Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_d32e8f196ff0e15c7d71ab32c38ce606_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_d32e8f196ff0e15c7d71ab32c38ce606_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-06_d32e8f196ff0e15c7d71ab32c38ce606_mafia_JC.exe
-
Size
486KB
-
MD5
d32e8f196ff0e15c7d71ab32c38ce606
-
SHA1
64c8744dea4b03d09c94d1118440dd2c0f730081
-
SHA256
a568e8b9611320d23211208044caf105f3739a7fe2db83ba603aebaab69dbc85
-
SHA512
f687a83d5e2fad0156b08bac571ae2109267269a93caca2b83419aada247e39f37f01781a1e5b3a1ab5ccc6015d0cb2a2f51ad8ae0d0216f75c4b8e7a09dcb1e
-
SSDEEP
6144:Forf3lPvovsgZnqG2C7mOTeiLfD7E9LsHFc7/ujk76sssycPzNI2I15e5mn7ZWMm:UU5rCOTeiD28K/YkmeG7e5m7ZpRsRNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3432 2E20.tmp 2380 2EEB.tmp 3864 2FA6.tmp 3208 30B0.tmp 376 319A.tmp 5048 3236.tmp 4916 32D3.tmp 1444 33DC.tmp 4544 3498.tmp 5020 3563.tmp 3904 35F0.tmp 4588 36AB.tmp 3804 3786.tmp 3536 3812.tmp 4160 38DE.tmp 4568 3BFA.tmp 3144 3CB6.tmp 4952 3D52.tmp 3528 3DFE.tmp 2788 3EBA.tmp 1816 3F46.tmp 1588 4021.tmp 4572 40DC.tmp 4100 41B7.tmp 4128 4273.tmp 1256 433E.tmp 4668 4419.tmp 1368 44D4.tmp 1512 4570.tmp 3760 463B.tmp 3196 46E7.tmp 4540 4774.tmp 1756 483F.tmp 4604 48BC.tmp 4236 4949.tmp 904 4D9E.tmp 3064 4E5A.tmp 1936 4EE6.tmp 3272 4F92.tmp 3452 502E.tmp 1684 50AB.tmp 2200 5138.tmp 2692 51D4.tmp 4228 5270.tmp 4072 52FD.tmp 3524 537A.tmp 4632 5426.tmp 4476 54B3.tmp 5112 553F.tmp 2376 55CC.tmp 4348 5668.tmp 1384 56F5.tmp 1508 5791.tmp 4680 582D.tmp 2472 58BA.tmp 3032 5956.tmp 1460 5A21.tmp 4468 5ACD.tmp 3336 5B5A.tmp 3736 5BD7.tmp 3952 5C92.tmp 3372 5D1F.tmp 2020 5DDA.tmp 3080 5E57.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3432 2100 NEAS.2023-09-06_d32e8f196ff0e15c7d71ab32c38ce606_mafia_JC.exe 82 PID 2100 wrote to memory of 3432 2100 NEAS.2023-09-06_d32e8f196ff0e15c7d71ab32c38ce606_mafia_JC.exe 82 PID 2100 wrote to memory of 3432 2100 NEAS.2023-09-06_d32e8f196ff0e15c7d71ab32c38ce606_mafia_JC.exe 82 PID 3432 wrote to memory of 2380 3432 2E20.tmp 84 PID 3432 wrote to memory of 2380 3432 2E20.tmp 84 PID 3432 wrote to memory of 2380 3432 2E20.tmp 84 PID 2380 wrote to memory of 3864 2380 2EEB.tmp 85 PID 2380 wrote to memory of 3864 2380 2EEB.tmp 85 PID 2380 wrote to memory of 3864 2380 2EEB.tmp 85 PID 3864 wrote to memory of 3208 3864 2FA6.tmp 86 PID 3864 wrote to memory of 3208 3864 2FA6.tmp 86 PID 3864 wrote to memory of 3208 3864 2FA6.tmp 86 PID 3208 wrote to memory of 376 3208 30B0.tmp 88 PID 3208 wrote to memory of 376 3208 30B0.tmp 88 PID 3208 wrote to memory of 376 3208 30B0.tmp 88 PID 376 wrote to memory of 5048 376 319A.tmp 89 PID 376 wrote to memory of 5048 376 319A.tmp 89 PID 376 wrote to memory of 5048 376 319A.tmp 89 PID 5048 wrote to memory of 4916 5048 3236.tmp 90 PID 5048 wrote to memory of 4916 5048 3236.tmp 90 PID 5048 wrote to memory of 4916 5048 3236.tmp 90 PID 4916 wrote to memory of 1444 4916 32D3.tmp 92 PID 4916 wrote to memory of 1444 4916 32D3.tmp 92 PID 4916 wrote to memory of 1444 4916 32D3.tmp 92 PID 1444 wrote to memory of 4544 1444 33DC.tmp 93 PID 1444 wrote to memory of 4544 1444 33DC.tmp 93 PID 1444 wrote to memory of 4544 1444 33DC.tmp 93 PID 4544 wrote to memory of 5020 4544 3498.tmp 94 PID 4544 wrote to memory of 5020 4544 3498.tmp 94 PID 4544 wrote to memory of 5020 4544 3498.tmp 94 PID 5020 wrote to memory of 3904 5020 3563.tmp 95 PID 5020 wrote to memory of 3904 5020 3563.tmp 95 PID 5020 wrote to memory of 3904 5020 3563.tmp 95 PID 3904 wrote to memory of 4588 3904 35F0.tmp 96 PID 3904 wrote to memory of 4588 3904 35F0.tmp 96 PID 3904 wrote to memory of 4588 3904 35F0.tmp 96 PID 4588 wrote to memory of 3804 4588 36AB.tmp 97 PID 4588 wrote to memory of 3804 4588 36AB.tmp 97 PID 4588 wrote to memory of 3804 4588 36AB.tmp 97 PID 3804 wrote to memory of 3536 3804 3786.tmp 98 PID 3804 wrote to memory of 3536 3804 3786.tmp 98 PID 3804 wrote to memory of 3536 3804 3786.tmp 98 PID 3536 wrote to memory of 4160 3536 3812.tmp 99 PID 3536 wrote to memory of 4160 3536 3812.tmp 99 PID 3536 wrote to memory of 4160 3536 3812.tmp 99 PID 4160 wrote to memory of 4568 4160 38DE.tmp 100 PID 4160 wrote to memory of 4568 4160 38DE.tmp 100 PID 4160 wrote to memory of 4568 4160 38DE.tmp 100 PID 4568 wrote to memory of 3144 4568 3BFA.tmp 101 PID 4568 wrote to memory of 3144 4568 3BFA.tmp 101 PID 4568 wrote to memory of 3144 4568 3BFA.tmp 101 PID 3144 wrote to memory of 4952 3144 3CB6.tmp 102 PID 3144 wrote to memory of 4952 3144 3CB6.tmp 102 PID 3144 wrote to memory of 4952 3144 3CB6.tmp 102 PID 4952 wrote to memory of 3528 4952 3D52.tmp 103 PID 4952 wrote to memory of 3528 4952 3D52.tmp 103 PID 4952 wrote to memory of 3528 4952 3D52.tmp 103 PID 3528 wrote to memory of 2788 3528 3DFE.tmp 104 PID 3528 wrote to memory of 2788 3528 3DFE.tmp 104 PID 3528 wrote to memory of 2788 3528 3DFE.tmp 104 PID 2788 wrote to memory of 1816 2788 3EBA.tmp 105 PID 2788 wrote to memory of 1816 2788 3EBA.tmp 105 PID 2788 wrote to memory of 1816 2788 3EBA.tmp 105 PID 1816 wrote to memory of 1588 1816 3F46.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_d32e8f196ff0e15c7d71ab32c38ce606_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_d32e8f196ff0e15c7d71ab32c38ce606_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\2E20.tmp"C:\Users\Admin\AppData\Local\Temp\2E20.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\30B0.tmp"C:\Users\Admin\AppData\Local\Temp\30B0.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\319A.tmp"C:\Users\Admin\AppData\Local\Temp\319A.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\3236.tmp"C:\Users\Admin\AppData\Local\Temp\3236.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\3563.tmp"C:\Users\Admin\AppData\Local\Temp\3563.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\35F0.tmp"C:\Users\Admin\AppData\Local\Temp\35F0.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\36AB.tmp"C:\Users\Admin\AppData\Local\Temp\36AB.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\3786.tmp"C:\Users\Admin\AppData\Local\Temp\3786.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\3812.tmp"C:\Users\Admin\AppData\Local\Temp\3812.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\38DE.tmp"C:\Users\Admin\AppData\Local\Temp\38DE.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\3BFA.tmp"C:\Users\Admin\AppData\Local\Temp\3BFA.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\3D52.tmp"C:\Users\Admin\AppData\Local\Temp\3D52.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"C:\Users\Admin\AppData\Local\Temp\3DFE.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\3F46.tmp"C:\Users\Admin\AppData\Local\Temp\3F46.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\4021.tmp"C:\Users\Admin\AppData\Local\Temp\4021.tmp"23⤵
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\40DC.tmp"C:\Users\Admin\AppData\Local\Temp\40DC.tmp"24⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\41B7.tmp"C:\Users\Admin\AppData\Local\Temp\41B7.tmp"25⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\4273.tmp"C:\Users\Admin\AppData\Local\Temp\4273.tmp"26⤵
- Executes dropped EXE
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\433E.tmp"C:\Users\Admin\AppData\Local\Temp\433E.tmp"27⤵
- Executes dropped EXE
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\4419.tmp"C:\Users\Admin\AppData\Local\Temp\4419.tmp"28⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\44D4.tmp"C:\Users\Admin\AppData\Local\Temp\44D4.tmp"29⤵
- Executes dropped EXE
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\4570.tmp"C:\Users\Admin\AppData\Local\Temp\4570.tmp"30⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\463B.tmp"C:\Users\Admin\AppData\Local\Temp\463B.tmp"31⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\46E7.tmp"C:\Users\Admin\AppData\Local\Temp\46E7.tmp"32⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\4774.tmp"C:\Users\Admin\AppData\Local\Temp\4774.tmp"33⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\483F.tmp"C:\Users\Admin\AppData\Local\Temp\483F.tmp"34⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\48BC.tmp"C:\Users\Admin\AppData\Local\Temp\48BC.tmp"35⤵
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\4949.tmp"C:\Users\Admin\AppData\Local\Temp\4949.tmp"36⤵
- Executes dropped EXE
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\4D9E.tmp"C:\Users\Admin\AppData\Local\Temp\4D9E.tmp"37⤵
- Executes dropped EXE
PID:904 -
C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"38⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"39⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\4F92.tmp"C:\Users\Admin\AppData\Local\Temp\4F92.tmp"40⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\502E.tmp"C:\Users\Admin\AppData\Local\Temp\502E.tmp"41⤵
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\50AB.tmp"C:\Users\Admin\AppData\Local\Temp\50AB.tmp"42⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\5138.tmp"C:\Users\Admin\AppData\Local\Temp\5138.tmp"43⤵
- Executes dropped EXE
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\51D4.tmp"C:\Users\Admin\AppData\Local\Temp\51D4.tmp"44⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\5270.tmp"C:\Users\Admin\AppData\Local\Temp\5270.tmp"45⤵
- Executes dropped EXE
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\52FD.tmp"C:\Users\Admin\AppData\Local\Temp\52FD.tmp"46⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\537A.tmp"C:\Users\Admin\AppData\Local\Temp\537A.tmp"47⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\5426.tmp"C:\Users\Admin\AppData\Local\Temp\5426.tmp"48⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\54B3.tmp"C:\Users\Admin\AppData\Local\Temp\54B3.tmp"49⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\553F.tmp"C:\Users\Admin\AppData\Local\Temp\553F.tmp"50⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\55CC.tmp"C:\Users\Admin\AppData\Local\Temp\55CC.tmp"51⤵
- Executes dropped EXE
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\5668.tmp"C:\Users\Admin\AppData\Local\Temp\5668.tmp"52⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\56F5.tmp"C:\Users\Admin\AppData\Local\Temp\56F5.tmp"53⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\5791.tmp"C:\Users\Admin\AppData\Local\Temp\5791.tmp"54⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\582D.tmp"C:\Users\Admin\AppData\Local\Temp\582D.tmp"55⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\58BA.tmp"C:\Users\Admin\AppData\Local\Temp\58BA.tmp"56⤵
- Executes dropped EXE
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\5956.tmp"C:\Users\Admin\AppData\Local\Temp\5956.tmp"57⤵
- Executes dropped EXE
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\5A21.tmp"C:\Users\Admin\AppData\Local\Temp\5A21.tmp"58⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"59⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\5B5A.tmp"C:\Users\Admin\AppData\Local\Temp\5B5A.tmp"60⤵
- Executes dropped EXE
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\5BD7.tmp"C:\Users\Admin\AppData\Local\Temp\5BD7.tmp"61⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\5C92.tmp"C:\Users\Admin\AppData\Local\Temp\5C92.tmp"62⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\5D1F.tmp"C:\Users\Admin\AppData\Local\Temp\5D1F.tmp"63⤵
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\5DDA.tmp"C:\Users\Admin\AppData\Local\Temp\5DDA.tmp"64⤵
- Executes dropped EXE
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\5E57.tmp"C:\Users\Admin\AppData\Local\Temp\5E57.tmp"65⤵
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\5F03.tmp"C:\Users\Admin\AppData\Local\Temp\5F03.tmp"66⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"67⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\601C.tmp"C:\Users\Admin\AppData\Local\Temp\601C.tmp"68⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\60B9.tmp"C:\Users\Admin\AppData\Local\Temp\60B9.tmp"69⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\6155.tmp"C:\Users\Admin\AppData\Local\Temp\6155.tmp"70⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\61F1.tmp"C:\Users\Admin\AppData\Local\Temp\61F1.tmp"71⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\627E.tmp"C:\Users\Admin\AppData\Local\Temp\627E.tmp"72⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\631A.tmp"C:\Users\Admin\AppData\Local\Temp\631A.tmp"73⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\63B6.tmp"C:\Users\Admin\AppData\Local\Temp\63B6.tmp"74⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\6433.tmp"C:\Users\Admin\AppData\Local\Temp\6433.tmp"75⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\64DF.tmp"C:\Users\Admin\AppData\Local\Temp\64DF.tmp"76⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\655C.tmp"C:\Users\Admin\AppData\Local\Temp\655C.tmp"77⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\65E9.tmp"C:\Users\Admin\AppData\Local\Temp\65E9.tmp"78⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\66B4.tmp"C:\Users\Admin\AppData\Local\Temp\66B4.tmp"79⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\6731.tmp"C:\Users\Admin\AppData\Local\Temp\6731.tmp"80⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\67DD.tmp"C:\Users\Admin\AppData\Local\Temp\67DD.tmp"81⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\684A.tmp"C:\Users\Admin\AppData\Local\Temp\684A.tmp"82⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\68C7.tmp"C:\Users\Admin\AppData\Local\Temp\68C7.tmp"83⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\6963.tmp"C:\Users\Admin\AppData\Local\Temp\6963.tmp"84⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\69F0.tmp"C:\Users\Admin\AppData\Local\Temp\69F0.tmp"85⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\6A7D.tmp"C:\Users\Admin\AppData\Local\Temp\6A7D.tmp"86⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\6AEA.tmp"C:\Users\Admin\AppData\Local\Temp\6AEA.tmp"87⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\6B77.tmp"C:\Users\Admin\AppData\Local\Temp\6B77.tmp"88⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\6BF4.tmp"C:\Users\Admin\AppData\Local\Temp\6BF4.tmp"89⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"90⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\6D5B.tmp"C:\Users\Admin\AppData\Local\Temp\6D5B.tmp"91⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\6DE8.tmp"C:\Users\Admin\AppData\Local\Temp\6DE8.tmp"92⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\6E94.tmp"C:\Users\Admin\AppData\Local\Temp\6E94.tmp"93⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\700B.tmp"C:\Users\Admin\AppData\Local\Temp\700B.tmp"94⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\70B6.tmp"C:\Users\Admin\AppData\Local\Temp\70B6.tmp"95⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\7124.tmp"C:\Users\Admin\AppData\Local\Temp\7124.tmp"96⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\71C0.tmp"C:\Users\Admin\AppData\Local\Temp\71C0.tmp"97⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\722D.tmp"C:\Users\Admin\AppData\Local\Temp\722D.tmp"98⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\72D9.tmp"C:\Users\Admin\AppData\Local\Temp\72D9.tmp"99⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\7376.tmp"C:\Users\Admin\AppData\Local\Temp\7376.tmp"100⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\7412.tmp"C:\Users\Admin\AppData\Local\Temp\7412.tmp"101⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\748F.tmp"C:\Users\Admin\AppData\Local\Temp\748F.tmp"102⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\751B.tmp"C:\Users\Admin\AppData\Local\Temp\751B.tmp"103⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\7598.tmp"C:\Users\Admin\AppData\Local\Temp\7598.tmp"104⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\7654.tmp"C:\Users\Admin\AppData\Local\Temp\7654.tmp"105⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\76D1.tmp"C:\Users\Admin\AppData\Local\Temp\76D1.tmp"106⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\774E.tmp"C:\Users\Admin\AppData\Local\Temp\774E.tmp"107⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\77DB.tmp"C:\Users\Admin\AppData\Local\Temp\77DB.tmp"108⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\7867.tmp"C:\Users\Admin\AppData\Local\Temp\7867.tmp"109⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\7903.tmp"C:\Users\Admin\AppData\Local\Temp\7903.tmp"110⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\79AF.tmp"C:\Users\Admin\AppData\Local\Temp\79AF.tmp"111⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"112⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\7AA9.tmp"C:\Users\Admin\AppData\Local\Temp\7AA9.tmp"113⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\7B26.tmp"C:\Users\Admin\AppData\Local\Temp\7B26.tmp"114⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\7BD2.tmp"C:\Users\Admin\AppData\Local\Temp\7BD2.tmp"115⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\7C4F.tmp"C:\Users\Admin\AppData\Local\Temp\7C4F.tmp"116⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\7CEB.tmp"C:\Users\Admin\AppData\Local\Temp\7CEB.tmp"117⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\7D88.tmp"C:\Users\Admin\AppData\Local\Temp\7D88.tmp"118⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\7E24.tmp"C:\Users\Admin\AppData\Local\Temp\7E24.tmp"119⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\7EB1.tmp"C:\Users\Admin\AppData\Local\Temp\7EB1.tmp"120⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\7F6C.tmp"C:\Users\Admin\AppData\Local\Temp\7F6C.tmp"121⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\8008.tmp"C:\Users\Admin\AppData\Local\Temp\8008.tmp"122⤵PID:2948
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-