Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
29c42270dcaed9453a629f676563d3b04d6cf1b47387f4a88775940770686176_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
29c42270dcaed9453a629f676563d3b04d6cf1b47387f4a88775940770686176_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
29c42270dcaed9453a629f676563d3b04d6cf1b47387f4a88775940770686176_NeikiAnalytics.exe
-
Size
536KB
-
MD5
86a0d0379cf9c995bcb15a0278056510
-
SHA1
da7e064bbfc0b2ec76b34e58d90a7afb3ec7352e
-
SHA256
29c42270dcaed9453a629f676563d3b04d6cf1b47387f4a88775940770686176
-
SHA512
b877815f6a57a2010aac5fb4afca53c75c3b20058c82c7833d88ba22da4e7d5161b26c8ff08afe46fdd79b83bb2afa982cca0c3673c98f4089c31bf394219d55
-
SSDEEP
12288:wU5rCOTeiUP8AtpHCmv9xFy6/jnHn3vM3YauyUvvWIZxVJ0ZT9:wUQOJUPhbc67nHE3YfWIRJ0ZT9
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4536 F397.tmp 2244 F656.tmp 4864 FCFD.tmp 412 FF01.tmp 2216 2A.tmp 1408 20E.tmp 4260 3C4.tmp 3920 4FC.tmp 4276 6B2.tmp 1040 7CB.tmp 3508 8C5.tmp 1636 A1D.tmp 684 B55.tmp 3024 C6F.tmp 2176 D69.tmp 700 E82.tmp 1736 1066.tmp 2352 1151.tmp 4948 12B8.tmp 1696 13E1.tmp 1560 1519.tmp 4572 1661.tmp 3308 177B.tmp 5040 18D2.tmp 4548 1A0B.tmp 3092 1B82.tmp 1368 1CBA.tmp 1392 1E03.tmp 1936 1F99.tmp 2992 2093.tmp 716 21BC.tmp 1208 22F4.tmp 4700 246B.tmp 3768 2546.tmp 1408 25F2.tmp 3080 26BD.tmp 1224 2788.tmp 4540 2834.tmp 2012 291E.tmp 1356 2A09.tmp 780 2AD4.tmp 1804 2B8F.tmp 2412 2C4B.tmp 1372 2DF1.tmp 1088 2EFA.tmp 4140 312D.tmp 2388 3227.tmp 4308 32F2.tmp 1696 33FC.tmp 884 3488.tmp 3284 3515.tmp 2264 3786.tmp 4956 37F3.tmp 3792 388F.tmp 4428 393B.tmp 3684 3A06.tmp 3076 3A74.tmp 2608 3AF1.tmp 1936 3BCC.tmp 4992 3C77.tmp 2992 3D23.tmp 412 3D91.tmp 1436 3DFE.tmp 4512 3E8B.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 4536 4544 29c42270dcaed9453a629f676563d3b04d6cf1b47387f4a88775940770686176_NeikiAnalytics.exe 91 PID 4544 wrote to memory of 4536 4544 29c42270dcaed9453a629f676563d3b04d6cf1b47387f4a88775940770686176_NeikiAnalytics.exe 91 PID 4544 wrote to memory of 4536 4544 29c42270dcaed9453a629f676563d3b04d6cf1b47387f4a88775940770686176_NeikiAnalytics.exe 91 PID 4536 wrote to memory of 2244 4536 F397.tmp 92 PID 4536 wrote to memory of 2244 4536 F397.tmp 92 PID 4536 wrote to memory of 2244 4536 F397.tmp 92 PID 2244 wrote to memory of 4864 2244 F656.tmp 93 PID 2244 wrote to memory of 4864 2244 F656.tmp 93 PID 2244 wrote to memory of 4864 2244 F656.tmp 93 PID 4864 wrote to memory of 412 4864 FCFD.tmp 94 PID 4864 wrote to memory of 412 4864 FCFD.tmp 94 PID 4864 wrote to memory of 412 4864 FCFD.tmp 94 PID 412 wrote to memory of 2216 412 FF01.tmp 95 PID 412 wrote to memory of 2216 412 FF01.tmp 95 PID 412 wrote to memory of 2216 412 FF01.tmp 95 PID 2216 wrote to memory of 1408 2216 2A.tmp 96 PID 2216 wrote to memory of 1408 2216 2A.tmp 96 PID 2216 wrote to memory of 1408 2216 2A.tmp 96 PID 1408 wrote to memory of 4260 1408 20E.tmp 97 PID 1408 wrote to memory of 4260 1408 20E.tmp 97 PID 1408 wrote to memory of 4260 1408 20E.tmp 97 PID 4260 wrote to memory of 3920 4260 3C4.tmp 98 PID 4260 wrote to memory of 3920 4260 3C4.tmp 98 PID 4260 wrote to memory of 3920 4260 3C4.tmp 98 PID 3920 wrote to memory of 4276 3920 4FC.tmp 99 PID 3920 wrote to memory of 4276 3920 4FC.tmp 99 PID 3920 wrote to memory of 4276 3920 4FC.tmp 99 PID 4276 wrote to memory of 1040 4276 6B2.tmp 100 PID 4276 wrote to memory of 1040 4276 6B2.tmp 100 PID 4276 wrote to memory of 1040 4276 6B2.tmp 100 PID 1040 wrote to memory of 3508 1040 7CB.tmp 101 PID 1040 wrote to memory of 3508 1040 7CB.tmp 101 PID 1040 wrote to memory of 3508 1040 7CB.tmp 101 PID 3508 wrote to memory of 1636 3508 8C5.tmp 102 PID 3508 wrote to memory of 1636 3508 8C5.tmp 102 PID 3508 wrote to memory of 1636 3508 8C5.tmp 102 PID 1636 wrote to memory of 684 1636 A1D.tmp 103 PID 1636 wrote to memory of 684 1636 A1D.tmp 103 PID 1636 wrote to memory of 684 1636 A1D.tmp 103 PID 684 wrote to memory of 3024 684 B55.tmp 104 PID 684 wrote to memory of 3024 684 B55.tmp 104 PID 684 wrote to memory of 3024 684 B55.tmp 104 PID 3024 wrote to memory of 2176 3024 C6F.tmp 105 PID 3024 wrote to memory of 2176 3024 C6F.tmp 105 PID 3024 wrote to memory of 2176 3024 C6F.tmp 105 PID 2176 wrote to memory of 700 2176 D69.tmp 106 PID 2176 wrote to memory of 700 2176 D69.tmp 106 PID 2176 wrote to memory of 700 2176 D69.tmp 106 PID 700 wrote to memory of 1736 700 E82.tmp 107 PID 700 wrote to memory of 1736 700 E82.tmp 107 PID 700 wrote to memory of 1736 700 E82.tmp 107 PID 1736 wrote to memory of 2352 1736 1066.tmp 108 PID 1736 wrote to memory of 2352 1736 1066.tmp 108 PID 1736 wrote to memory of 2352 1736 1066.tmp 108 PID 2352 wrote to memory of 4948 2352 1151.tmp 109 PID 2352 wrote to memory of 4948 2352 1151.tmp 109 PID 2352 wrote to memory of 4948 2352 1151.tmp 109 PID 4948 wrote to memory of 1696 4948 12B8.tmp 110 PID 4948 wrote to memory of 1696 4948 12B8.tmp 110 PID 4948 wrote to memory of 1696 4948 12B8.tmp 110 PID 1696 wrote to memory of 1560 1696 13E1.tmp 111 PID 1696 wrote to memory of 1560 1696 13E1.tmp 111 PID 1696 wrote to memory of 1560 1696 13E1.tmp 111 PID 1560 wrote to memory of 4572 1560 1519.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\29c42270dcaed9453a629f676563d3b04d6cf1b47387f4a88775940770686176_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\29c42270dcaed9453a629f676563d3b04d6cf1b47387f4a88775940770686176_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\F397.tmp"C:\Users\Admin\AppData\Local\Temp\F397.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\F656.tmp"C:\Users\Admin\AppData\Local\Temp\F656.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\FF01.tmp"C:\Users\Admin\AppData\Local\Temp\FF01.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\2A.tmp"C:\Users\Admin\AppData\Local\Temp\2A.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\20E.tmp"C:\Users\Admin\AppData\Local\Temp\20E.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\3C4.tmp"C:\Users\Admin\AppData\Local\Temp\3C4.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\4FC.tmp"C:\Users\Admin\AppData\Local\Temp\4FC.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\7CB.tmp"C:\Users\Admin\AppData\Local\Temp\7CB.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\8C5.tmp"C:\Users\Admin\AppData\Local\Temp\8C5.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\A1D.tmp"C:\Users\Admin\AppData\Local\Temp\A1D.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\B55.tmp"C:\Users\Admin\AppData\Local\Temp\B55.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\C6F.tmp"C:\Users\Admin\AppData\Local\Temp\C6F.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\E82.tmp"C:\Users\Admin\AppData\Local\Temp\E82.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\1066.tmp"C:\Users\Admin\AppData\Local\Temp\1066.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\1151.tmp"C:\Users\Admin\AppData\Local\Temp\1151.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\12B8.tmp"C:\Users\Admin\AppData\Local\Temp\12B8.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\13E1.tmp"C:\Users\Admin\AppData\Local\Temp\13E1.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\1519.tmp"C:\Users\Admin\AppData\Local\Temp\1519.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\1661.tmp"C:\Users\Admin\AppData\Local\Temp\1661.tmp"23⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\177B.tmp"C:\Users\Admin\AppData\Local\Temp\177B.tmp"24⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\18D2.tmp"C:\Users\Admin\AppData\Local\Temp\18D2.tmp"25⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\1A0B.tmp"C:\Users\Admin\AppData\Local\Temp\1A0B.tmp"26⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\1B82.tmp"C:\Users\Admin\AppData\Local\Temp\1B82.tmp"27⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"28⤵
- Executes dropped EXE
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\1E03.tmp"C:\Users\Admin\AppData\Local\Temp\1E03.tmp"29⤵
- Executes dropped EXE
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\1F99.tmp"C:\Users\Admin\AppData\Local\Temp\1F99.tmp"30⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\2093.tmp"C:\Users\Admin\AppData\Local\Temp\2093.tmp"31⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\21BC.tmp"C:\Users\Admin\AppData\Local\Temp\21BC.tmp"32⤵
- Executes dropped EXE
PID:716 -
C:\Users\Admin\AppData\Local\Temp\22F4.tmp"C:\Users\Admin\AppData\Local\Temp\22F4.tmp"33⤵
- Executes dropped EXE
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\246B.tmp"C:\Users\Admin\AppData\Local\Temp\246B.tmp"34⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\2546.tmp"C:\Users\Admin\AppData\Local\Temp\2546.tmp"35⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\25F2.tmp"C:\Users\Admin\AppData\Local\Temp\25F2.tmp"36⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\26BD.tmp"C:\Users\Admin\AppData\Local\Temp\26BD.tmp"37⤵
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\2788.tmp"C:\Users\Admin\AppData\Local\Temp\2788.tmp"38⤵
- Executes dropped EXE
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\2834.tmp"C:\Users\Admin\AppData\Local\Temp\2834.tmp"39⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\291E.tmp"C:\Users\Admin\AppData\Local\Temp\291E.tmp"40⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\2A09.tmp"C:\Users\Admin\AppData\Local\Temp\2A09.tmp"41⤵
- Executes dropped EXE
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"42⤵
- Executes dropped EXE
PID:780 -
C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"43⤵
- Executes dropped EXE
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\2C4B.tmp"C:\Users\Admin\AppData\Local\Temp\2C4B.tmp"44⤵
- Executes dropped EXE
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\2DF1.tmp"C:\Users\Admin\AppData\Local\Temp\2DF1.tmp"45⤵
- Executes dropped EXE
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"46⤵
- Executes dropped EXE
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\312D.tmp"C:\Users\Admin\AppData\Local\Temp\312D.tmp"47⤵
- Executes dropped EXE
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\3227.tmp"C:\Users\Admin\AppData\Local\Temp\3227.tmp"48⤵
- Executes dropped EXE
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\32F2.tmp"C:\Users\Admin\AppData\Local\Temp\32F2.tmp"49⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\33FC.tmp"C:\Users\Admin\AppData\Local\Temp\33FC.tmp"50⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3488.tmp"C:\Users\Admin\AppData\Local\Temp\3488.tmp"51⤵
- Executes dropped EXE
PID:884 -
C:\Users\Admin\AppData\Local\Temp\3515.tmp"C:\Users\Admin\AppData\Local\Temp\3515.tmp"52⤵
- Executes dropped EXE
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\3786.tmp"C:\Users\Admin\AppData\Local\Temp\3786.tmp"53⤵
- Executes dropped EXE
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\37F3.tmp"C:\Users\Admin\AppData\Local\Temp\37F3.tmp"54⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\388F.tmp"C:\Users\Admin\AppData\Local\Temp\388F.tmp"55⤵
- Executes dropped EXE
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\393B.tmp"C:\Users\Admin\AppData\Local\Temp\393B.tmp"56⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\3A06.tmp"C:\Users\Admin\AppData\Local\Temp\3A06.tmp"57⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\3A74.tmp"C:\Users\Admin\AppData\Local\Temp\3A74.tmp"58⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"59⤵
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\3BCC.tmp"C:\Users\Admin\AppData\Local\Temp\3BCC.tmp"60⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\3C77.tmp"C:\Users\Admin\AppData\Local\Temp\3C77.tmp"61⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\3D23.tmp"C:\Users\Admin\AppData\Local\Temp\3D23.tmp"62⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\3D91.tmp"C:\Users\Admin\AppData\Local\Temp\3D91.tmp"63⤵
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"64⤵
- Executes dropped EXE
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\3E8B.tmp"C:\Users\Admin\AppData\Local\Temp\3E8B.tmp"65⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\3F17.tmp"C:\Users\Admin\AppData\Local\Temp\3F17.tmp"66⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\3FA4.tmp"C:\Users\Admin\AppData\Local\Temp\3FA4.tmp"67⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\4031.tmp"C:\Users\Admin\AppData\Local\Temp\4031.tmp"68⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\409E.tmp"C:\Users\Admin\AppData\Local\Temp\409E.tmp"69⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\412B.tmp"C:\Users\Admin\AppData\Local\Temp\412B.tmp"70⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\41A8.tmp"C:\Users\Admin\AppData\Local\Temp\41A8.tmp"71⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\4215.tmp"C:\Users\Admin\AppData\Local\Temp\4215.tmp"72⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\4292.tmp"C:\Users\Admin\AppData\Local\Temp\4292.tmp"73⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\42F0.tmp"C:\Users\Admin\AppData\Local\Temp\42F0.tmp"74⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\436D.tmp"C:\Users\Admin\AppData\Local\Temp\436D.tmp"75⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\43EA.tmp"C:\Users\Admin\AppData\Local\Temp\43EA.tmp"76⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\4457.tmp"C:\Users\Admin\AppData\Local\Temp\4457.tmp"77⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\44F3.tmp"C:\Users\Admin\AppData\Local\Temp\44F3.tmp"78⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\4570.tmp"C:\Users\Admin\AppData\Local\Temp\4570.tmp"79⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\460D.tmp"C:\Users\Admin\AppData\Local\Temp\460D.tmp"80⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\467A.tmp"C:\Users\Admin\AppData\Local\Temp\467A.tmp"81⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\4716.tmp"C:\Users\Admin\AppData\Local\Temp\4716.tmp"82⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\4784.tmp"C:\Users\Admin\AppData\Local\Temp\4784.tmp"83⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\48DB.tmp"C:\Users\Admin\AppData\Local\Temp\48DB.tmp"84⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\4968.tmp"C:\Users\Admin\AppData\Local\Temp\4968.tmp"85⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\49E5.tmp"C:\Users\Admin\AppData\Local\Temp\49E5.tmp"86⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"87⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\4B6C.tmp"C:\Users\Admin\AppData\Local\Temp\4B6C.tmp"88⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"89⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\4C94.tmp"C:\Users\Admin\AppData\Local\Temp\4C94.tmp"90⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\4D60.tmp"C:\Users\Admin\AppData\Local\Temp\4D60.tmp"91⤵PID:716
-
C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"92⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"C:\Users\Admin\AppData\Local\Temp\4EC7.tmp"93⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\4F44.tmp"C:\Users\Admin\AppData\Local\Temp\4F44.tmp"94⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\50DA.tmp"C:\Users\Admin\AppData\Local\Temp\50DA.tmp"95⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\5157.tmp"C:\Users\Admin\AppData\Local\Temp\5157.tmp"96⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\51C5.tmp"C:\Users\Admin\AppData\Local\Temp\51C5.tmp"97⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\5242.tmp"C:\Users\Admin\AppData\Local\Temp\5242.tmp"98⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\52CE.tmp"C:\Users\Admin\AppData\Local\Temp\52CE.tmp"99⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\535B.tmp"C:\Users\Admin\AppData\Local\Temp\535B.tmp"100⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\53C8.tmp"C:\Users\Admin\AppData\Local\Temp\53C8.tmp"101⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\54B3.tmp"C:\Users\Admin\AppData\Local\Temp\54B3.tmp"102⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\553F.tmp"C:\Users\Admin\AppData\Local\Temp\553F.tmp"103⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\55CC.tmp"C:\Users\Admin\AppData\Local\Temp\55CC.tmp"104⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\5649.tmp"C:\Users\Admin\AppData\Local\Temp\5649.tmp"105⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\56B6.tmp"C:\Users\Admin\AppData\Local\Temp\56B6.tmp"106⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\5724.tmp"C:\Users\Admin\AppData\Local\Temp\5724.tmp"107⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\57C0.tmp"C:\Users\Admin\AppData\Local\Temp\57C0.tmp"108⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\58D9.tmp"C:\Users\Admin\AppData\Local\Temp\58D9.tmp"109⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\5966.tmp"C:\Users\Admin\AppData\Local\Temp\5966.tmp"110⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\59E3.tmp"C:\Users\Admin\AppData\Local\Temp\59E3.tmp"111⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\5A50.tmp"C:\Users\Admin\AppData\Local\Temp\5A50.tmp"112⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\5ADD.tmp"C:\Users\Admin\AppData\Local\Temp\5ADD.tmp"113⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"114⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"115⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\5C34.tmp"C:\Users\Admin\AppData\Local\Temp\5C34.tmp"116⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"117⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\5D1F.tmp"C:\Users\Admin\AppData\Local\Temp\5D1F.tmp"118⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\5D9C.tmp"C:\Users\Admin\AppData\Local\Temp\5D9C.tmp"119⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\5E48.tmp"C:\Users\Admin\AppData\Local\Temp\5E48.tmp"120⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"121⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\5F22.tmp"C:\Users\Admin\AppData\Local\Temp\5F22.tmp"122⤵PID:4512
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-