Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-08_d16da55ae695926072e113101df3b03a_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-08_d16da55ae695926072e113101df3b03a_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-08_d16da55ae695926072e113101df3b03a_mafia_JC.exe
-
Size
520KB
-
MD5
d16da55ae695926072e113101df3b03a
-
SHA1
34fb22b24a5efe5b66f078ffd2760c3a5636176e
-
SHA256
ed7ce4445017a9e9967c5514744252f645a1117c038227b3181fcda1e56949f0
-
SHA512
57c633f2bf9c88b6275294139f8e6e1d3a128a0f46fd2976c54743070815f272177ddba13a1805ce6e0a485be45f13b81454511d4e49f54dd3f22c3b28e097ac
-
SSDEEP
12288:roRXOQjmOyG+nJrvzyFoErL0DSQfJzBncFAJNZ:rogQ9ydn8HEDLJBnKWN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2412 FD3C.tmp 872 FDF7.tmp 2960 FEC3.tmp 3920 FFDC.tmp 1184 88.tmp 3536 162.tmp 376 1FF.tmp 832 356.tmp 1812 422.tmp 3268 4ED.tmp 3624 5A8.tmp 516 664.tmp 228 72F.tmp 3808 904.tmp 452 9CF.tmp 1908 A6B.tmp 968 AE8.tmp 3056 B94.tmp 5076 C4F.tmp 1464 CDC.tmp 724 DA7.tmp 4976 E82.tmp 1672 F6C.tmp 4432 1047.tmp 4796 10F3.tmp 4324 11ED.tmp 3708 12E7.tmp 1320 13C2.tmp 3108 14DB.tmp 1308 15E4.tmp 1780 16BF.tmp 1888 179A.tmp 1860 1875.tmp 4132 1CF9.tmp 4560 1DB4.tmp 3444 1E41.tmp 2564 1EBE.tmp 3264 1F6A.tmp 4072 2016.tmp 2200 20C2.tmp 3960 218D.tmp 220 2248.tmp 3488 2304.tmp 2332 23BF.tmp 2116 243C.tmp 2516 24B9.tmp 540 2584.tmp 3976 2611.tmp 3668 26BD.tmp 3068 2759.tmp 840 2805.tmp 2288 2892.tmp 5068 292E.tmp 1544 29BB.tmp 4256 2A76.tmp 2956 2AF3.tmp 5028 2B8F.tmp 3964 2C3B.tmp 3356 2CD7.tmp 2120 2D54.tmp 3616 2E00.tmp 1636 2E8D.tmp 4404 2F1A.tmp 1424 2F97.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 2412 4580 NEAS.2023-09-08_d16da55ae695926072e113101df3b03a_mafia_JC.exe 82 PID 4580 wrote to memory of 2412 4580 NEAS.2023-09-08_d16da55ae695926072e113101df3b03a_mafia_JC.exe 82 PID 4580 wrote to memory of 2412 4580 NEAS.2023-09-08_d16da55ae695926072e113101df3b03a_mafia_JC.exe 82 PID 2412 wrote to memory of 872 2412 FD3C.tmp 83 PID 2412 wrote to memory of 872 2412 FD3C.tmp 83 PID 2412 wrote to memory of 872 2412 FD3C.tmp 83 PID 872 wrote to memory of 2960 872 FDF7.tmp 84 PID 872 wrote to memory of 2960 872 FDF7.tmp 84 PID 872 wrote to memory of 2960 872 FDF7.tmp 84 PID 2960 wrote to memory of 3920 2960 FEC3.tmp 86 PID 2960 wrote to memory of 3920 2960 FEC3.tmp 86 PID 2960 wrote to memory of 3920 2960 FEC3.tmp 86 PID 3920 wrote to memory of 1184 3920 FFDC.tmp 88 PID 3920 wrote to memory of 1184 3920 FFDC.tmp 88 PID 3920 wrote to memory of 1184 3920 FFDC.tmp 88 PID 1184 wrote to memory of 3536 1184 88.tmp 89 PID 1184 wrote to memory of 3536 1184 88.tmp 89 PID 1184 wrote to memory of 3536 1184 88.tmp 89 PID 3536 wrote to memory of 376 3536 162.tmp 90 PID 3536 wrote to memory of 376 3536 162.tmp 90 PID 3536 wrote to memory of 376 3536 162.tmp 90 PID 376 wrote to memory of 832 376 1FF.tmp 92 PID 376 wrote to memory of 832 376 1FF.tmp 92 PID 376 wrote to memory of 832 376 1FF.tmp 92 PID 832 wrote to memory of 1812 832 356.tmp 93 PID 832 wrote to memory of 1812 832 356.tmp 93 PID 832 wrote to memory of 1812 832 356.tmp 93 PID 1812 wrote to memory of 3268 1812 422.tmp 94 PID 1812 wrote to memory of 3268 1812 422.tmp 94 PID 1812 wrote to memory of 3268 1812 422.tmp 94 PID 3268 wrote to memory of 3624 3268 4ED.tmp 95 PID 3268 wrote to memory of 3624 3268 4ED.tmp 95 PID 3268 wrote to memory of 3624 3268 4ED.tmp 95 PID 3624 wrote to memory of 516 3624 5A8.tmp 96 PID 3624 wrote to memory of 516 3624 5A8.tmp 96 PID 3624 wrote to memory of 516 3624 5A8.tmp 96 PID 516 wrote to memory of 228 516 664.tmp 97 PID 516 wrote to memory of 228 516 664.tmp 97 PID 516 wrote to memory of 228 516 664.tmp 97 PID 228 wrote to memory of 3808 228 72F.tmp 98 PID 228 wrote to memory of 3808 228 72F.tmp 98 PID 228 wrote to memory of 3808 228 72F.tmp 98 PID 3808 wrote to memory of 452 3808 904.tmp 99 PID 3808 wrote to memory of 452 3808 904.tmp 99 PID 3808 wrote to memory of 452 3808 904.tmp 99 PID 452 wrote to memory of 1908 452 9CF.tmp 100 PID 452 wrote to memory of 1908 452 9CF.tmp 100 PID 452 wrote to memory of 1908 452 9CF.tmp 100 PID 1908 wrote to memory of 968 1908 A6B.tmp 101 PID 1908 wrote to memory of 968 1908 A6B.tmp 101 PID 1908 wrote to memory of 968 1908 A6B.tmp 101 PID 968 wrote to memory of 3056 968 AE8.tmp 102 PID 968 wrote to memory of 3056 968 AE8.tmp 102 PID 968 wrote to memory of 3056 968 AE8.tmp 102 PID 3056 wrote to memory of 5076 3056 B94.tmp 103 PID 3056 wrote to memory of 5076 3056 B94.tmp 103 PID 3056 wrote to memory of 5076 3056 B94.tmp 103 PID 5076 wrote to memory of 1464 5076 C4F.tmp 104 PID 5076 wrote to memory of 1464 5076 C4F.tmp 104 PID 5076 wrote to memory of 1464 5076 C4F.tmp 104 PID 1464 wrote to memory of 724 1464 CDC.tmp 105 PID 1464 wrote to memory of 724 1464 CDC.tmp 105 PID 1464 wrote to memory of 724 1464 CDC.tmp 105 PID 724 wrote to memory of 4976 724 DA7.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-08_d16da55ae695926072e113101df3b03a_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-08_d16da55ae695926072e113101df3b03a_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\FEC3.tmp"C:\Users\Admin\AppData\Local\Temp\FEC3.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\88.tmp"C:\Users\Admin\AppData\Local\Temp\88.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\162.tmp"C:\Users\Admin\AppData\Local\Temp\162.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\1FF.tmp"C:\Users\Admin\AppData\Local\Temp\1FF.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\356.tmp"C:\Users\Admin\AppData\Local\Temp\356.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\422.tmp"C:\Users\Admin\AppData\Local\Temp\422.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\4ED.tmp"C:\Users\Admin\AppData\Local\Temp\4ED.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\5A8.tmp"C:\Users\Admin\AppData\Local\Temp\5A8.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\664.tmp"C:\Users\Admin\AppData\Local\Temp\664.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\72F.tmp"C:\Users\Admin\AppData\Local\Temp\72F.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\904.tmp"C:\Users\Admin\AppData\Local\Temp\904.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\9CF.tmp"C:\Users\Admin\AppData\Local\Temp\9CF.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\A6B.tmp"C:\Users\Admin\AppData\Local\Temp\A6B.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\AE8.tmp"C:\Users\Admin\AppData\Local\Temp\AE8.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\B94.tmp"C:\Users\Admin\AppData\Local\Temp\B94.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\C4F.tmp"C:\Users\Admin\AppData\Local\Temp\C4F.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\CDC.tmp"C:\Users\Admin\AppData\Local\Temp\CDC.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\DA7.tmp"C:\Users\Admin\AppData\Local\Temp\DA7.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\E82.tmp"C:\Users\Admin\AppData\Local\Temp\E82.tmp"23⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\F6C.tmp"C:\Users\Admin\AppData\Local\Temp\F6C.tmp"24⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\1047.tmp"C:\Users\Admin\AppData\Local\Temp\1047.tmp"25⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\10F3.tmp"C:\Users\Admin\AppData\Local\Temp\10F3.tmp"26⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\11ED.tmp"C:\Users\Admin\AppData\Local\Temp\11ED.tmp"27⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\12E7.tmp"C:\Users\Admin\AppData\Local\Temp\12E7.tmp"28⤵
- Executes dropped EXE
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\13C2.tmp"C:\Users\Admin\AppData\Local\Temp\13C2.tmp"29⤵
- Executes dropped EXE
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\14DB.tmp"C:\Users\Admin\AppData\Local\Temp\14DB.tmp"30⤵
- Executes dropped EXE
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\15E4.tmp"C:\Users\Admin\AppData\Local\Temp\15E4.tmp"31⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\16BF.tmp"C:\Users\Admin\AppData\Local\Temp\16BF.tmp"32⤵
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\179A.tmp"C:\Users\Admin\AppData\Local\Temp\179A.tmp"33⤵
- Executes dropped EXE
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\1875.tmp"C:\Users\Admin\AppData\Local\Temp\1875.tmp"34⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\1CF9.tmp"C:\Users\Admin\AppData\Local\Temp\1CF9.tmp"35⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"36⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\1E41.tmp"C:\Users\Admin\AppData\Local\Temp\1E41.tmp"37⤵
- Executes dropped EXE
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\1EBE.tmp"C:\Users\Admin\AppData\Local\Temp\1EBE.tmp"38⤵
- Executes dropped EXE
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\1F6A.tmp"C:\Users\Admin\AppData\Local\Temp\1F6A.tmp"39⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\2016.tmp"C:\Users\Admin\AppData\Local\Temp\2016.tmp"40⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\20C2.tmp"C:\Users\Admin\AppData\Local\Temp\20C2.tmp"41⤵
- Executes dropped EXE
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\218D.tmp"C:\Users\Admin\AppData\Local\Temp\218D.tmp"42⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\2248.tmp"C:\Users\Admin\AppData\Local\Temp\2248.tmp"43⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\2304.tmp"C:\Users\Admin\AppData\Local\Temp\2304.tmp"44⤵
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\23BF.tmp"C:\Users\Admin\AppData\Local\Temp\23BF.tmp"45⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\243C.tmp"C:\Users\Admin\AppData\Local\Temp\243C.tmp"46⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\24B9.tmp"C:\Users\Admin\AppData\Local\Temp\24B9.tmp"47⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\2584.tmp"C:\Users\Admin\AppData\Local\Temp\2584.tmp"48⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\2611.tmp"C:\Users\Admin\AppData\Local\Temp\2611.tmp"49⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\26BD.tmp"C:\Users\Admin\AppData\Local\Temp\26BD.tmp"50⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\2759.tmp"C:\Users\Admin\AppData\Local\Temp\2759.tmp"51⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\2805.tmp"C:\Users\Admin\AppData\Local\Temp\2805.tmp"52⤵
- Executes dropped EXE
PID:840 -
C:\Users\Admin\AppData\Local\Temp\2892.tmp"C:\Users\Admin\AppData\Local\Temp\2892.tmp"53⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\292E.tmp"C:\Users\Admin\AppData\Local\Temp\292E.tmp"54⤵
- Executes dropped EXE
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\29BB.tmp"C:\Users\Admin\AppData\Local\Temp\29BB.tmp"55⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\2A76.tmp"C:\Users\Admin\AppData\Local\Temp\2A76.tmp"56⤵
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\2AF3.tmp"C:\Users\Admin\AppData\Local\Temp\2AF3.tmp"57⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"58⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"59⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"60⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\2D54.tmp"C:\Users\Admin\AppData\Local\Temp\2D54.tmp"61⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\2E00.tmp"C:\Users\Admin\AppData\Local\Temp\2E00.tmp"62⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"63⤵
- Executes dropped EXE
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"64⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\2F97.tmp"C:\Users\Admin\AppData\Local\Temp\2F97.tmp"65⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"66⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\30B0.tmp"C:\Users\Admin\AppData\Local\Temp\30B0.tmp"67⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\313C.tmp"C:\Users\Admin\AppData\Local\Temp\313C.tmp"68⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\31C9.tmp"C:\Users\Admin\AppData\Local\Temp\31C9.tmp"69⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\3246.tmp"C:\Users\Admin\AppData\Local\Temp\3246.tmp"70⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\33AD.tmp"C:\Users\Admin\AppData\Local\Temp\33AD.tmp"71⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"72⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\34B7.tmp"C:\Users\Admin\AppData\Local\Temp\34B7.tmp"73⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\3534.tmp"C:\Users\Admin\AppData\Local\Temp\3534.tmp"74⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"75⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\365D.tmp"C:\Users\Admin\AppData\Local\Temp\365D.tmp"76⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\3709.tmp"C:\Users\Admin\AppData\Local\Temp\3709.tmp"77⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\3786.tmp"C:\Users\Admin\AppData\Local\Temp\3786.tmp"78⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\3812.tmp"C:\Users\Admin\AppData\Local\Temp\3812.tmp"79⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\38AF.tmp"C:\Users\Admin\AppData\Local\Temp\38AF.tmp"80⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\392C.tmp"C:\Users\Admin\AppData\Local\Temp\392C.tmp"81⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\39C8.tmp"C:\Users\Admin\AppData\Local\Temp\39C8.tmp"82⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\3A83.tmp"C:\Users\Admin\AppData\Local\Temp\3A83.tmp"83⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"84⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"85⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\3C68.tmp"C:\Users\Admin\AppData\Local\Temp\3C68.tmp"86⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\3D14.tmp"C:\Users\Admin\AppData\Local\Temp\3D14.tmp"87⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"88⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\3EC9.tmp"C:\Users\Admin\AppData\Local\Temp\3EC9.tmp"89⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\3F46.tmp"C:\Users\Admin\AppData\Local\Temp\3F46.tmp"90⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"91⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\406F.tmp"C:\Users\Admin\AppData\Local\Temp\406F.tmp"92⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\40FC.tmp"C:\Users\Admin\AppData\Local\Temp\40FC.tmp"93⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\4198.tmp"C:\Users\Admin\AppData\Local\Temp\4198.tmp"94⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\4244.tmp"C:\Users\Admin\AppData\Local\Temp\4244.tmp"95⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\42E0.tmp"C:\Users\Admin\AppData\Local\Temp\42E0.tmp"96⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\43BB.tmp"C:\Users\Admin\AppData\Local\Temp\43BB.tmp"97⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\4447.tmp"C:\Users\Admin\AppData\Local\Temp\4447.tmp"98⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\44B5.tmp"C:\Users\Admin\AppData\Local\Temp\44B5.tmp"99⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\4551.tmp"C:\Users\Admin\AppData\Local\Temp\4551.tmp"100⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\45DE.tmp"C:\Users\Admin\AppData\Local\Temp\45DE.tmp"101⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\467A.tmp"C:\Users\Admin\AppData\Local\Temp\467A.tmp"102⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\46F7.tmp"C:\Users\Admin\AppData\Local\Temp\46F7.tmp"103⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\4774.tmp"C:\Users\Admin\AppData\Local\Temp\4774.tmp"104⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\4810.tmp"C:\Users\Admin\AppData\Local\Temp\4810.tmp"105⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\48CC.tmp"C:\Users\Admin\AppData\Local\Temp\48CC.tmp"106⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\4978.tmp"C:\Users\Admin\AppData\Local\Temp\4978.tmp"107⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\4A14.tmp"C:\Users\Admin\AppData\Local\Temp\4A14.tmp"108⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"C:\Users\Admin\AppData\Local\Temp\4AA0.tmp"109⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\4B5C.tmp"C:\Users\Admin\AppData\Local\Temp\4B5C.tmp"110⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"111⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\4C56.tmp"C:\Users\Admin\AppData\Local\Temp\4C56.tmp"112⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\4CD3.tmp"C:\Users\Admin\AppData\Local\Temp\4CD3.tmp"113⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\4D60.tmp"C:\Users\Admin\AppData\Local\Temp\4D60.tmp"114⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\4ED7.tmp"C:\Users\Admin\AppData\Local\Temp\4ED7.tmp"115⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\4F44.tmp"C:\Users\Admin\AppData\Local\Temp\4F44.tmp"116⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"117⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\504E.tmp"C:\Users\Admin\AppData\Local\Temp\504E.tmp"118⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\50DA.tmp"C:\Users\Admin\AppData\Local\Temp\50DA.tmp"119⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\5157.tmp"C:\Users\Admin\AppData\Local\Temp\5157.tmp"120⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\51C5.tmp"C:\Users\Admin\AppData\Local\Temp\51C5.tmp"121⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\5242.tmp"C:\Users\Admin\AppData\Local\Temp\5242.tmp"122⤵PID:3224
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-