Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 13:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.439e6259938f62d5d07d5eb216a56790.exe
Resource
win7-20231020-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.439e6259938f62d5d07d5eb216a56790.exe
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
NEAS.439e6259938f62d5d07d5eb216a56790.exe
-
Size
486KB
-
MD5
439e6259938f62d5d07d5eb216a56790
-
SHA1
457e51b6ae455fb940495c437c7e1be41944db15
-
SHA256
8f331533461260722c2cc173d427c59b6be84c4a173026103025d64cb9e8bbd3
-
SHA512
51ca6204d0442f0e9b41142fa9fa2c979068578b0919ed75a0732a89bf79f821fa4254ea887c9ba3efd73fefb5a5b9c1d419baa92bfc00f673b2bf2d5445ded9
-
SSDEEP
12288:/U5rCOTeiD5YoP26yEhe184vGzs3SnzJkhtsrNZ:/UQOJD5s681R4xnzefiN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2256 4D8E.tmp 4004 535B.tmp 1192 5493.tmp 552 584C.tmp 3872 5956.tmp 1952 5A02.tmp 2120 5AFC.tmp 3212 5C06.tmp 836 5EC5.tmp 2280 60D8.tmp 1244 61D2.tmp 412 6491.tmp 3088 65F8.tmp 3956 66F2.tmp 4740 67AE.tmp 4368 6889.tmp 812 6973.tmp 1568 6A3E.tmp 4392 6ADA.tmp 3760 6BD4.tmp 1944 6CEE.tmp 4188 6D8A.tmp 1112 6FEB.tmp 4812 7124.tmp 4416 726C.tmp 3624 7337.tmp 2808 7431.tmp 4760 75A8.tmp 2936 7683.tmp 740 78B5.tmp 3440 7A1D.tmp 4156 7AF7.tmp 2984 7BC3.tmp 1992 7C6E.tmp 2208 7D88.tmp 4148 7EA1.tmp 1404 7F3D.tmp 5004 8056.tmp 3576 80D3.tmp 116 8170.tmp 3064 81ED.tmp 552 83D1.tmp 3372 846D.tmp 2532 84EA.tmp 4916 8587.tmp 1952 86A0.tmp 448 872C.tmp 2440 8807.tmp 440 88B3.tmp 836 896F.tmp 1900 8A1A.tmp 884 8AF5.tmp 3140 8B72.tmp 4532 8BFF.tmp 2068 8DC4.tmp 4344 8E8F.tmp 3356 8F4B.tmp 2368 9006.tmp 3564 9100.tmp 1432 91FA.tmp 2696 92F4.tmp 3428 948A.tmp 912 9546.tmp 2664 95E2.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2256 1808 NEAS.439e6259938f62d5d07d5eb216a56790.exe 91 PID 1808 wrote to memory of 2256 1808 NEAS.439e6259938f62d5d07d5eb216a56790.exe 91 PID 1808 wrote to memory of 2256 1808 NEAS.439e6259938f62d5d07d5eb216a56790.exe 91 PID 2256 wrote to memory of 4004 2256 4D8E.tmp 92 PID 2256 wrote to memory of 4004 2256 4D8E.tmp 92 PID 2256 wrote to memory of 4004 2256 4D8E.tmp 92 PID 4004 wrote to memory of 1192 4004 535B.tmp 93 PID 4004 wrote to memory of 1192 4004 535B.tmp 93 PID 4004 wrote to memory of 1192 4004 535B.tmp 93 PID 1192 wrote to memory of 552 1192 5493.tmp 94 PID 1192 wrote to memory of 552 1192 5493.tmp 94 PID 1192 wrote to memory of 552 1192 5493.tmp 94 PID 552 wrote to memory of 3872 552 584C.tmp 95 PID 552 wrote to memory of 3872 552 584C.tmp 95 PID 552 wrote to memory of 3872 552 584C.tmp 95 PID 3872 wrote to memory of 1952 3872 5956.tmp 96 PID 3872 wrote to memory of 1952 3872 5956.tmp 96 PID 3872 wrote to memory of 1952 3872 5956.tmp 96 PID 1952 wrote to memory of 2120 1952 5A02.tmp 97 PID 1952 wrote to memory of 2120 1952 5A02.tmp 97 PID 1952 wrote to memory of 2120 1952 5A02.tmp 97 PID 2120 wrote to memory of 3212 2120 5AFC.tmp 98 PID 2120 wrote to memory of 3212 2120 5AFC.tmp 98 PID 2120 wrote to memory of 3212 2120 5AFC.tmp 98 PID 3212 wrote to memory of 836 3212 5C06.tmp 99 PID 3212 wrote to memory of 836 3212 5C06.tmp 99 PID 3212 wrote to memory of 836 3212 5C06.tmp 99 PID 836 wrote to memory of 2280 836 5EC5.tmp 100 PID 836 wrote to memory of 2280 836 5EC5.tmp 100 PID 836 wrote to memory of 2280 836 5EC5.tmp 100 PID 2280 wrote to memory of 1244 2280 60D8.tmp 101 PID 2280 wrote to memory of 1244 2280 60D8.tmp 101 PID 2280 wrote to memory of 1244 2280 60D8.tmp 101 PID 1244 wrote to memory of 412 1244 61D2.tmp 102 PID 1244 wrote to memory of 412 1244 61D2.tmp 102 PID 1244 wrote to memory of 412 1244 61D2.tmp 102 PID 412 wrote to memory of 3088 412 6491.tmp 103 PID 412 wrote to memory of 3088 412 6491.tmp 103 PID 412 wrote to memory of 3088 412 6491.tmp 103 PID 3088 wrote to memory of 3956 3088 65F8.tmp 104 PID 3088 wrote to memory of 3956 3088 65F8.tmp 104 PID 3088 wrote to memory of 3956 3088 65F8.tmp 104 PID 3956 wrote to memory of 4740 3956 66F2.tmp 105 PID 3956 wrote to memory of 4740 3956 66F2.tmp 105 PID 3956 wrote to memory of 4740 3956 66F2.tmp 105 PID 4740 wrote to memory of 4368 4740 67AE.tmp 106 PID 4740 wrote to memory of 4368 4740 67AE.tmp 106 PID 4740 wrote to memory of 4368 4740 67AE.tmp 106 PID 4368 wrote to memory of 812 4368 6889.tmp 107 PID 4368 wrote to memory of 812 4368 6889.tmp 107 PID 4368 wrote to memory of 812 4368 6889.tmp 107 PID 812 wrote to memory of 1568 812 6973.tmp 108 PID 812 wrote to memory of 1568 812 6973.tmp 108 PID 812 wrote to memory of 1568 812 6973.tmp 108 PID 1568 wrote to memory of 4392 1568 6A3E.tmp 109 PID 1568 wrote to memory of 4392 1568 6A3E.tmp 109 PID 1568 wrote to memory of 4392 1568 6A3E.tmp 109 PID 4392 wrote to memory of 3760 4392 6ADA.tmp 110 PID 4392 wrote to memory of 3760 4392 6ADA.tmp 110 PID 4392 wrote to memory of 3760 4392 6ADA.tmp 110 PID 3760 wrote to memory of 1944 3760 6BD4.tmp 111 PID 3760 wrote to memory of 1944 3760 6BD4.tmp 111 PID 3760 wrote to memory of 1944 3760 6BD4.tmp 111 PID 1944 wrote to memory of 4188 1944 6CEE.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.439e6259938f62d5d07d5eb216a56790.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.439e6259938f62d5d07d5eb216a56790.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\535B.tmp"C:\Users\Admin\AppData\Local\Temp\535B.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\5493.tmp"C:\Users\Admin\AppData\Local\Temp\5493.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\584C.tmp"C:\Users\Admin\AppData\Local\Temp\584C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\5956.tmp"C:\Users\Admin\AppData\Local\Temp\5956.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\5A02.tmp"C:\Users\Admin\AppData\Local\Temp\5A02.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\5AFC.tmp"C:\Users\Admin\AppData\Local\Temp\5AFC.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\5C06.tmp"C:\Users\Admin\AppData\Local\Temp\5C06.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\60D8.tmp"C:\Users\Admin\AppData\Local\Temp\60D8.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\61D2.tmp"C:\Users\Admin\AppData\Local\Temp\61D2.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\6491.tmp"C:\Users\Admin\AppData\Local\Temp\6491.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\65F8.tmp"C:\Users\Admin\AppData\Local\Temp\65F8.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\66F2.tmp"C:\Users\Admin\AppData\Local\Temp\66F2.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\67AE.tmp"C:\Users\Admin\AppData\Local\Temp\67AE.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\6889.tmp"C:\Users\Admin\AppData\Local\Temp\6889.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\6973.tmp"C:\Users\Admin\AppData\Local\Temp\6973.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\6A3E.tmp"C:\Users\Admin\AppData\Local\Temp\6A3E.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"C:\Users\Admin\AppData\Local\Temp\6ADA.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\6BD4.tmp"C:\Users\Admin\AppData\Local\Temp\6BD4.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\6CEE.tmp"C:\Users\Admin\AppData\Local\Temp\6CEE.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\6D8A.tmp"C:\Users\Admin\AppData\Local\Temp\6D8A.tmp"23⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\6FEB.tmp"C:\Users\Admin\AppData\Local\Temp\6FEB.tmp"24⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\7124.tmp"C:\Users\Admin\AppData\Local\Temp\7124.tmp"25⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\726C.tmp"C:\Users\Admin\AppData\Local\Temp\726C.tmp"26⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\7337.tmp"C:\Users\Admin\AppData\Local\Temp\7337.tmp"27⤵
- Executes dropped EXE
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\7431.tmp"C:\Users\Admin\AppData\Local\Temp\7431.tmp"28⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\75A8.tmp"C:\Users\Admin\AppData\Local\Temp\75A8.tmp"29⤵
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\7683.tmp"C:\Users\Admin\AppData\Local\Temp\7683.tmp"30⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\78B5.tmp"C:\Users\Admin\AppData\Local\Temp\78B5.tmp"31⤵
- Executes dropped EXE
PID:740 -
C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"32⤵
- Executes dropped EXE
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\7AF7.tmp"C:\Users\Admin\AppData\Local\Temp\7AF7.tmp"33⤵
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\7BC3.tmp"C:\Users\Admin\AppData\Local\Temp\7BC3.tmp"34⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"35⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\7D88.tmp"C:\Users\Admin\AppData\Local\Temp\7D88.tmp"36⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\7EA1.tmp"C:\Users\Admin\AppData\Local\Temp\7EA1.tmp"37⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\7F3D.tmp"C:\Users\Admin\AppData\Local\Temp\7F3D.tmp"38⤵
- Executes dropped EXE
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\8056.tmp"C:\Users\Admin\AppData\Local\Temp\8056.tmp"39⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\80D3.tmp"C:\Users\Admin\AppData\Local\Temp\80D3.tmp"40⤵
- Executes dropped EXE
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\8170.tmp"C:\Users\Admin\AppData\Local\Temp\8170.tmp"41⤵
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\81ED.tmp"C:\Users\Admin\AppData\Local\Temp\81ED.tmp"42⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\83D1.tmp"C:\Users\Admin\AppData\Local\Temp\83D1.tmp"43⤵
- Executes dropped EXE
PID:552 -
C:\Users\Admin\AppData\Local\Temp\846D.tmp"C:\Users\Admin\AppData\Local\Temp\846D.tmp"44⤵
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\84EA.tmp"C:\Users\Admin\AppData\Local\Temp\84EA.tmp"45⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\8587.tmp"C:\Users\Admin\AppData\Local\Temp\8587.tmp"46⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\86A0.tmp"C:\Users\Admin\AppData\Local\Temp\86A0.tmp"47⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\872C.tmp"C:\Users\Admin\AppData\Local\Temp\872C.tmp"48⤵
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\8807.tmp"C:\Users\Admin\AppData\Local\Temp\8807.tmp"49⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\88B3.tmp"C:\Users\Admin\AppData\Local\Temp\88B3.tmp"50⤵
- Executes dropped EXE
PID:440 -
C:\Users\Admin\AppData\Local\Temp\896F.tmp"C:\Users\Admin\AppData\Local\Temp\896F.tmp"51⤵
- Executes dropped EXE
PID:836 -
C:\Users\Admin\AppData\Local\Temp\8A1A.tmp"C:\Users\Admin\AppData\Local\Temp\8A1A.tmp"52⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\8AF5.tmp"C:\Users\Admin\AppData\Local\Temp\8AF5.tmp"53⤵
- Executes dropped EXE
PID:884 -
C:\Users\Admin\AppData\Local\Temp\8B72.tmp"C:\Users\Admin\AppData\Local\Temp\8B72.tmp"54⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\8BFF.tmp"C:\Users\Admin\AppData\Local\Temp\8BFF.tmp"55⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\8DC4.tmp"C:\Users\Admin\AppData\Local\Temp\8DC4.tmp"56⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\8E8F.tmp"C:\Users\Admin\AppData\Local\Temp\8E8F.tmp"57⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\8F4B.tmp"C:\Users\Admin\AppData\Local\Temp\8F4B.tmp"58⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\9006.tmp"C:\Users\Admin\AppData\Local\Temp\9006.tmp"59⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\9100.tmp"C:\Users\Admin\AppData\Local\Temp\9100.tmp"60⤵
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\91FA.tmp"C:\Users\Admin\AppData\Local\Temp\91FA.tmp"61⤵
- Executes dropped EXE
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\92F4.tmp"C:\Users\Admin\AppData\Local\Temp\92F4.tmp"62⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\948A.tmp"C:\Users\Admin\AppData\Local\Temp\948A.tmp"63⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\9546.tmp"C:\Users\Admin\AppData\Local\Temp\9546.tmp"64⤵
- Executes dropped EXE
PID:912 -
C:\Users\Admin\AppData\Local\Temp\95E2.tmp"C:\Users\Admin\AppData\Local\Temp\95E2.tmp"65⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\97D6.tmp"C:\Users\Admin\AppData\Local\Temp\97D6.tmp"66⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\98A1.tmp"C:\Users\Admin\AppData\Local\Temp\98A1.tmp"67⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\992E.tmp"C:\Users\Admin\AppData\Local\Temp\992E.tmp"68⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\99DA.tmp"C:\Users\Admin\AppData\Local\Temp\99DA.tmp"69⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\9A76.tmp"C:\Users\Admin\AppData\Local\Temp\9A76.tmp"70⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\9B51.tmp"C:\Users\Admin\AppData\Local\Temp\9B51.tmp"71⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\9CA8.tmp"C:\Users\Admin\AppData\Local\Temp\9CA8.tmp"72⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\9D45.tmp"C:\Users\Admin\AppData\Local\Temp\9D45.tmp"73⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\A062.tmp"C:\Users\Admin\AppData\Local\Temp\A062.tmp"74⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\A301.tmp"C:\Users\Admin\AppData\Local\Temp\A301.tmp"75⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\A38E.tmp"C:\Users\Admin\AppData\Local\Temp\A38E.tmp"76⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\A43A.tmp"C:\Users\Admin\AppData\Local\Temp\A43A.tmp"77⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\A4D6.tmp"C:\Users\Admin\AppData\Local\Temp\A4D6.tmp"78⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\A563.tmp"C:\Users\Admin\AppData\Local\Temp\A563.tmp"79⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\A6DA.tmp"C:\Users\Admin\AppData\Local\Temp\A6DA.tmp"80⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\AAF1.tmp"C:\Users\Admin\AppData\Local\Temp\AAF1.tmp"81⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\ABBC.tmp"C:\Users\Admin\AppData\Local\Temp\ABBC.tmp"82⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\AC48.tmp"C:\Users\Admin\AppData\Local\Temp\AC48.tmp"83⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\ACC5.tmp"C:\Users\Admin\AppData\Local\Temp\ACC5.tmp"84⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\AD62.tmp"C:\Users\Admin\AppData\Local\Temp\AD62.tmp"85⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\AE5C.tmp"C:\Users\Admin\AppData\Local\Temp\AE5C.tmp"86⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\AF56.tmp"C:\Users\Admin\AppData\Local\Temp\AF56.tmp"87⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\B002.tmp"C:\Users\Admin\AppData\Local\Temp\B002.tmp"88⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\B10B.tmp"C:\Users\Admin\AppData\Local\Temp\B10B.tmp"89⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\B1A7.tmp"C:\Users\Admin\AppData\Local\Temp\B1A7.tmp"90⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\B244.tmp"C:\Users\Admin\AppData\Local\Temp\B244.tmp"91⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\B2F0.tmp"C:\Users\Admin\AppData\Local\Temp\B2F0.tmp"92⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\B438.tmp"C:\Users\Admin\AppData\Local\Temp\B438.tmp"93⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\B5DE.tmp"C:\Users\Admin\AppData\Local\Temp\B5DE.tmp"94⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\B689.tmp"C:\Users\Admin\AppData\Local\Temp\B689.tmp"95⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\B735.tmp"C:\Users\Admin\AppData\Local\Temp\B735.tmp"96⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\B91A.tmp"C:\Users\Admin\AppData\Local\Temp\B91A.tmp"97⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\B9C6.tmp"C:\Users\Admin\AppData\Local\Temp\B9C6.tmp"98⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\BB3D.tmp"C:\Users\Admin\AppData\Local\Temp\BB3D.tmp"99⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\BBD9.tmp"C:\Users\Admin\AppData\Local\Temp\BBD9.tmp"100⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\BC65.tmp"C:\Users\Admin\AppData\Local\Temp\BC65.tmp"101⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\BCE2.tmp"C:\Users\Admin\AppData\Local\Temp\BCE2.tmp"102⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\BD9E.tmp"C:\Users\Admin\AppData\Local\Temp\BD9E.tmp"103⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\BE2B.tmp"C:\Users\Admin\AppData\Local\Temp\BE2B.tmp"104⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\BEB7.tmp"C:\Users\Admin\AppData\Local\Temp\BEB7.tmp"105⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\BF53.tmp"C:\Users\Admin\AppData\Local\Temp\BF53.tmp"106⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\C0DA.tmp"C:\Users\Admin\AppData\Local\Temp\C0DA.tmp"107⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\C290.tmp"C:\Users\Admin\AppData\Local\Temp\C290.tmp"108⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\C32C.tmp"C:\Users\Admin\AppData\Local\Temp\C32C.tmp"109⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\C3A9.tmp"C:\Users\Admin\AppData\Local\Temp\C3A9.tmp"110⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\C435.tmp"C:\Users\Admin\AppData\Local\Temp\C435.tmp"111⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\C4D2.tmp"C:\Users\Admin\AppData\Local\Temp\C4D2.tmp"112⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\C57E.tmp"C:\Users\Admin\AppData\Local\Temp\C57E.tmp"113⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\C60A.tmp"C:\Users\Admin\AppData\Local\Temp\C60A.tmp"114⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\C687.tmp"C:\Users\Admin\AppData\Local\Temp\C687.tmp"115⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\C762.tmp"C:\Users\Admin\AppData\Local\Temp\C762.tmp"116⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\C84C.tmp"C:\Users\Admin\AppData\Local\Temp\C84C.tmp"117⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\C8D9.tmp"C:\Users\Admin\AppData\Local\Temp\C8D9.tmp"118⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\C966.tmp"C:\Users\Admin\AppData\Local\Temp\C966.tmp"119⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\CA7F.tmp"C:\Users\Admin\AppData\Local\Temp\CA7F.tmp"120⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\CB0B.tmp"C:\Users\Admin\AppData\Local\Temp\CB0B.tmp"121⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\CBC7.tmp"C:\Users\Admin\AppData\Local\Temp\CBC7.tmp"122⤵PID:1344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-