Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
184s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_191e05f073e3cf8d3a4f708a82fa136c_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_191e05f073e3cf8d3a4f708a82fa136c_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-07_191e05f073e3cf8d3a4f708a82fa136c_mafia_JC.exe
-
Size
486KB
-
MD5
191e05f073e3cf8d3a4f708a82fa136c
-
SHA1
b55df706c617df0f0a2849f2fd46099b67681d62
-
SHA256
3dd47eb406a810e258da1bd597c2ff70972d06357929cb06df3ff89914b559ea
-
SHA512
4f3ba0e9ace371841dc798ebcb911935335597714724c9c00a4569c62af7b788489b3fa0bc1760b970cb52a5325efa1e4b248c8a9e9ef59b1328ca4c68d7aae0
-
SSDEEP
12288:oU5rCOTeiDOjnE16HRrtego9kcPx6YvjpjCNZ:oUQOJDd6HRrtego97fN+N
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2732 214E.tmp 3756 21EB.tmp 3036 2323.tmp 4424 23B0.tmp 4636 245C.tmp 2588 26AD.tmp 3028 29DA.tmp 4020 2AC4.tmp 1724 2C6A.tmp 5044 2CE7.tmp 1416 2D93.tmp 916 2E5E.tmp 1608 2FE5.tmp 3336 30BF.tmp 3484 313C.tmp 2132 31D9.tmp 4816 3294.tmp 5080 337F.tmp 1668 3524.tmp 4528 3582.tmp 1092 364D.tmp 3724 3767.tmp 2680 3841.tmp 2784 395B.tmp 3544 39E7.tmp 3092 3A74.tmp 2960 3B20.tmp 4196 3BEB.tmp 4940 3C97.tmp 3852 3D14.tmp 3236 3DC0.tmp 4592 3E4C.tmp 4036 3EF8.tmp 1408 3F85.tmp 4432 4031.tmp 2556 40AE.tmp 4332 414A.tmp 3632 41C7.tmp 2056 4273.tmp 2012 430F.tmp 4620 43AB.tmp 180 4438.tmp 2732 44B5.tmp 3608 4532.tmp 4836 459F.tmp 2476 463B.tmp 4728 46A9.tmp 3600 4716.tmp 4424 47C2.tmp 2728 482F.tmp 3912 49A6.tmp 3792 4A23.tmp 2936 4A91.tmp 3412 4AFE.tmp 1444 4B7B.tmp 1128 4BE9.tmp 1716 4C66.tmp 3916 4CD3.tmp 2100 4D60.tmp 3824 4DDD.tmp 4484 4F15.tmp 4012 4F92.tmp 2176 501F.tmp 2148 509C.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4620 wrote to memory of 2732 4620 NEAS.2023-09-07_191e05f073e3cf8d3a4f708a82fa136c_mafia_JC.exe 90 PID 4620 wrote to memory of 2732 4620 NEAS.2023-09-07_191e05f073e3cf8d3a4f708a82fa136c_mafia_JC.exe 90 PID 4620 wrote to memory of 2732 4620 NEAS.2023-09-07_191e05f073e3cf8d3a4f708a82fa136c_mafia_JC.exe 90 PID 2732 wrote to memory of 3756 2732 214E.tmp 91 PID 2732 wrote to memory of 3756 2732 214E.tmp 91 PID 2732 wrote to memory of 3756 2732 214E.tmp 91 PID 3756 wrote to memory of 3036 3756 21EB.tmp 92 PID 3756 wrote to memory of 3036 3756 21EB.tmp 92 PID 3756 wrote to memory of 3036 3756 21EB.tmp 92 PID 3036 wrote to memory of 4424 3036 2323.tmp 93 PID 3036 wrote to memory of 4424 3036 2323.tmp 93 PID 3036 wrote to memory of 4424 3036 2323.tmp 93 PID 4424 wrote to memory of 4636 4424 23B0.tmp 94 PID 4424 wrote to memory of 4636 4424 23B0.tmp 94 PID 4424 wrote to memory of 4636 4424 23B0.tmp 94 PID 4636 wrote to memory of 2588 4636 245C.tmp 96 PID 4636 wrote to memory of 2588 4636 245C.tmp 96 PID 4636 wrote to memory of 2588 4636 245C.tmp 96 PID 2588 wrote to memory of 3028 2588 26AD.tmp 97 PID 2588 wrote to memory of 3028 2588 26AD.tmp 97 PID 2588 wrote to memory of 3028 2588 26AD.tmp 97 PID 3028 wrote to memory of 4020 3028 29DA.tmp 98 PID 3028 wrote to memory of 4020 3028 29DA.tmp 98 PID 3028 wrote to memory of 4020 3028 29DA.tmp 98 PID 4020 wrote to memory of 1724 4020 2AC4.tmp 99 PID 4020 wrote to memory of 1724 4020 2AC4.tmp 99 PID 4020 wrote to memory of 1724 4020 2AC4.tmp 99 PID 1724 wrote to memory of 5044 1724 2C6A.tmp 101 PID 1724 wrote to memory of 5044 1724 2C6A.tmp 101 PID 1724 wrote to memory of 5044 1724 2C6A.tmp 101 PID 5044 wrote to memory of 1416 5044 2CE7.tmp 102 PID 5044 wrote to memory of 1416 5044 2CE7.tmp 102 PID 5044 wrote to memory of 1416 5044 2CE7.tmp 102 PID 1416 wrote to memory of 916 1416 2D93.tmp 103 PID 1416 wrote to memory of 916 1416 2D93.tmp 103 PID 1416 wrote to memory of 916 1416 2D93.tmp 103 PID 916 wrote to memory of 1608 916 2E5E.tmp 104 PID 916 wrote to memory of 1608 916 2E5E.tmp 104 PID 916 wrote to memory of 1608 916 2E5E.tmp 104 PID 1608 wrote to memory of 3336 1608 2FE5.tmp 105 PID 1608 wrote to memory of 3336 1608 2FE5.tmp 105 PID 1608 wrote to memory of 3336 1608 2FE5.tmp 105 PID 3336 wrote to memory of 3484 3336 30BF.tmp 106 PID 3336 wrote to memory of 3484 3336 30BF.tmp 106 PID 3336 wrote to memory of 3484 3336 30BF.tmp 106 PID 3484 wrote to memory of 2132 3484 313C.tmp 107 PID 3484 wrote to memory of 2132 3484 313C.tmp 107 PID 3484 wrote to memory of 2132 3484 313C.tmp 107 PID 2132 wrote to memory of 4816 2132 31D9.tmp 108 PID 2132 wrote to memory of 4816 2132 31D9.tmp 108 PID 2132 wrote to memory of 4816 2132 31D9.tmp 108 PID 4816 wrote to memory of 5080 4816 3294.tmp 109 PID 4816 wrote to memory of 5080 4816 3294.tmp 109 PID 4816 wrote to memory of 5080 4816 3294.tmp 109 PID 5080 wrote to memory of 1668 5080 337F.tmp 110 PID 5080 wrote to memory of 1668 5080 337F.tmp 110 PID 5080 wrote to memory of 1668 5080 337F.tmp 110 PID 1668 wrote to memory of 4528 1668 3524.tmp 111 PID 1668 wrote to memory of 4528 1668 3524.tmp 111 PID 1668 wrote to memory of 4528 1668 3524.tmp 111 PID 4528 wrote to memory of 1092 4528 3582.tmp 112 PID 4528 wrote to memory of 1092 4528 3582.tmp 112 PID 4528 wrote to memory of 1092 4528 3582.tmp 112 PID 1092 wrote to memory of 3724 1092 364D.tmp 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_191e05f073e3cf8d3a4f708a82fa136c_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_191e05f073e3cf8d3a4f708a82fa136c_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\214E.tmp"C:\Users\Admin\AppData\Local\Temp\214E.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\21EB.tmp"C:\Users\Admin\AppData\Local\Temp\21EB.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\2323.tmp"C:\Users\Admin\AppData\Local\Temp\2323.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\23B0.tmp"C:\Users\Admin\AppData\Local\Temp\23B0.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\245C.tmp"C:\Users\Admin\AppData\Local\Temp\245C.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\26AD.tmp"C:\Users\Admin\AppData\Local\Temp\26AD.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\29DA.tmp"C:\Users\Admin\AppData\Local\Temp\29DA.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\2C6A.tmp"C:\Users\Admin\AppData\Local\Temp\2C6A.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\2D93.tmp"C:\Users\Admin\AppData\Local\Temp\2D93.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\2E5E.tmp"C:\Users\Admin\AppData\Local\Temp\2E5E.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\30BF.tmp"C:\Users\Admin\AppData\Local\Temp\30BF.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\313C.tmp"C:\Users\Admin\AppData\Local\Temp\313C.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\31D9.tmp"C:\Users\Admin\AppData\Local\Temp\31D9.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\3294.tmp"C:\Users\Admin\AppData\Local\Temp\3294.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\337F.tmp"C:\Users\Admin\AppData\Local\Temp\337F.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\3524.tmp"C:\Users\Admin\AppData\Local\Temp\3524.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\364D.tmp"C:\Users\Admin\AppData\Local\Temp\364D.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"23⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\3841.tmp"C:\Users\Admin\AppData\Local\Temp\3841.tmp"24⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\395B.tmp"C:\Users\Admin\AppData\Local\Temp\395B.tmp"25⤵
- Executes dropped EXE
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\39E7.tmp"C:\Users\Admin\AppData\Local\Temp\39E7.tmp"26⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\3A74.tmp"C:\Users\Admin\AppData\Local\Temp\3A74.tmp"27⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\3B20.tmp"C:\Users\Admin\AppData\Local\Temp\3B20.tmp"28⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"29⤵
- Executes dropped EXE
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\3C97.tmp"C:\Users\Admin\AppData\Local\Temp\3C97.tmp"30⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\3D14.tmp"C:\Users\Admin\AppData\Local\Temp\3D14.tmp"31⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"C:\Users\Admin\AppData\Local\Temp\3DC0.tmp"32⤵
- Executes dropped EXE
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"33⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\3EF8.tmp"C:\Users\Admin\AppData\Local\Temp\3EF8.tmp"34⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\3F85.tmp"C:\Users\Admin\AppData\Local\Temp\3F85.tmp"35⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\4031.tmp"C:\Users\Admin\AppData\Local\Temp\4031.tmp"36⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\40AE.tmp"C:\Users\Admin\AppData\Local\Temp\40AE.tmp"37⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\414A.tmp"C:\Users\Admin\AppData\Local\Temp\414A.tmp"38⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\41C7.tmp"C:\Users\Admin\AppData\Local\Temp\41C7.tmp"39⤵
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\4273.tmp"C:\Users\Admin\AppData\Local\Temp\4273.tmp"40⤵
- Executes dropped EXE
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\430F.tmp"C:\Users\Admin\AppData\Local\Temp\430F.tmp"41⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\43AB.tmp"C:\Users\Admin\AppData\Local\Temp\43AB.tmp"42⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\4438.tmp"C:\Users\Admin\AppData\Local\Temp\4438.tmp"43⤵
- Executes dropped EXE
PID:180 -
C:\Users\Admin\AppData\Local\Temp\44B5.tmp"C:\Users\Admin\AppData\Local\Temp\44B5.tmp"44⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\4532.tmp"C:\Users\Admin\AppData\Local\Temp\4532.tmp"45⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\459F.tmp"C:\Users\Admin\AppData\Local\Temp\459F.tmp"46⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\463B.tmp"C:\Users\Admin\AppData\Local\Temp\463B.tmp"47⤵
- Executes dropped EXE
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\46A9.tmp"C:\Users\Admin\AppData\Local\Temp\46A9.tmp"48⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\4716.tmp"C:\Users\Admin\AppData\Local\Temp\4716.tmp"49⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"50⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\482F.tmp"C:\Users\Admin\AppData\Local\Temp\482F.tmp"51⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\49A6.tmp"C:\Users\Admin\AppData\Local\Temp\49A6.tmp"52⤵
- Executes dropped EXE
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\4A23.tmp"C:\Users\Admin\AppData\Local\Temp\4A23.tmp"53⤵
- Executes dropped EXE
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\4A91.tmp"C:\Users\Admin\AppData\Local\Temp\4A91.tmp"54⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"55⤵
- Executes dropped EXE
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\4B7B.tmp"C:\Users\Admin\AppData\Local\Temp\4B7B.tmp"56⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"57⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\4C66.tmp"C:\Users\Admin\AppData\Local\Temp\4C66.tmp"58⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\4CD3.tmp"C:\Users\Admin\AppData\Local\Temp\4CD3.tmp"59⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\4D60.tmp"C:\Users\Admin\AppData\Local\Temp\4D60.tmp"60⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\4DDD.tmp"C:\Users\Admin\AppData\Local\Temp\4DDD.tmp"61⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\4F15.tmp"C:\Users\Admin\AppData\Local\Temp\4F15.tmp"62⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\4F92.tmp"C:\Users\Admin\AppData\Local\Temp\4F92.tmp"63⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\501F.tmp"C:\Users\Admin\AppData\Local\Temp\501F.tmp"64⤵
- Executes dropped EXE
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\509C.tmp"C:\Users\Admin\AppData\Local\Temp\509C.tmp"65⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\5109.tmp"C:\Users\Admin\AppData\Local\Temp\5109.tmp"66⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\5176.tmp"C:\Users\Admin\AppData\Local\Temp\5176.tmp"67⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\51D4.tmp"C:\Users\Admin\AppData\Local\Temp\51D4.tmp"68⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\5232.tmp"C:\Users\Admin\AppData\Local\Temp\5232.tmp"69⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\52AF.tmp"C:\Users\Admin\AppData\Local\Temp\52AF.tmp"70⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\532C.tmp"C:\Users\Admin\AppData\Local\Temp\532C.tmp"71⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\69F0.tmp"C:\Users\Admin\AppData\Local\Temp\69F0.tmp"72⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\74CD.tmp"C:\Users\Admin\AppData\Local\Temp\74CD.tmp"73⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\76C1.tmp"C:\Users\Admin\AppData\Local\Temp\76C1.tmp"74⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\7858.tmp"C:\Users\Admin\AppData\Local\Temp\7858.tmp"75⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\78E4.tmp"C:\Users\Admin\AppData\Local\Temp\78E4.tmp"76⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\8A88.tmp"C:\Users\Admin\AppData\Local\Temp\8A88.tmp"77⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\97A7.tmp"C:\Users\Admin\AppData\Local\Temp\97A7.tmp"78⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\9E5E.tmp"C:\Users\Admin\AppData\Local\Temp\9E5E.tmp"79⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\A488.tmp"C:\Users\Admin\AppData\Local\Temp\A488.tmp"80⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\A9F7.tmp"C:\Users\Admin\AppData\Local\Temp\A9F7.tmp"81⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\ACD5.tmp"C:\Users\Admin\AppData\Local\Temp\ACD5.tmp"82⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\AD52.tmp"C:\Users\Admin\AppData\Local\Temp\AD52.tmp"83⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\ADDF.tmp"C:\Users\Admin\AppData\Local\Temp\ADDF.tmp"84⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\AE4C.tmp"C:\Users\Admin\AppData\Local\Temp\AE4C.tmp"85⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\AFC3.tmp"C:\Users\Admin\AppData\Local\Temp\AFC3.tmp"86⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\B040.tmp"C:\Users\Admin\AppData\Local\Temp\B040.tmp"87⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\B0DC.tmp"C:\Users\Admin\AppData\Local\Temp\B0DC.tmp"88⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\B159.tmp"C:\Users\Admin\AppData\Local\Temp\B159.tmp"89⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\B244.tmp"C:\Users\Admin\AppData\Local\Temp\B244.tmp"90⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\B2C1.tmp"C:\Users\Admin\AppData\Local\Temp\B2C1.tmp"91⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\B35D.tmp"C:\Users\Admin\AppData\Local\Temp\B35D.tmp"92⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\B3CA.tmp"C:\Users\Admin\AppData\Local\Temp\B3CA.tmp"93⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\B4C4.tmp"C:\Users\Admin\AppData\Local\Temp\B4C4.tmp"94⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\B551.tmp"C:\Users\Admin\AppData\Local\Temp\B551.tmp"95⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\B5CE.tmp"C:\Users\Admin\AppData\Local\Temp\B5CE.tmp"96⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\B65B.tmp"C:\Users\Admin\AppData\Local\Temp\B65B.tmp"97⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\B6E7.tmp"C:\Users\Admin\AppData\Local\Temp\B6E7.tmp"98⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\B764.tmp"C:\Users\Admin\AppData\Local\Temp\B764.tmp"99⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\B7E1.tmp"C:\Users\Admin\AppData\Local\Temp\B7E1.tmp"100⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\B85E.tmp"C:\Users\Admin\AppData\Local\Temp\B85E.tmp"101⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\B8DB.tmp"C:\Users\Admin\AppData\Local\Temp\B8DB.tmp"102⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\B958.tmp"C:\Users\Admin\AppData\Local\Temp\B958.tmp"103⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\BA81.tmp"C:\Users\Admin\AppData\Local\Temp\BA81.tmp"104⤵PID:180
-
C:\Users\Admin\AppData\Local\Temp\BAEE.tmp"C:\Users\Admin\AppData\Local\Temp\BAEE.tmp"105⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\BB5C.tmp"C:\Users\Admin\AppData\Local\Temp\BB5C.tmp"106⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\BBD9.tmp"C:\Users\Admin\AppData\Local\Temp\BBD9.tmp"107⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\BC65.tmp"C:\Users\Admin\AppData\Local\Temp\BC65.tmp"108⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\BCC3.tmp"C:\Users\Admin\AppData\Local\Temp\BCC3.tmp"109⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\BD40.tmp"C:\Users\Admin\AppData\Local\Temp\BD40.tmp"110⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\BDBD.tmp"C:\Users\Admin\AppData\Local\Temp\BDBD.tmp"111⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\BE3A.tmp"C:\Users\Admin\AppData\Local\Temp\BE3A.tmp"112⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\BEC7.tmp"C:\Users\Admin\AppData\Local\Temp\BEC7.tmp"113⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\CBB7.tmp"C:\Users\Admin\AppData\Local\Temp\CBB7.tmp"114⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\CEC5.tmp"C:\Users\Admin\AppData\Local\Temp\CEC5.tmp"115⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\CF22.tmp"C:\Users\Admin\AppData\Local\Temp\CF22.tmp"116⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\D07A.tmp"C:\Users\Admin\AppData\Local\Temp\D07A.tmp"117⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\D0E7.tmp"C:\Users\Admin\AppData\Local\Temp\D0E7.tmp"118⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\D145.tmp"C:\Users\Admin\AppData\Local\Temp\D145.tmp"119⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\D1A3.tmp"C:\Users\Admin\AppData\Local\Temp\D1A3.tmp"120⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\D201.tmp"C:\Users\Admin\AppData\Local\Temp\D201.tmp"121⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\D2BC.tmp"C:\Users\Admin\AppData\Local\Temp\D2BC.tmp"122⤵PID:3496
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-