Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 12:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
af072094e833f5_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
af072094e833f5_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
af072094e833f5_JC.exe
-
Size
486KB
-
MD5
af072094e833f5806d67e992cd8641e0
-
SHA1
9f8bce3927ca4ac1f09f6842f10e43645b66f40e
-
SHA256
3aa2ea999ba9bc0ccd0472e10cd91b309564fb701cad067e8cb7816911e3328b
-
SHA512
55c9991814f6ec0a9146be7aedbe2837d5af1cc02c4e97cb6ed48cb310bdd938d428c94ecc39ea78fa836b22c6e85e645bd8cf27952d98b5d051e77a6ee5bfda
-
SSDEEP
12288:/U5rCOTeiDJNM52bM2z/IYcZceJSzpSNZ:/UQOJDL/vTtSN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4676 630F.tmp 4696 6409.tmp 5008 64B5.tmp 856 65EE.tmp 3556 666B.tmp 648 66F7.tmp 2064 6793.tmp 4820 685F.tmp 2772 6939.tmp 1260 6A53.tmp 4616 6BBA.tmp 1956 6C66.tmp 4852 6D21.tmp 4028 6DDD.tmp 1012 6E79.tmp 4272 6F25.tmp 2944 701F.tmp 2544 70DA.tmp 2992 7167.tmp 1544 7280.tmp 3760 735B.tmp 4812 7445.tmp 3120 7501.tmp 2844 75DC.tmp 2144 7688.tmp 2252 7733.tmp 2476 77DF.tmp 4116 78BA.tmp 1744 79A4.tmp 1604 7A50.tmp 1528 7B1B.tmp 4556 7C35.tmp 4480 7CF0.tmp 4224 7D7D.tmp 1900 7E19.tmp 3348 7EF4.tmp 1932 7FAF.tmp 5112 804C.tmp 2912 80F7.tmp 2564 81A3.tmp 1096 8240.tmp 1912 831A.tmp 3420 83B7.tmp 4408 8453.tmp 4508 84FF.tmp 5084 858B.tmp 4376 8628.tmp 1036 86B4.tmp 432 8750.tmp 2036 87BE.tmp 1452 882B.tmp 2056 8899.tmp 2676 8925.tmp 3468 8993.tmp 4040 89F0.tmp 856 8A5E.tmp 1092 8ADB.tmp 3920 8B67.tmp 4452 8BF4.tmp 4956 8C81.tmp 2188 8D0D.tmp 2008 8D9A.tmp 2092 8E17.tmp 924 8EA3.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4180 wrote to memory of 4676 4180 af072094e833f5_JC.exe 85 PID 4180 wrote to memory of 4676 4180 af072094e833f5_JC.exe 85 PID 4180 wrote to memory of 4676 4180 af072094e833f5_JC.exe 85 PID 4676 wrote to memory of 4696 4676 630F.tmp 86 PID 4676 wrote to memory of 4696 4676 630F.tmp 86 PID 4676 wrote to memory of 4696 4676 630F.tmp 86 PID 4696 wrote to memory of 5008 4696 6409.tmp 88 PID 4696 wrote to memory of 5008 4696 6409.tmp 88 PID 4696 wrote to memory of 5008 4696 6409.tmp 88 PID 5008 wrote to memory of 856 5008 64B5.tmp 89 PID 5008 wrote to memory of 856 5008 64B5.tmp 89 PID 5008 wrote to memory of 856 5008 64B5.tmp 89 PID 856 wrote to memory of 3556 856 65EE.tmp 90 PID 856 wrote to memory of 3556 856 65EE.tmp 90 PID 856 wrote to memory of 3556 856 65EE.tmp 90 PID 3556 wrote to memory of 648 3556 666B.tmp 91 PID 3556 wrote to memory of 648 3556 666B.tmp 91 PID 3556 wrote to memory of 648 3556 666B.tmp 91 PID 648 wrote to memory of 2064 648 66F7.tmp 92 PID 648 wrote to memory of 2064 648 66F7.tmp 92 PID 648 wrote to memory of 2064 648 66F7.tmp 92 PID 2064 wrote to memory of 4820 2064 6793.tmp 93 PID 2064 wrote to memory of 4820 2064 6793.tmp 93 PID 2064 wrote to memory of 4820 2064 6793.tmp 93 PID 4820 wrote to memory of 2772 4820 685F.tmp 94 PID 4820 wrote to memory of 2772 4820 685F.tmp 94 PID 4820 wrote to memory of 2772 4820 685F.tmp 94 PID 2772 wrote to memory of 1260 2772 6939.tmp 95 PID 2772 wrote to memory of 1260 2772 6939.tmp 95 PID 2772 wrote to memory of 1260 2772 6939.tmp 95 PID 1260 wrote to memory of 4616 1260 6A53.tmp 96 PID 1260 wrote to memory of 4616 1260 6A53.tmp 96 PID 1260 wrote to memory of 4616 1260 6A53.tmp 96 PID 4616 wrote to memory of 1956 4616 6BBA.tmp 97 PID 4616 wrote to memory of 1956 4616 6BBA.tmp 97 PID 4616 wrote to memory of 1956 4616 6BBA.tmp 97 PID 1956 wrote to memory of 4852 1956 6C66.tmp 98 PID 1956 wrote to memory of 4852 1956 6C66.tmp 98 PID 1956 wrote to memory of 4852 1956 6C66.tmp 98 PID 4852 wrote to memory of 4028 4852 6D21.tmp 99 PID 4852 wrote to memory of 4028 4852 6D21.tmp 99 PID 4852 wrote to memory of 4028 4852 6D21.tmp 99 PID 4028 wrote to memory of 1012 4028 6DDD.tmp 100 PID 4028 wrote to memory of 1012 4028 6DDD.tmp 100 PID 4028 wrote to memory of 1012 4028 6DDD.tmp 100 PID 1012 wrote to memory of 4272 1012 6E79.tmp 101 PID 1012 wrote to memory of 4272 1012 6E79.tmp 101 PID 1012 wrote to memory of 4272 1012 6E79.tmp 101 PID 4272 wrote to memory of 2944 4272 6F25.tmp 102 PID 4272 wrote to memory of 2944 4272 6F25.tmp 102 PID 4272 wrote to memory of 2944 4272 6F25.tmp 102 PID 2944 wrote to memory of 2544 2944 701F.tmp 103 PID 2944 wrote to memory of 2544 2944 701F.tmp 103 PID 2944 wrote to memory of 2544 2944 701F.tmp 103 PID 2544 wrote to memory of 2992 2544 70DA.tmp 104 PID 2544 wrote to memory of 2992 2544 70DA.tmp 104 PID 2544 wrote to memory of 2992 2544 70DA.tmp 104 PID 2992 wrote to memory of 1544 2992 7167.tmp 105 PID 2992 wrote to memory of 1544 2992 7167.tmp 105 PID 2992 wrote to memory of 1544 2992 7167.tmp 105 PID 1544 wrote to memory of 3760 1544 7280.tmp 106 PID 1544 wrote to memory of 3760 1544 7280.tmp 106 PID 1544 wrote to memory of 3760 1544 7280.tmp 106 PID 3760 wrote to memory of 4812 3760 735B.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\af072094e833f5_JC.exe"C:\Users\Admin\AppData\Local\Temp\af072094e833f5_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\630F.tmp"C:\Users\Admin\AppData\Local\Temp\630F.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\6409.tmp"C:\Users\Admin\AppData\Local\Temp\6409.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\64B5.tmp"C:\Users\Admin\AppData\Local\Temp\64B5.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\65EE.tmp"C:\Users\Admin\AppData\Local\Temp\65EE.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\666B.tmp"C:\Users\Admin\AppData\Local\Temp\666B.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\66F7.tmp"C:\Users\Admin\AppData\Local\Temp\66F7.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\6793.tmp"C:\Users\Admin\AppData\Local\Temp\6793.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\685F.tmp"C:\Users\Admin\AppData\Local\Temp\685F.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\6939.tmp"C:\Users\Admin\AppData\Local\Temp\6939.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\6A53.tmp"C:\Users\Admin\AppData\Local\Temp\6A53.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\6BBA.tmp"C:\Users\Admin\AppData\Local\Temp\6BBA.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\6C66.tmp"C:\Users\Admin\AppData\Local\Temp\6C66.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\6D21.tmp"C:\Users\Admin\AppData\Local\Temp\6D21.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\6DDD.tmp"C:\Users\Admin\AppData\Local\Temp\6DDD.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\6E79.tmp"C:\Users\Admin\AppData\Local\Temp\6E79.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\6F25.tmp"C:\Users\Admin\AppData\Local\Temp\6F25.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\701F.tmp"C:\Users\Admin\AppData\Local\Temp\701F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\70DA.tmp"C:\Users\Admin\AppData\Local\Temp\70DA.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\7167.tmp"C:\Users\Admin\AppData\Local\Temp\7167.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\7280.tmp"C:\Users\Admin\AppData\Local\Temp\7280.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\735B.tmp"C:\Users\Admin\AppData\Local\Temp\735B.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\7445.tmp"C:\Users\Admin\AppData\Local\Temp\7445.tmp"23⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\7501.tmp"C:\Users\Admin\AppData\Local\Temp\7501.tmp"24⤵
- Executes dropped EXE
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\75DC.tmp"C:\Users\Admin\AppData\Local\Temp\75DC.tmp"25⤵
- Executes dropped EXE
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\7688.tmp"C:\Users\Admin\AppData\Local\Temp\7688.tmp"26⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\7733.tmp"C:\Users\Admin\AppData\Local\Temp\7733.tmp"27⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\77DF.tmp"C:\Users\Admin\AppData\Local\Temp\77DF.tmp"28⤵
- Executes dropped EXE
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\78BA.tmp"C:\Users\Admin\AppData\Local\Temp\78BA.tmp"29⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\79A4.tmp"C:\Users\Admin\AppData\Local\Temp\79A4.tmp"30⤵
- Executes dropped EXE
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\7A50.tmp"C:\Users\Admin\AppData\Local\Temp\7A50.tmp"31⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\7B1B.tmp"C:\Users\Admin\AppData\Local\Temp\7B1B.tmp"32⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\7C35.tmp"C:\Users\Admin\AppData\Local\Temp\7C35.tmp"33⤵
- Executes dropped EXE
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"34⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\7D7D.tmp"C:\Users\Admin\AppData\Local\Temp\7D7D.tmp"35⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\7E19.tmp"C:\Users\Admin\AppData\Local\Temp\7E19.tmp"36⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\7EF4.tmp"C:\Users\Admin\AppData\Local\Temp\7EF4.tmp"37⤵
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\7FAF.tmp"C:\Users\Admin\AppData\Local\Temp\7FAF.tmp"38⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\804C.tmp"C:\Users\Admin\AppData\Local\Temp\804C.tmp"39⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\80F7.tmp"C:\Users\Admin\AppData\Local\Temp\80F7.tmp"40⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\81A3.tmp"C:\Users\Admin\AppData\Local\Temp\81A3.tmp"41⤵
- Executes dropped EXE
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\8240.tmp"C:\Users\Admin\AppData\Local\Temp\8240.tmp"42⤵
- Executes dropped EXE
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\831A.tmp"C:\Users\Admin\AppData\Local\Temp\831A.tmp"43⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\83B7.tmp"C:\Users\Admin\AppData\Local\Temp\83B7.tmp"44⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\8453.tmp"C:\Users\Admin\AppData\Local\Temp\8453.tmp"45⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\84FF.tmp"C:\Users\Admin\AppData\Local\Temp\84FF.tmp"46⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\858B.tmp"C:\Users\Admin\AppData\Local\Temp\858B.tmp"47⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\8628.tmp"C:\Users\Admin\AppData\Local\Temp\8628.tmp"48⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\86B4.tmp"C:\Users\Admin\AppData\Local\Temp\86B4.tmp"49⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\8750.tmp"C:\Users\Admin\AppData\Local\Temp\8750.tmp"50⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\87BE.tmp"C:\Users\Admin\AppData\Local\Temp\87BE.tmp"51⤵
- Executes dropped EXE
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\882B.tmp"C:\Users\Admin\AppData\Local\Temp\882B.tmp"52⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\8899.tmp"C:\Users\Admin\AppData\Local\Temp\8899.tmp"53⤵
- Executes dropped EXE
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\8925.tmp"C:\Users\Admin\AppData\Local\Temp\8925.tmp"54⤵
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\8993.tmp"C:\Users\Admin\AppData\Local\Temp\8993.tmp"55⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\89F0.tmp"C:\Users\Admin\AppData\Local\Temp\89F0.tmp"56⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\8A5E.tmp"C:\Users\Admin\AppData\Local\Temp\8A5E.tmp"57⤵
- Executes dropped EXE
PID:856 -
C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"58⤵
- Executes dropped EXE
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\8B67.tmp"C:\Users\Admin\AppData\Local\Temp\8B67.tmp"59⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\8BF4.tmp"C:\Users\Admin\AppData\Local\Temp\8BF4.tmp"60⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\8C81.tmp"C:\Users\Admin\AppData\Local\Temp\8C81.tmp"61⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\8D0D.tmp"C:\Users\Admin\AppData\Local\Temp\8D0D.tmp"62⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\8D9A.tmp"C:\Users\Admin\AppData\Local\Temp\8D9A.tmp"63⤵
- Executes dropped EXE
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\8E17.tmp"C:\Users\Admin\AppData\Local\Temp\8E17.tmp"64⤵
- Executes dropped EXE
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"65⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\8F11.tmp"C:\Users\Admin\AppData\Local\Temp\8F11.tmp"66⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\8F7E.tmp"C:\Users\Admin\AppData\Local\Temp\8F7E.tmp"67⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\900B.tmp"C:\Users\Admin\AppData\Local\Temp\900B.tmp"68⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\9078.tmp"C:\Users\Admin\AppData\Local\Temp\9078.tmp"69⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\9105.tmp"C:\Users\Admin\AppData\Local\Temp\9105.tmp"70⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\9182.tmp"C:\Users\Admin\AppData\Local\Temp\9182.tmp"71⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\91FF.tmp"C:\Users\Admin\AppData\Local\Temp\91FF.tmp"72⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\925D.tmp"C:\Users\Admin\AppData\Local\Temp\925D.tmp"73⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\92DA.tmp"C:\Users\Admin\AppData\Local\Temp\92DA.tmp"74⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\9366.tmp"C:\Users\Admin\AppData\Local\Temp\9366.tmp"75⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\93E3.tmp"C:\Users\Admin\AppData\Local\Temp\93E3.tmp"76⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\9441.tmp"C:\Users\Admin\AppData\Local\Temp\9441.tmp"77⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\94DD.tmp"C:\Users\Admin\AppData\Local\Temp\94DD.tmp"78⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\956A.tmp"C:\Users\Admin\AppData\Local\Temp\956A.tmp"79⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\95E7.tmp"C:\Users\Admin\AppData\Local\Temp\95E7.tmp"80⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\9673.tmp"C:\Users\Admin\AppData\Local\Temp\9673.tmp"81⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\9700.tmp"C:\Users\Admin\AppData\Local\Temp\9700.tmp"82⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\978D.tmp"C:\Users\Admin\AppData\Local\Temp\978D.tmp"83⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\980A.tmp"C:\Users\Admin\AppData\Local\Temp\980A.tmp"84⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\9887.tmp"C:\Users\Admin\AppData\Local\Temp\9887.tmp"85⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\98F4.tmp"C:\Users\Admin\AppData\Local\Temp\98F4.tmp"86⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\99A0.tmp"C:\Users\Admin\AppData\Local\Temp\99A0.tmp"87⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"88⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\9A9A.tmp"C:\Users\Admin\AppData\Local\Temp\9A9A.tmp"89⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\9B36.tmp"C:\Users\Admin\AppData\Local\Temp\9B36.tmp"90⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"91⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\9C4F.tmp"C:\Users\Admin\AppData\Local\Temp\9C4F.tmp"92⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\9CDC.tmp"C:\Users\Admin\AppData\Local\Temp\9CDC.tmp"93⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\9D69.tmp"C:\Users\Admin\AppData\Local\Temp\9D69.tmp"94⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\9DE6.tmp"C:\Users\Admin\AppData\Local\Temp\9DE6.tmp"95⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\9E82.tmp"C:\Users\Admin\AppData\Local\Temp\9E82.tmp"96⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\9F0F.tmp"C:\Users\Admin\AppData\Local\Temp\9F0F.tmp"97⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\9FAB.tmp"C:\Users\Admin\AppData\Local\Temp\9FAB.tmp"98⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\A047.tmp"C:\Users\Admin\AppData\Local\Temp\A047.tmp"99⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\A0B4.tmp"C:\Users\Admin\AppData\Local\Temp\A0B4.tmp"100⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\A19F.tmp"C:\Users\Admin\AppData\Local\Temp\A19F.tmp"101⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\A23B.tmp"C:\Users\Admin\AppData\Local\Temp\A23B.tmp"102⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\A2A8.tmp"C:\Users\Admin\AppData\Local\Temp\A2A8.tmp"103⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\A316.tmp"C:\Users\Admin\AppData\Local\Temp\A316.tmp"104⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\A3A2.tmp"C:\Users\Admin\AppData\Local\Temp\A3A2.tmp"105⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\A43F.tmp"C:\Users\Admin\AppData\Local\Temp\A43F.tmp"106⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"107⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\A558.tmp"C:\Users\Admin\AppData\Local\Temp\A558.tmp"108⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\A5D5.tmp"C:\Users\Admin\AppData\Local\Temp\A5D5.tmp"109⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\A662.tmp"C:\Users\Admin\AppData\Local\Temp\A662.tmp"110⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\A6DF.tmp"C:\Users\Admin\AppData\Local\Temp\A6DF.tmp"111⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\A74C.tmp"C:\Users\Admin\AppData\Local\Temp\A74C.tmp"112⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"113⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\A836.tmp"C:\Users\Admin\AppData\Local\Temp\A836.tmp"114⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\A8C3.tmp"C:\Users\Admin\AppData\Local\Temp\A8C3.tmp"115⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\A940.tmp"C:\Users\Admin\AppData\Local\Temp\A940.tmp"116⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\A9BD.tmp"C:\Users\Admin\AppData\Local\Temp\A9BD.tmp"117⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\AA4A.tmp"C:\Users\Admin\AppData\Local\Temp\AA4A.tmp"118⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"119⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\AB63.tmp"C:\Users\Admin\AppData\Local\Temp\AB63.tmp"120⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\AD57.tmp"C:\Users\Admin\AppData\Local\Temp\AD57.tmp"121⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"122⤵PID:3872
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-