Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
66dbec9915b3b92121bda14ffbc91dd61647d3528edf3cd8a8d178d2e13522eb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
66dbec9915b3b92121bda14ffbc91dd61647d3528edf3cd8a8d178d2e13522eb.exe
Resource
win10v2004-20230915-en
General
-
Target
66dbec9915b3b92121bda14ffbc91dd61647d3528edf3cd8a8d178d2e13522eb.exe
-
Size
486KB
-
MD5
f5e20c00403d7e00a59e841630340e81
-
SHA1
51c4f2ae30de27b0f23f0f9872aa058a0ffc774e
-
SHA256
66dbec9915b3b92121bda14ffbc91dd61647d3528edf3cd8a8d178d2e13522eb
-
SHA512
59a3efd92075e0d018868b3f8f96193a57379cd0de5eb496748da0b1aecb29ca92be63ecb5bee0406ef44cfe8117c211ba64951fd16593ab72fa78453ce31ccc
-
SSDEEP
12288:oU5rCOTeiDIxKBLlwkF8pcy2JjDFv2vNZ:oUQOJDeKBLtF80JPFv2vN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1768 72A0.tmp 1860 734B.tmp 1728 73F7.tmp 1460 74C2.tmp 4368 755F.tmp 4876 7659.tmp 1864 7705.tmp 532 77B0.tmp 2564 784D.tmp 492 78BA.tmp 2520 7985.tmp 2536 7A60.tmp 1800 86B4.tmp 4160 A24B.tmp 888 A4DB.tmp 4424 A73C.tmp 860 A7D9.tmp 1328 A856.tmp 1392 A921.tmp 1520 A9BD.tmp 3860 AA88.tmp 1528 AB24.tmp 4688 ABB1.tmp 3304 AC9B.tmp 2884 AD18.tmp 5068 ADC4.tmp 980 AE60.tmp 4904 AEDD.tmp 2760 AF6A.tmp 2056 B074.tmp 2492 B100.tmp 3732 B18D.tmp 320 B20A.tmp 1092 BB8F.tmp 4496 C36F.tmp 3512 C6EA.tmp 4420 DAB0.tmp 3048 E0FA.tmp 2724 EF90.tmp 1460 F397.tmp 4368 F618.tmp 1084 F685.tmp 5004 9CF.tmp 4448 A9A.tmp 3136 B75.tmp 4268 C8E.tmp 220 D78.tmp 4636 DF5.tmp 4880 EA1.tmp 4596 F7C.tmp 2592 1028.tmp 3936 10C4.tmp 4364 1141.tmp 2216 11CE.tmp 2856 126A.tmp 1836 12D7.tmp 4944 1354.tmp 2536 13D1.tmp 4800 144E.tmp 2076 15F4.tmp 888 1671.tmp 2980 170D.tmp 3312 17B9.tmp 2692 1875.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4756 wrote to memory of 1768 4756 66dbec9915b3b92121bda14ffbc91dd61647d3528edf3cd8a8d178d2e13522eb.exe 83 PID 4756 wrote to memory of 1768 4756 66dbec9915b3b92121bda14ffbc91dd61647d3528edf3cd8a8d178d2e13522eb.exe 83 PID 4756 wrote to memory of 1768 4756 66dbec9915b3b92121bda14ffbc91dd61647d3528edf3cd8a8d178d2e13522eb.exe 83 PID 1768 wrote to memory of 1860 1768 72A0.tmp 84 PID 1768 wrote to memory of 1860 1768 72A0.tmp 84 PID 1768 wrote to memory of 1860 1768 72A0.tmp 84 PID 1860 wrote to memory of 1728 1860 734B.tmp 85 PID 1860 wrote to memory of 1728 1860 734B.tmp 85 PID 1860 wrote to memory of 1728 1860 734B.tmp 85 PID 1728 wrote to memory of 1460 1728 73F7.tmp 86 PID 1728 wrote to memory of 1460 1728 73F7.tmp 86 PID 1728 wrote to memory of 1460 1728 73F7.tmp 86 PID 1460 wrote to memory of 4368 1460 74C2.tmp 87 PID 1460 wrote to memory of 4368 1460 74C2.tmp 87 PID 1460 wrote to memory of 4368 1460 74C2.tmp 87 PID 4368 wrote to memory of 4876 4368 755F.tmp 88 PID 4368 wrote to memory of 4876 4368 755F.tmp 88 PID 4368 wrote to memory of 4876 4368 755F.tmp 88 PID 4876 wrote to memory of 1864 4876 7659.tmp 89 PID 4876 wrote to memory of 1864 4876 7659.tmp 89 PID 4876 wrote to memory of 1864 4876 7659.tmp 89 PID 1864 wrote to memory of 532 1864 7705.tmp 90 PID 1864 wrote to memory of 532 1864 7705.tmp 90 PID 1864 wrote to memory of 532 1864 7705.tmp 90 PID 532 wrote to memory of 2564 532 77B0.tmp 91 PID 532 wrote to memory of 2564 532 77B0.tmp 91 PID 532 wrote to memory of 2564 532 77B0.tmp 91 PID 2564 wrote to memory of 492 2564 784D.tmp 92 PID 2564 wrote to memory of 492 2564 784D.tmp 92 PID 2564 wrote to memory of 492 2564 784D.tmp 92 PID 492 wrote to memory of 2520 492 78BA.tmp 93 PID 492 wrote to memory of 2520 492 78BA.tmp 93 PID 492 wrote to memory of 2520 492 78BA.tmp 93 PID 2520 wrote to memory of 2536 2520 7985.tmp 94 PID 2520 wrote to memory of 2536 2520 7985.tmp 94 PID 2520 wrote to memory of 2536 2520 7985.tmp 94 PID 2536 wrote to memory of 1800 2536 7A60.tmp 95 PID 2536 wrote to memory of 1800 2536 7A60.tmp 95 PID 2536 wrote to memory of 1800 2536 7A60.tmp 95 PID 1800 wrote to memory of 4160 1800 86B4.tmp 96 PID 1800 wrote to memory of 4160 1800 86B4.tmp 96 PID 1800 wrote to memory of 4160 1800 86B4.tmp 96 PID 4160 wrote to memory of 888 4160 A24B.tmp 97 PID 4160 wrote to memory of 888 4160 A24B.tmp 97 PID 4160 wrote to memory of 888 4160 A24B.tmp 97 PID 888 wrote to memory of 4424 888 A4DB.tmp 98 PID 888 wrote to memory of 4424 888 A4DB.tmp 98 PID 888 wrote to memory of 4424 888 A4DB.tmp 98 PID 4424 wrote to memory of 860 4424 A73C.tmp 99 PID 4424 wrote to memory of 860 4424 A73C.tmp 99 PID 4424 wrote to memory of 860 4424 A73C.tmp 99 PID 860 wrote to memory of 1328 860 A7D9.tmp 102 PID 860 wrote to memory of 1328 860 A7D9.tmp 102 PID 860 wrote to memory of 1328 860 A7D9.tmp 102 PID 1328 wrote to memory of 1392 1328 A856.tmp 103 PID 1328 wrote to memory of 1392 1328 A856.tmp 103 PID 1328 wrote to memory of 1392 1328 A856.tmp 103 PID 1392 wrote to memory of 1520 1392 A921.tmp 104 PID 1392 wrote to memory of 1520 1392 A921.tmp 104 PID 1392 wrote to memory of 1520 1392 A921.tmp 104 PID 1520 wrote to memory of 3860 1520 A9BD.tmp 105 PID 1520 wrote to memory of 3860 1520 A9BD.tmp 105 PID 1520 wrote to memory of 3860 1520 A9BD.tmp 105 PID 3860 wrote to memory of 1528 3860 AA88.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\66dbec9915b3b92121bda14ffbc91dd61647d3528edf3cd8a8d178d2e13522eb.exe"C:\Users\Admin\AppData\Local\Temp\66dbec9915b3b92121bda14ffbc91dd61647d3528edf3cd8a8d178d2e13522eb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\72A0.tmp"C:\Users\Admin\AppData\Local\Temp\72A0.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\734B.tmp"C:\Users\Admin\AppData\Local\Temp\734B.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\73F7.tmp"C:\Users\Admin\AppData\Local\Temp\73F7.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\74C2.tmp"C:\Users\Admin\AppData\Local\Temp\74C2.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\755F.tmp"C:\Users\Admin\AppData\Local\Temp\755F.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\7659.tmp"C:\Users\Admin\AppData\Local\Temp\7659.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\7705.tmp"C:\Users\Admin\AppData\Local\Temp\7705.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\77B0.tmp"C:\Users\Admin\AppData\Local\Temp\77B0.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\784D.tmp"C:\Users\Admin\AppData\Local\Temp\784D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\78BA.tmp"C:\Users\Admin\AppData\Local\Temp\78BA.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\7985.tmp"C:\Users\Admin\AppData\Local\Temp\7985.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\7A60.tmp"C:\Users\Admin\AppData\Local\Temp\7A60.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\86B4.tmp"C:\Users\Admin\AppData\Local\Temp\86B4.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\A24B.tmp"C:\Users\Admin\AppData\Local\Temp\A24B.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\A73C.tmp"C:\Users\Admin\AppData\Local\Temp\A73C.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\A7D9.tmp"C:\Users\Admin\AppData\Local\Temp\A7D9.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\A856.tmp"C:\Users\Admin\AppData\Local\Temp\A856.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\A921.tmp"C:\Users\Admin\AppData\Local\Temp\A921.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\A9BD.tmp"C:\Users\Admin\AppData\Local\Temp\A9BD.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\AA88.tmp"C:\Users\Admin\AppData\Local\Temp\AA88.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\AB24.tmp"C:\Users\Admin\AppData\Local\Temp\AB24.tmp"23⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\ABB1.tmp"C:\Users\Admin\AppData\Local\Temp\ABB1.tmp"24⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"25⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\AD18.tmp"C:\Users\Admin\AppData\Local\Temp\AD18.tmp"26⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"27⤵
- Executes dropped EXE
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\AE60.tmp"C:\Users\Admin\AppData\Local\Temp\AE60.tmp"28⤵
- Executes dropped EXE
PID:980 -
C:\Users\Admin\AppData\Local\Temp\AEDD.tmp"C:\Users\Admin\AppData\Local\Temp\AEDD.tmp"29⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\AF6A.tmp"C:\Users\Admin\AppData\Local\Temp\AF6A.tmp"30⤵
- Executes dropped EXE
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\B074.tmp"C:\Users\Admin\AppData\Local\Temp\B074.tmp"31⤵
- Executes dropped EXE
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\B100.tmp"C:\Users\Admin\AppData\Local\Temp\B100.tmp"32⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\B18D.tmp"C:\Users\Admin\AppData\Local\Temp\B18D.tmp"33⤵
- Executes dropped EXE
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\B20A.tmp"C:\Users\Admin\AppData\Local\Temp\B20A.tmp"34⤵
- Executes dropped EXE
PID:320 -
C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"35⤵
- Executes dropped EXE
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\C36F.tmp"C:\Users\Admin\AppData\Local\Temp\C36F.tmp"36⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\C6EA.tmp"C:\Users\Admin\AppData\Local\Temp\C6EA.tmp"37⤵
- Executes dropped EXE
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\D2E0.tmp"C:\Users\Admin\AppData\Local\Temp\D2E0.tmp"38⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"39⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"40⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\EF90.tmp"C:\Users\Admin\AppData\Local\Temp\EF90.tmp"41⤵
- Executes dropped EXE
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\F397.tmp"C:\Users\Admin\AppData\Local\Temp\F397.tmp"42⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\F618.tmp"C:\Users\Admin\AppData\Local\Temp\F618.tmp"43⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\F685.tmp"C:\Users\Admin\AppData\Local\Temp\F685.tmp"44⤵
- Executes dropped EXE
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\9CF.tmp"C:\Users\Admin\AppData\Local\Temp\9CF.tmp"45⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\A9A.tmp"C:\Users\Admin\AppData\Local\Temp\A9A.tmp"46⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\B75.tmp"C:\Users\Admin\AppData\Local\Temp\B75.tmp"47⤵
- Executes dropped EXE
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\C8E.tmp"C:\Users\Admin\AppData\Local\Temp\C8E.tmp"48⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\D78.tmp"C:\Users\Admin\AppData\Local\Temp\D78.tmp"49⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\DF5.tmp"C:\Users\Admin\AppData\Local\Temp\DF5.tmp"50⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\EA1.tmp"C:\Users\Admin\AppData\Local\Temp\EA1.tmp"51⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\F7C.tmp"C:\Users\Admin\AppData\Local\Temp\F7C.tmp"52⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\1028.tmp"C:\Users\Admin\AppData\Local\Temp\1028.tmp"53⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\10C4.tmp"C:\Users\Admin\AppData\Local\Temp\10C4.tmp"54⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\1141.tmp"C:\Users\Admin\AppData\Local\Temp\1141.tmp"55⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\11CE.tmp"C:\Users\Admin\AppData\Local\Temp\11CE.tmp"56⤵
- Executes dropped EXE
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\126A.tmp"C:\Users\Admin\AppData\Local\Temp\126A.tmp"57⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\12D7.tmp"C:\Users\Admin\AppData\Local\Temp\12D7.tmp"58⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\1354.tmp"C:\Users\Admin\AppData\Local\Temp\1354.tmp"59⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\13D1.tmp"C:\Users\Admin\AppData\Local\Temp\13D1.tmp"60⤵
- Executes dropped EXE
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\144E.tmp"C:\Users\Admin\AppData\Local\Temp\144E.tmp"61⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\15F4.tmp"C:\Users\Admin\AppData\Local\Temp\15F4.tmp"62⤵
- Executes dropped EXE
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\1671.tmp"C:\Users\Admin\AppData\Local\Temp\1671.tmp"63⤵
- Executes dropped EXE
PID:888 -
C:\Users\Admin\AppData\Local\Temp\170D.tmp"C:\Users\Admin\AppData\Local\Temp\170D.tmp"64⤵
- Executes dropped EXE
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\17B9.tmp"C:\Users\Admin\AppData\Local\Temp\17B9.tmp"65⤵
- Executes dropped EXE
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\1875.tmp"C:\Users\Admin\AppData\Local\Temp\1875.tmp"66⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\194F.tmp"C:\Users\Admin\AppData\Local\Temp\194F.tmp"67⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\19CC.tmp"C:\Users\Admin\AppData\Local\Temp\19CC.tmp"68⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\1A69.tmp"C:\Users\Admin\AppData\Local\Temp\1A69.tmp"69⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\1B24.tmp"C:\Users\Admin\AppData\Local\Temp\1B24.tmp"70⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\1B92.tmp"C:\Users\Admin\AppData\Local\Temp\1B92.tmp"71⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\1C4D.tmp"C:\Users\Admin\AppData\Local\Temp\1C4D.tmp"72⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\1D09.tmp"C:\Users\Admin\AppData\Local\Temp\1D09.tmp"73⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\1D86.tmp"C:\Users\Admin\AppData\Local\Temp\1D86.tmp"74⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\1E03.tmp"C:\Users\Admin\AppData\Local\Temp\1E03.tmp"75⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"76⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\1F6A.tmp"C:\Users\Admin\AppData\Local\Temp\1F6A.tmp"77⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"78⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\2064.tmp"C:\Users\Admin\AppData\Local\Temp\2064.tmp"79⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\20D1.tmp"C:\Users\Admin\AppData\Local\Temp\20D1.tmp"80⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\213F.tmp"C:\Users\Admin\AppData\Local\Temp\213F.tmp"81⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\21DB.tmp"C:\Users\Admin\AppData\Local\Temp\21DB.tmp"82⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\2268.tmp"C:\Users\Admin\AppData\Local\Temp\2268.tmp"83⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\2304.tmp"C:\Users\Admin\AppData\Local\Temp\2304.tmp"84⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\2390.tmp"C:\Users\Admin\AppData\Local\Temp\2390.tmp"85⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\242D.tmp"C:\Users\Admin\AppData\Local\Temp\242D.tmp"86⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\249A.tmp"C:\Users\Admin\AppData\Local\Temp\249A.tmp"87⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\2507.tmp"C:\Users\Admin\AppData\Local\Temp\2507.tmp"88⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\2584.tmp"C:\Users\Admin\AppData\Local\Temp\2584.tmp"89⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2601.tmp"C:\Users\Admin\AppData\Local\Temp\2601.tmp"90⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\269E.tmp"C:\Users\Admin\AppData\Local\Temp\269E.tmp"91⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\2759.tmp"C:\Users\Admin\AppData\Local\Temp\2759.tmp"92⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\27D6.tmp"C:\Users\Admin\AppData\Local\Temp\27D6.tmp"93⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2853.tmp"C:\Users\Admin\AppData\Local\Temp\2853.tmp"94⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\28EF.tmp"C:\Users\Admin\AppData\Local\Temp\28EF.tmp"95⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\296C.tmp"C:\Users\Admin\AppData\Local\Temp\296C.tmp"96⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\29E9.tmp"C:\Users\Admin\AppData\Local\Temp\29E9.tmp"97⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\2A66.tmp"C:\Users\Admin\AppData\Local\Temp\2A66.tmp"98⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\2AE3.tmp"C:\Users\Admin\AppData\Local\Temp\2AE3.tmp"99⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\2B70.tmp"C:\Users\Admin\AppData\Local\Temp\2B70.tmp"100⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\2BED.tmp"C:\Users\Admin\AppData\Local\Temp\2BED.tmp"101⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"102⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"103⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\2D54.tmp"C:\Users\Admin\AppData\Local\Temp\2D54.tmp"104⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\2DD1.tmp"C:\Users\Admin\AppData\Local\Temp\2DD1.tmp"105⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"106⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"107⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\2F77.tmp"C:\Users\Admin\AppData\Local\Temp\2F77.tmp"108⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\2FF4.tmp"C:\Users\Admin\AppData\Local\Temp\2FF4.tmp"109⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\3071.tmp"C:\Users\Admin\AppData\Local\Temp\3071.tmp"110⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\30DF.tmp"C:\Users\Admin\AppData\Local\Temp\30DF.tmp"111⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\315C.tmp"C:\Users\Admin\AppData\Local\Temp\315C.tmp"112⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\31E8.tmp"C:\Users\Admin\AppData\Local\Temp\31E8.tmp"113⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\3265.tmp"C:\Users\Admin\AppData\Local\Temp\3265.tmp"114⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\32E2.tmp"C:\Users\Admin\AppData\Local\Temp\32E2.tmp"115⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"116⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"117⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\3469.tmp"C:\Users\Admin\AppData\Local\Temp\3469.tmp"118⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"119⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\3563.tmp"C:\Users\Admin\AppData\Local\Temp\3563.tmp"120⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"121⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\363E.tmp"C:\Users\Admin\AppData\Local\Temp\363E.tmp"122⤵PID:4160
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-