Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 05:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.9437fb9624ca960e4c7732c73c7c8d50_JC.exe
Resource
win7-20231023-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.9437fb9624ca960e4c7732c73c7c8d50_JC.exe
Resource
win10v2004-20231023-en
2 signatures
150 seconds
General
-
Target
NEAS.9437fb9624ca960e4c7732c73c7c8d50_JC.exe
-
Size
486KB
-
MD5
9437fb9624ca960e4c7732c73c7c8d50
-
SHA1
30a1668de6e20d5a5a3ebee3640b066a03254673
-
SHA256
60f79f46846313aeb542249ffb9ccf1b95cfec6d18a14cf49c87718dbb9f8b6e
-
SHA512
f7b02bc3a9a28775b931e94a1811db7538a45586e81b70171e057602ff5f67a208f1a0c28fac49764301e6bcbc03345eb0490aa761a10ad7c95259fc0c0988fa
-
SSDEEP
12288:/U5rCOTeiD6pbaScOME9nEpGhzBISkeomVqsfNZ:/UQOJD6/e0zBFkB0qWN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1352 F8B8.tmp 5012 F973.tmp 3280 F9F0.tmp 1300 FA9C.tmp 1148 FB77.tmp 4648 FC42.tmp 4436 FCCF.tmp 3808 FD6B.tmp 3772 FE94.tmp 2188 FF40.tmp 2088 B.tmp 3376 B7.tmp 4660 162.tmp 2260 1FF.tmp 4644 2BA.tmp 3480 366.tmp 4456 402.tmp 2348 4DD.tmp 4336 599.tmp 3336 616.tmp 1472 6F0.tmp 868 79C.tmp 2296 867.tmp 1572 904.tmp 3852 990.tmp 4708 A2C.tmp 4124 AC9.tmp 3556 B84.tmp 5048 C6F.tmp 640 D59.tmp 2860 E05.tmp 4944 EE0.tmp 4468 1018.tmp 1072 1095.tmp 4820 1102.tmp 3340 117F.tmp 4196 11ED.tmp 4172 1289.tmp 3520 1335.tmp 2432 13D1.tmp 2924 147D.tmp 2272 15A6.tmp 1672 1633.tmp 3512 16BF.tmp 1728 175B.tmp 1148 1807.tmp 2068 1875.tmp 1108 1901.tmp 2120 19AD.tmp 4692 1A49.tmp 2440 1AE6.tmp 4052 1B72.tmp 2184 1BEF.tmp 1496 1C8C.tmp 820 1D28.tmp 1080 1DB4.tmp 4956 1E51.tmp 1604 1EED.tmp 4660 1F6A.tmp 1828 2006.tmp 232 20C2.tmp 4908 213F.tmp 4456 21AC.tmp 2348 2248.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 1352 3520 NEAS.9437fb9624ca960e4c7732c73c7c8d50_JC.exe 84 PID 3520 wrote to memory of 1352 3520 NEAS.9437fb9624ca960e4c7732c73c7c8d50_JC.exe 84 PID 3520 wrote to memory of 1352 3520 NEAS.9437fb9624ca960e4c7732c73c7c8d50_JC.exe 84 PID 1352 wrote to memory of 5012 1352 F8B8.tmp 85 PID 1352 wrote to memory of 5012 1352 F8B8.tmp 85 PID 1352 wrote to memory of 5012 1352 F8B8.tmp 85 PID 5012 wrote to memory of 3280 5012 F973.tmp 86 PID 5012 wrote to memory of 3280 5012 F973.tmp 86 PID 5012 wrote to memory of 3280 5012 F973.tmp 86 PID 3280 wrote to memory of 1300 3280 F9F0.tmp 87 PID 3280 wrote to memory of 1300 3280 F9F0.tmp 87 PID 3280 wrote to memory of 1300 3280 F9F0.tmp 87 PID 1300 wrote to memory of 1148 1300 FA9C.tmp 89 PID 1300 wrote to memory of 1148 1300 FA9C.tmp 89 PID 1300 wrote to memory of 1148 1300 FA9C.tmp 89 PID 1148 wrote to memory of 4648 1148 FB77.tmp 90 PID 1148 wrote to memory of 4648 1148 FB77.tmp 90 PID 1148 wrote to memory of 4648 1148 FB77.tmp 90 PID 4648 wrote to memory of 4436 4648 FC42.tmp 91 PID 4648 wrote to memory of 4436 4648 FC42.tmp 91 PID 4648 wrote to memory of 4436 4648 FC42.tmp 91 PID 4436 wrote to memory of 3808 4436 FCCF.tmp 92 PID 4436 wrote to memory of 3808 4436 FCCF.tmp 92 PID 4436 wrote to memory of 3808 4436 FCCF.tmp 92 PID 3808 wrote to memory of 3772 3808 FD6B.tmp 93 PID 3808 wrote to memory of 3772 3808 FD6B.tmp 93 PID 3808 wrote to memory of 3772 3808 FD6B.tmp 93 PID 3772 wrote to memory of 2188 3772 FE94.tmp 95 PID 3772 wrote to memory of 2188 3772 FE94.tmp 95 PID 3772 wrote to memory of 2188 3772 FE94.tmp 95 PID 2188 wrote to memory of 2088 2188 FF40.tmp 96 PID 2188 wrote to memory of 2088 2188 FF40.tmp 96 PID 2188 wrote to memory of 2088 2188 FF40.tmp 96 PID 2088 wrote to memory of 3376 2088 B.tmp 97 PID 2088 wrote to memory of 3376 2088 B.tmp 97 PID 2088 wrote to memory of 3376 2088 B.tmp 97 PID 3376 wrote to memory of 4660 3376 B7.tmp 98 PID 3376 wrote to memory of 4660 3376 B7.tmp 98 PID 3376 wrote to memory of 4660 3376 B7.tmp 98 PID 4660 wrote to memory of 2260 4660 162.tmp 100 PID 4660 wrote to memory of 2260 4660 162.tmp 100 PID 4660 wrote to memory of 2260 4660 162.tmp 100 PID 2260 wrote to memory of 4644 2260 1FF.tmp 101 PID 2260 wrote to memory of 4644 2260 1FF.tmp 101 PID 2260 wrote to memory of 4644 2260 1FF.tmp 101 PID 4644 wrote to memory of 3480 4644 2BA.tmp 102 PID 4644 wrote to memory of 3480 4644 2BA.tmp 102 PID 4644 wrote to memory of 3480 4644 2BA.tmp 102 PID 3480 wrote to memory of 4456 3480 366.tmp 105 PID 3480 wrote to memory of 4456 3480 366.tmp 105 PID 3480 wrote to memory of 4456 3480 366.tmp 105 PID 4456 wrote to memory of 2348 4456 402.tmp 106 PID 4456 wrote to memory of 2348 4456 402.tmp 106 PID 4456 wrote to memory of 2348 4456 402.tmp 106 PID 2348 wrote to memory of 4336 2348 4DD.tmp 107 PID 2348 wrote to memory of 4336 2348 4DD.tmp 107 PID 2348 wrote to memory of 4336 2348 4DD.tmp 107 PID 4336 wrote to memory of 3336 4336 599.tmp 108 PID 4336 wrote to memory of 3336 4336 599.tmp 108 PID 4336 wrote to memory of 3336 4336 599.tmp 108 PID 3336 wrote to memory of 1472 3336 616.tmp 109 PID 3336 wrote to memory of 1472 3336 616.tmp 109 PID 3336 wrote to memory of 1472 3336 616.tmp 109 PID 1472 wrote to memory of 868 1472 6F0.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.9437fb9624ca960e4c7732c73c7c8d50_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.9437fb9624ca960e4c7732c73c7c8d50_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\F8B8.tmp"C:\Users\Admin\AppData\Local\Temp\F8B8.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\F973.tmp"C:\Users\Admin\AppData\Local\Temp\F973.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\FA9C.tmp"C:\Users\Admin\AppData\Local\Temp\FA9C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\FB77.tmp"C:\Users\Admin\AppData\Local\Temp\FB77.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\FC42.tmp"C:\Users\Admin\AppData\Local\Temp\FC42.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\FCCF.tmp"C:\Users\Admin\AppData\Local\Temp\FCCF.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\FE94.tmp"C:\Users\Admin\AppData\Local\Temp\FE94.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\FF40.tmp"C:\Users\Admin\AppData\Local\Temp\FF40.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\B.tmp"C:\Users\Admin\AppData\Local\Temp\B.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\B7.tmp"C:\Users\Admin\AppData\Local\Temp\B7.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\162.tmp"C:\Users\Admin\AppData\Local\Temp\162.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\1FF.tmp"C:\Users\Admin\AppData\Local\Temp\1FF.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\2BA.tmp"C:\Users\Admin\AppData\Local\Temp\2BA.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\366.tmp"C:\Users\Admin\AppData\Local\Temp\366.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\402.tmp"C:\Users\Admin\AppData\Local\Temp\402.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\4DD.tmp"C:\Users\Admin\AppData\Local\Temp\4DD.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\599.tmp"C:\Users\Admin\AppData\Local\Temp\599.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\616.tmp"C:\Users\Admin\AppData\Local\Temp\616.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\6F0.tmp"C:\Users\Admin\AppData\Local\Temp\6F0.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\79C.tmp"C:\Users\Admin\AppData\Local\Temp\79C.tmp"23⤵
- Executes dropped EXE
PID:868 -
C:\Users\Admin\AppData\Local\Temp\867.tmp"C:\Users\Admin\AppData\Local\Temp\867.tmp"24⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\904.tmp"C:\Users\Admin\AppData\Local\Temp\904.tmp"25⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\990.tmp"C:\Users\Admin\AppData\Local\Temp\990.tmp"26⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\A2C.tmp"C:\Users\Admin\AppData\Local\Temp\A2C.tmp"27⤵
- Executes dropped EXE
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\AC9.tmp"C:\Users\Admin\AppData\Local\Temp\AC9.tmp"28⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\B84.tmp"C:\Users\Admin\AppData\Local\Temp\B84.tmp"29⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\C6F.tmp"C:\Users\Admin\AppData\Local\Temp\C6F.tmp"30⤵
- Executes dropped EXE
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"31⤵
- Executes dropped EXE
PID:640 -
C:\Users\Admin\AppData\Local\Temp\E05.tmp"C:\Users\Admin\AppData\Local\Temp\E05.tmp"32⤵
- Executes dropped EXE
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\EE0.tmp"C:\Users\Admin\AppData\Local\Temp\EE0.tmp"33⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\1018.tmp"C:\Users\Admin\AppData\Local\Temp\1018.tmp"34⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\1095.tmp"C:\Users\Admin\AppData\Local\Temp\1095.tmp"35⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\1102.tmp"C:\Users\Admin\AppData\Local\Temp\1102.tmp"36⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\117F.tmp"C:\Users\Admin\AppData\Local\Temp\117F.tmp"37⤵
- Executes dropped EXE
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\11ED.tmp"C:\Users\Admin\AppData\Local\Temp\11ED.tmp"38⤵
- Executes dropped EXE
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\1289.tmp"C:\Users\Admin\AppData\Local\Temp\1289.tmp"39⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\1335.tmp"C:\Users\Admin\AppData\Local\Temp\1335.tmp"40⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\13D1.tmp"C:\Users\Admin\AppData\Local\Temp\13D1.tmp"41⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\147D.tmp"C:\Users\Admin\AppData\Local\Temp\147D.tmp"42⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\15A6.tmp"C:\Users\Admin\AppData\Local\Temp\15A6.tmp"43⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\1633.tmp"C:\Users\Admin\AppData\Local\Temp\1633.tmp"44⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\16BF.tmp"C:\Users\Admin\AppData\Local\Temp\16BF.tmp"45⤵
- Executes dropped EXE
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\175B.tmp"C:\Users\Admin\AppData\Local\Temp\175B.tmp"46⤵
- Executes dropped EXE
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\1807.tmp"C:\Users\Admin\AppData\Local\Temp\1807.tmp"47⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\1875.tmp"C:\Users\Admin\AppData\Local\Temp\1875.tmp"48⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\1901.tmp"C:\Users\Admin\AppData\Local\Temp\1901.tmp"49⤵
- Executes dropped EXE
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\19AD.tmp"C:\Users\Admin\AppData\Local\Temp\19AD.tmp"50⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\1A49.tmp"C:\Users\Admin\AppData\Local\Temp\1A49.tmp"51⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\1AE6.tmp"C:\Users\Admin\AppData\Local\Temp\1AE6.tmp"52⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\1B72.tmp"C:\Users\Admin\AppData\Local\Temp\1B72.tmp"53⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"54⤵
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\1C8C.tmp"C:\Users\Admin\AppData\Local\Temp\1C8C.tmp"55⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\1D28.tmp"C:\Users\Admin\AppData\Local\Temp\1D28.tmp"56⤵
- Executes dropped EXE
PID:820 -
C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"57⤵
- Executes dropped EXE
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\1E51.tmp"C:\Users\Admin\AppData\Local\Temp\1E51.tmp"58⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\1EED.tmp"C:\Users\Admin\AppData\Local\Temp\1EED.tmp"59⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\1F6A.tmp"C:\Users\Admin\AppData\Local\Temp\1F6A.tmp"60⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\2006.tmp"C:\Users\Admin\AppData\Local\Temp\2006.tmp"61⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\20C2.tmp"C:\Users\Admin\AppData\Local\Temp\20C2.tmp"62⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\213F.tmp"C:\Users\Admin\AppData\Local\Temp\213F.tmp"63⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\21AC.tmp"C:\Users\Admin\AppData\Local\Temp\21AC.tmp"64⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\2248.tmp"C:\Users\Admin\AppData\Local\Temp\2248.tmp"65⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\22F4.tmp"C:\Users\Admin\AppData\Local\Temp\22F4.tmp"66⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\23B0.tmp"C:\Users\Admin\AppData\Local\Temp\23B0.tmp"67⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\246B.tmp"C:\Users\Admin\AppData\Local\Temp\246B.tmp"68⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\2546.tmp"C:\Users\Admin\AppData\Local\Temp\2546.tmp"69⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\25E2.tmp"C:\Users\Admin\AppData\Local\Temp\25E2.tmp"70⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\269E.tmp"C:\Users\Admin\AppData\Local\Temp\269E.tmp"71⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\271B.tmp"C:\Users\Admin\AppData\Local\Temp\271B.tmp"72⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\27A7.tmp"C:\Users\Admin\AppData\Local\Temp\27A7.tmp"73⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\2844.tmp"C:\Users\Admin\AppData\Local\Temp\2844.tmp"74⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\28C1.tmp"C:\Users\Admin\AppData\Local\Temp\28C1.tmp"75⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"76⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\29E9.tmp"C:\Users\Admin\AppData\Local\Temp\29E9.tmp"77⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\2A86.tmp"C:\Users\Admin\AppData\Local\Temp\2A86.tmp"78⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\2B32.tmp"C:\Users\Admin\AppData\Local\Temp\2B32.tmp"79⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"80⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2C4B.tmp"C:\Users\Admin\AppData\Local\Temp\2C4B.tmp"81⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\2D06.tmp"C:\Users\Admin\AppData\Local\Temp\2D06.tmp"82⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\2D93.tmp"C:\Users\Admin\AppData\Local\Temp\2D93.tmp"83⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\2E10.tmp"C:\Users\Admin\AppData\Local\Temp\2E10.tmp"84⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\2E7D.tmp"C:\Users\Admin\AppData\Local\Temp\2E7D.tmp"85⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"86⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\2F68.tmp"C:\Users\Admin\AppData\Local\Temp\2F68.tmp"87⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"88⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\3052.tmp"C:\Users\Admin\AppData\Local\Temp\3052.tmp"89⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\30BF.tmp"C:\Users\Admin\AppData\Local\Temp\30BF.tmp"90⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\317B.tmp"C:\Users\Admin\AppData\Local\Temp\317B.tmp"91⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3236.tmp"C:\Users\Admin\AppData\Local\Temp\3236.tmp"92⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\32A4.tmp"C:\Users\Admin\AppData\Local\Temp\32A4.tmp"93⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3311.tmp"C:\Users\Admin\AppData\Local\Temp\3311.tmp"94⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\338E.tmp"C:\Users\Admin\AppData\Local\Temp\338E.tmp"95⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"96⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"97⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\3505.tmp"C:\Users\Admin\AppData\Local\Temp\3505.tmp"98⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"99⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\35F0.tmp"C:\Users\Admin\AppData\Local\Temp\35F0.tmp"100⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\367C.tmp"C:\Users\Admin\AppData\Local\Temp\367C.tmp"101⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\3709.tmp"C:\Users\Admin\AppData\Local\Temp\3709.tmp"102⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\37A5.tmp"C:\Users\Admin\AppData\Local\Temp\37A5.tmp"103⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\3832.tmp"C:\Users\Admin\AppData\Local\Temp\3832.tmp"104⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\390C.tmp"C:\Users\Admin\AppData\Local\Temp\390C.tmp"105⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\39A9.tmp"C:\Users\Admin\AppData\Local\Temp\39A9.tmp"106⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\3A64.tmp"C:\Users\Admin\AppData\Local\Temp\3A64.tmp"107⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"108⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"109⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\3C77.tmp"C:\Users\Admin\AppData\Local\Temp\3C77.tmp"110⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"111⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\3D81.tmp"C:\Users\Admin\AppData\Local\Temp\3D81.tmp"112⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"113⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"114⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\3F46.tmp"C:\Users\Admin\AppData\Local\Temp\3F46.tmp"115⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\4002.tmp"C:\Users\Admin\AppData\Local\Temp\4002.tmp"116⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\40AE.tmp"C:\Users\Admin\AppData\Local\Temp\40AE.tmp"117⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\4169.tmp"C:\Users\Admin\AppData\Local\Temp\4169.tmp"118⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\4205.tmp"C:\Users\Admin\AppData\Local\Temp\4205.tmp"119⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\4292.tmp"C:\Users\Admin\AppData\Local\Temp\4292.tmp"120⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\431F.tmp"C:\Users\Admin\AppData\Local\Temp\431F.tmp"121⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\438C.tmp"C:\Users\Admin\AppData\Local\Temp\438C.tmp"122⤵PID:2296
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-