmp"C:\Users\Admin\AppData\Local\Temp\ECE0.tmp"97⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"98⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\EE19.tmp"C:\Users\Admin\AppData\Local\Temp\EE19.tmp"99⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"100⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\EF23.tmp"C:\Users\Admin\AppData\Local\Temp\EF23.tmp"101⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\EFDE.tmp"C:\Users\Admin\AppData\Local\Temp\EFDE.tmp"102⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\F05B.tmp"C:\Users\Admin\AppData\Local\Temp\F05B.tmp"103⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\F0E8.tmp"C:\Users\Admin\AppData\Local\Temp\F0E8.tmp"104⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\F155.tmp"C:\Users\Admin\AppData\Local\Temp\F155.tmp"105⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"106⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\F26E.tmp"C:\Users\Admin\AppData\Local\Temp\F26E.tmp"107⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\F30B.tmp"C:\Users\Admin\AppData\Local\Temp\F30B.tmp"108⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\F397.tmp"C:\Users\Admin\AppData\Local\Temp\F397.tmp"109⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\F405.tmp"C:\Users\Admin\AppData\Local\Temp\F405.tmp"110⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\F482.tmp"C:\Users\Admin\AppData\Local\Temp\F482.tmp"111⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"C:\Users\Admin\AppData\Local\Temp\F4FF.tmp"112⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\F58B.tmp"C:\Users\Admin\AppData\Local\Temp\F58B.tmp"113⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\F627.tmp"C:\Users\Admin\AppData\Local\Temp\F627.tmp"114⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\F6C4.tmp"C:\Users\Admin\AppData\Local\Temp\F6C4.tmp"115⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\F750.tmp"C:\Users\Admin\AppData\Local\Temp\F750.tmp"116⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"117⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\F879.tmp"C:\Users\Admin\AppData\Local\Temp\F879.tmp"118⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\F925.tmp"C:\Users\Admin\AppData\Local\Temp\F925.tmp"119⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\F9B2.tmp"C:\Users\Admin\AppData\Local\Temp\F9B2.tmp"120⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"121⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\FABB.tmp"C:\Users\Admin\AppData\Local\Temp\FABB.tmp"122⤵PID:2784
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-