Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2023, 13:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NA_NA_3bacc4cab6d566exeexe_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NA_NA_3bacc4cab6d566exeexe_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
NA_NA_3bacc4cab6d566exeexe_JC.exe
-
Size
520KB
-
MD5
3bacc4cab6d5662ec6d1c7e8d65fe89d
-
SHA1
85f9cdaed6d2a46db24b796bbe89114df1863262
-
SHA256
d9d89cb31087f8ee45dda45ead04ed8b7866ce8932f3d8ff8b91467be1e2b65a
-
SHA512
139ccd8417c1772f6399e7a2fa0b104cfb73e7e96d379a1b5a489a4512b65768ad89f713c0b9a777a997ddc55250f7dbdf35c38b2a5d42c4069c28bb8db1fe2b
-
SSDEEP
12288:L4RXuADWOwrh1T8n8SbeLI9GzcLUV/3RjETNZ:L4gAtw1On8OGzRfoTN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3316 98F4.tmp 1676 99EE.tmp 4276 9A9A.tmp 208 9BA4.tmp 2588 9C7E.tmp 3836 9D49.tmp 2264 9E15.tmp 4764 9F0F.tmp 4124 9FCA.tmp 4036 A0C4.tmp 4856 A160.tmp 4984 A21C.tmp 2328 A2D7.tmp 2572 A42F.tmp 1704 A4AC.tmp 3904 A539.tmp 3340 A5C5.tmp 4976 A662.tmp 3492 A6FE.tmp 4144 A7E8.tmp 2188 A884.tmp 2860 A901.tmp 5048 A9DC.tmp 3460 AAA7.tmp 4320 AB63.tmp 1688 AC0F.tmp 660 AC9B.tmp 2932 AD18.tmp 2208 ADD4.tmp 2468 B15E.tmp 3348 B229.tmp 400 B2E5.tmp 4848 B3EE.tmp 1592 B46B.tmp 4932 B4D9.tmp 2716 B546.tmp 3076 B5B3.tmp 1976 B630.tmp 3588 B68E.tmp 3764 B6EC.tmp 216 B769.tmp 3532 B7E6.tmp 1692 B844.tmp 3536 B8E0.tmp 1716 B95D.tmp 4620 B9EA.tmp 4504 BA86.tmp 4692 BB22.tmp 3524 BBAF.tmp 3768 BC5B.tmp 3556 BCE7.tmp 4264 BD64.tmp 4684 BDE1.tmp 1580 BE5E.tmp 2572 BEBC.tmp 2992 BF68.tmp 3876 BFD5.tmp 4596 C052.tmp 4344 C0DF.tmp 716 C15C.tmp 3828 C1E8.tmp 4580 C265.tmp 112 C2F2.tmp 3460 C37F.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 3316 2596 NA_NA_3bacc4cab6d566exeexe_JC.exe 86 PID 2596 wrote to memory of 3316 2596 NA_NA_3bacc4cab6d566exeexe_JC.exe 86 PID 2596 wrote to memory of 3316 2596 NA_NA_3bacc4cab6d566exeexe_JC.exe 86 PID 3316 wrote to memory of 1676 3316 98F4.tmp 87 PID 3316 wrote to memory of 1676 3316 98F4.tmp 87 PID 3316 wrote to memory of 1676 3316 98F4.tmp 87 PID 1676 wrote to memory of 4276 1676 99EE.tmp 88 PID 1676 wrote to memory of 4276 1676 99EE.tmp 88 PID 1676 wrote to memory of 4276 1676 99EE.tmp 88 PID 4276 wrote to memory of 208 4276 9A9A.tmp 89 PID 4276 wrote to memory of 208 4276 9A9A.tmp 89 PID 4276 wrote to memory of 208 4276 9A9A.tmp 89 PID 208 wrote to memory of 2588 208 9BA4.tmp 90 PID 208 wrote to memory of 2588 208 9BA4.tmp 90 PID 208 wrote to memory of 2588 208 9BA4.tmp 90 PID 2588 wrote to memory of 3836 2588 9C7E.tmp 91 PID 2588 wrote to memory of 3836 2588 9C7E.tmp 91 PID 2588 wrote to memory of 3836 2588 9C7E.tmp 91 PID 3836 wrote to memory of 2264 3836 9D49.tmp 92 PID 3836 wrote to memory of 2264 3836 9D49.tmp 92 PID 3836 wrote to memory of 2264 3836 9D49.tmp 92 PID 2264 wrote to memory of 4764 2264 9E15.tmp 93 PID 2264 wrote to memory of 4764 2264 9E15.tmp 93 PID 2264 wrote to memory of 4764 2264 9E15.tmp 93 PID 4764 wrote to memory of 4124 4764 9F0F.tmp 94 PID 4764 wrote to memory of 4124 4764 9F0F.tmp 94 PID 4764 wrote to memory of 4124 4764 9F0F.tmp 94 PID 4124 wrote to memory of 4036 4124 9FCA.tmp 95 PID 4124 wrote to memory of 4036 4124 9FCA.tmp 95 PID 4124 wrote to memory of 4036 4124 9FCA.tmp 95 PID 4036 wrote to memory of 4856 4036 A0C4.tmp 96 PID 4036 wrote to memory of 4856 4036 A0C4.tmp 96 PID 4036 wrote to memory of 4856 4036 A0C4.tmp 96 PID 4856 wrote to memory of 4984 4856 A160.tmp 97 PID 4856 wrote to memory of 4984 4856 A160.tmp 97 PID 4856 wrote to memory of 4984 4856 A160.tmp 97 PID 4984 wrote to memory of 2328 4984 A21C.tmp 98 PID 4984 wrote to memory of 2328 4984 A21C.tmp 98 PID 4984 wrote to memory of 2328 4984 A21C.tmp 98 PID 2328 wrote to memory of 2572 2328 A2D7.tmp 99 PID 2328 wrote to memory of 2572 2328 A2D7.tmp 99 PID 2328 wrote to memory of 2572 2328 A2D7.tmp 99 PID 2572 wrote to memory of 1704 2572 A42F.tmp 100 PID 2572 wrote to memory of 1704 2572 A42F.tmp 100 PID 2572 wrote to memory of 1704 2572 A42F.tmp 100 PID 1704 wrote to memory of 3904 1704 A4AC.tmp 103 PID 1704 wrote to memory of 3904 1704 A4AC.tmp 103 PID 1704 wrote to memory of 3904 1704 A4AC.tmp 103 PID 3904 wrote to memory of 3340 3904 A539.tmp 104 PID 3904 wrote to memory of 3340 3904 A539.tmp 104 PID 3904 wrote to memory of 3340 3904 A539.tmp 104 PID 3340 wrote to memory of 4976 3340 A5C5.tmp 105 PID 3340 wrote to memory of 4976 3340 A5C5.tmp 105 PID 3340 wrote to memory of 4976 3340 A5C5.tmp 105 PID 4976 wrote to memory of 3492 4976 A662.tmp 106 PID 4976 wrote to memory of 3492 4976 A662.tmp 106 PID 4976 wrote to memory of 3492 4976 A662.tmp 106 PID 3492 wrote to memory of 4144 3492 A6FE.tmp 107 PID 3492 wrote to memory of 4144 3492 A6FE.tmp 107 PID 3492 wrote to memory of 4144 3492 A6FE.tmp 107 PID 4144 wrote to memory of 2188 4144 A7E8.tmp 109 PID 4144 wrote to memory of 2188 4144 A7E8.tmp 109 PID 4144 wrote to memory of 2188 4144 A7E8.tmp 109 PID 2188 wrote to memory of 2860 2188 A884.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_3bacc4cab6d566exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NA_NA_3bacc4cab6d566exeexe_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\98F4.tmp"C:\Users\Admin\AppData\Local\Temp\98F4.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\99EE.tmp"C:\Users\Admin\AppData\Local\Temp\99EE.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\9A9A.tmp"C:\Users\Admin\AppData\Local\Temp\9A9A.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\9BA4.tmp"C:\Users\Admin\AppData\Local\Temp\9BA4.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\9D49.tmp"C:\Users\Admin\AppData\Local\Temp\9D49.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\9E15.tmp"C:\Users\Admin\AppData\Local\Temp\9E15.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\9F0F.tmp"C:\Users\Admin\AppData\Local\Temp\9F0F.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\9FCA.tmp"C:\Users\Admin\AppData\Local\Temp\9FCA.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\A0C4.tmp"C:\Users\Admin\AppData\Local\Temp\A0C4.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\A160.tmp"C:\Users\Admin\AppData\Local\Temp\A160.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\A21C.tmp"C:\Users\Admin\AppData\Local\Temp\A21C.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\A2D7.tmp"C:\Users\Admin\AppData\Local\Temp\A2D7.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\A42F.tmp"C:\Users\Admin\AppData\Local\Temp\A42F.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\A4AC.tmp"C:\Users\Admin\AppData\Local\Temp\A4AC.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\A539.tmp"C:\Users\Admin\AppData\Local\Temp\A539.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\A5C5.tmp"C:\Users\Admin\AppData\Local\Temp\A5C5.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\A662.tmp"C:\Users\Admin\AppData\Local\Temp\A662.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\A6FE.tmp"C:\Users\Admin\AppData\Local\Temp\A6FE.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\A7E8.tmp"C:\Users\Admin\AppData\Local\Temp\A7E8.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\A884.tmp"C:\Users\Admin\AppData\Local\Temp\A884.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\A901.tmp"C:\Users\Admin\AppData\Local\Temp\A901.tmp"23⤵
- Executes dropped EXE
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\A9DC.tmp"C:\Users\Admin\AppData\Local\Temp\A9DC.tmp"24⤵
- Executes dropped EXE
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\AAA7.tmp"C:\Users\Admin\AppData\Local\Temp\AAA7.tmp"25⤵
- Executes dropped EXE
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\AB63.tmp"C:\Users\Admin\AppData\Local\Temp\AB63.tmp"26⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"27⤵
- Executes dropped EXE
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"28⤵
- Executes dropped EXE
PID:660 -
C:\Users\Admin\AppData\Local\Temp\AD18.tmp"C:\Users\Admin\AppData\Local\Temp\AD18.tmp"29⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"30⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\B15E.tmp"C:\Users\Admin\AppData\Local\Temp\B15E.tmp"31⤵
- Executes dropped EXE
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\B229.tmp"C:\Users\Admin\AppData\Local\Temp\B229.tmp"32⤵
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\B2E5.tmp"C:\Users\Admin\AppData\Local\Temp\B2E5.tmp"33⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"34⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\B46B.tmp"C:\Users\Admin\AppData\Local\Temp\B46B.tmp"35⤵
- Executes dropped EXE
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"36⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\B546.tmp"C:\Users\Admin\AppData\Local\Temp\B546.tmp"37⤵
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\B5B3.tmp"C:\Users\Admin\AppData\Local\Temp\B5B3.tmp"38⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\B630.tmp"C:\Users\Admin\AppData\Local\Temp\B630.tmp"39⤵
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\B68E.tmp"C:\Users\Admin\AppData\Local\Temp\B68E.tmp"40⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"41⤵
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\B769.tmp"C:\Users\Admin\AppData\Local\Temp\B769.tmp"42⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"43⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\B844.tmp"C:\Users\Admin\AppData\Local\Temp\B844.tmp"44⤵
- Executes dropped EXE
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\B8E0.tmp"C:\Users\Admin\AppData\Local\Temp\B8E0.tmp"45⤵
- Executes dropped EXE
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\B95D.tmp"C:\Users\Admin\AppData\Local\Temp\B95D.tmp"46⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\B9EA.tmp"C:\Users\Admin\AppData\Local\Temp\B9EA.tmp"47⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\BA86.tmp"C:\Users\Admin\AppData\Local\Temp\BA86.tmp"48⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\BB22.tmp"C:\Users\Admin\AppData\Local\Temp\BB22.tmp"49⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\BBAF.tmp"C:\Users\Admin\AppData\Local\Temp\BBAF.tmp"50⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"51⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\BCE7.tmp"C:\Users\Admin\AppData\Local\Temp\BCE7.tmp"52⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\BD64.tmp"C:\Users\Admin\AppData\Local\Temp\BD64.tmp"53⤵
- Executes dropped EXE
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"54⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\BE5E.tmp"C:\Users\Admin\AppData\Local\Temp\BE5E.tmp"55⤵
- Executes dropped EXE
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\BEBC.tmp"C:\Users\Admin\AppData\Local\Temp\BEBC.tmp"56⤵
- Executes dropped EXE
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\BF68.tmp"C:\Users\Admin\AppData\Local\Temp\BF68.tmp"57⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"58⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\C052.tmp"C:\Users\Admin\AppData\Local\Temp\C052.tmp"59⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"60⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\C15C.tmp"C:\Users\Admin\AppData\Local\Temp\C15C.tmp"61⤵
- Executes dropped EXE
PID:716 -
C:\Users\Admin\AppData\Local\Temp\C1E8.tmp"C:\Users\Admin\AppData\Local\Temp\C1E8.tmp"62⤵
- Executes dropped EXE
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\C265.tmp"C:\Users\Admin\AppData\Local\Temp\C265.tmp"63⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\C2F2.tmp"C:\Users\Admin\AppData\Local\Temp\C2F2.tmp"64⤵
- Executes dropped EXE
PID:112 -
C:\Users\Admin\AppData\Local\Temp\C37F.tmp"C:\Users\Admin\AppData\Local\Temp\C37F.tmp"65⤵
- Executes dropped EXE
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\C3DC.tmp"C:\Users\Admin\AppData\Local\Temp\C3DC.tmp"66⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\C44A.tmp"C:\Users\Admin\AppData\Local\Temp\C44A.tmp"67⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"68⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\C563.tmp"C:\Users\Admin\AppData\Local\Temp\C563.tmp"69⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"70⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\C67C.tmp"C:\Users\Admin\AppData\Local\Temp\C67C.tmp"71⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\C719.tmp"C:\Users\Admin\AppData\Local\Temp\C719.tmp"72⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\C796.tmp"C:\Users\Admin\AppData\Local\Temp\C796.tmp"73⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\C822.tmp"C:\Users\Admin\AppData\Local\Temp\C822.tmp"74⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"75⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\C94B.tmp"C:\Users\Admin\AppData\Local\Temp\C94B.tmp"76⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"77⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\CA26.tmp"C:\Users\Admin\AppData\Local\Temp\CA26.tmp"78⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\CAB2.tmp"C:\Users\Admin\AppData\Local\Temp\CAB2.tmp"79⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"80⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\CBDB.tmp"C:\Users\Admin\AppData\Local\Temp\CBDB.tmp"81⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\CC49.tmp"C:\Users\Admin\AppData\Local\Temp\CC49.tmp"82⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\CCF5.tmp"C:\Users\Admin\AppData\Local\Temp\CCF5.tmp"83⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"84⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"85⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\CE7B.tmp"C:\Users\Admin\AppData\Local\Temp\CE7B.tmp"86⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"87⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\CF75.tmp"C:\Users\Admin\AppData\Local\Temp\CF75.tmp"88⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\D011.tmp"C:\Users\Admin\AppData\Local\Temp\D011.tmp"89⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\D07F.tmp"C:\Users\Admin\AppData\Local\Temp\D07F.tmp"90⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\D0FC.tmp"C:\Users\Admin\AppData\Local\Temp\D0FC.tmp"91⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\D169.tmp"C:\Users\Admin\AppData\Local\Temp\D169.tmp"92⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\D1D7.tmp"C:\Users\Admin\AppData\Local\Temp\D1D7.tmp"93⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\D234.tmp"C:\Users\Admin\AppData\Local\Temp\D234.tmp"94⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"95⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\D33E.tmp"C:\Users\Admin\AppData\Local\Temp\D33E.tmp"96⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"97⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\D419.tmp"C:\Users\Admin\AppData\Local\Temp\D419.tmp"98⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\D496.tmp"C:\Users\Admin\AppData\Local\Temp\D496.tmp"99⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\D522.tmp"C:\Users\Admin\AppData\Local\Temp\D522.tmp"100⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\D590.tmp"C:\Users\Admin\AppData\Local\Temp\D590.tmp"101⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"102⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\D66A.tmp"C:\Users\Admin\AppData\Local\Temp\D66A.tmp"103⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"104⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\D764.tmp"C:\Users\Admin\AppData\Local\Temp\D764.tmp"105⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\D7F1.tmp"C:\Users\Admin\AppData\Local\Temp\D7F1.tmp"106⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\D85E.tmp"C:\Users\Admin\AppData\Local\Temp\D85E.tmp"107⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"C:\Users\Admin\AppData\Local\Temp\D8EB.tmp"108⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\D978.tmp"C:\Users\Admin\AppData\Local\Temp\D978.tmp"109⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"110⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\DAA1.tmp"C:\Users\Admin\AppData\Local\Temp\DAA1.tmp"111⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\DB0E.tmp"C:\Users\Admin\AppData\Local\Temp\DB0E.tmp"112⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"113⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\DC18.tmp"C:\Users\Admin\AppData\Local\Temp\DC18.tmp"114⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\DC95.tmp"C:\Users\Admin\AppData\Local\Temp\DC95.tmp"115⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\DD31.tmp"C:\Users\Admin\AppData\Local\Temp\DD31.tmp"116⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"117⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\DE2B.tmp"C:\Users\Admin\AppData\Local\Temp\DE2B.tmp"118⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\DED7.tmp"C:\Users\Admin\AppData\Local\Temp\DED7.tmp"119⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\DF54.tmp"C:\Users\Admin\AppData\Local\Temp\DF54.tmp"120⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"121⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\E04E.tmp"C:\Users\Admin\AppData\Local\Temp\E04E.tmp"122⤵PID:4536
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-