Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_ba2ef4b3f59ed48e591d4add2e424350_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_ba2ef4b3f59ed48e591d4add2e424350_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-05_ba2ef4b3f59ed48e591d4add2e424350_mafia_JC.exe
-
Size
486KB
-
MD5
ba2ef4b3f59ed48e591d4add2e424350
-
SHA1
a0b62ffe9d6e3e03366f5c347339205bdb74f841
-
SHA256
d92cdd3c7d12a6afe6eb0e8a2ea0694c12e66149ff0a8e68ea9d8fcf6906f196
-
SHA512
a864755bf8113e0bb533d36b67545ac591eab12401a330a71e64d9f9501a29697af24648e53c48e5ab72e47f516be345e7c2987f2d28c766c51c89f19547232b
-
SSDEEP
6144:Borf3lPvovsgZnqG2C7mOTeiLfD7UTVN5nwhZwBirWmWFtBPYsnm5AgBno+svSsz:oU5rCOTeiDkNZKW1XBPYjhSNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3116 D1E6.tmp 2068 D273.tmp 2140 D31F.tmp 3616 D3CB.tmp 3504 D467.tmp 708 D570.tmp 1648 D62C.tmp 3280 D6C8.tmp 4460 D774.tmp 4980 D810.tmp 3664 D8CC.tmp 4884 D978.tmp 440 DA14.tmp 4856 DAEF.tmp 3384 DBC9.tmp 1468 DC75.tmp 4304 DD31.tmp 1460 DEC7.tmp 3984 DF83.tmp 3100 E03E.tmp 4596 E0FA.tmp 4696 E1B5.tmp 3964 E280.tmp 1704 E33C.tmp 2208 E3F7.tmp 2628 E4C2.tmp 2740 E55F.tmp 1368 E60A.tmp 1524 E704.tmp 1840 E7A1.tmp 60 E89B.tmp 1200 E966.tmp 4616 EA31.tmp 3096 EB0C.tmp 2524 EBD7.tmp 2336 EC73.tmp 2568 ED3E.tmp 4592 EDCB.tmp 4872 EE77.tmp 2960 EF32.tmp 3572 EFDE.tmp 2404 F07A.tmp 2268 F117.tmp 4144 F184.tmp 3428 F230.tmp 4208 F2CC.tmp 4552 F368.tmp 2856 F433.tmp 3388 F4D0.tmp 436 F55C.tmp 2340 F5F9.tmp 860 F695.tmp 3672 F731.tmp 2072 F7DD.tmp 4732 F906.tmp 4864 F9B2.tmp 3116 FA6D.tmp 4624 FB09.tmp 4748 FB86.tmp 5016 FC13.tmp 4636 FCAF.tmp 4056 FD3C.tmp 2248 FDF7.tmp 1136 FE94.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3116 2380 NEAS.2023-09-05_ba2ef4b3f59ed48e591d4add2e424350_mafia_JC.exe 83 PID 2380 wrote to memory of 3116 2380 NEAS.2023-09-05_ba2ef4b3f59ed48e591d4add2e424350_mafia_JC.exe 83 PID 2380 wrote to memory of 3116 2380 NEAS.2023-09-05_ba2ef4b3f59ed48e591d4add2e424350_mafia_JC.exe 83 PID 3116 wrote to memory of 2068 3116 D1E6.tmp 84 PID 3116 wrote to memory of 2068 3116 D1E6.tmp 84 PID 3116 wrote to memory of 2068 3116 D1E6.tmp 84 PID 2068 wrote to memory of 2140 2068 D273.tmp 85 PID 2068 wrote to memory of 2140 2068 D273.tmp 85 PID 2068 wrote to memory of 2140 2068 D273.tmp 85 PID 2140 wrote to memory of 3616 2140 D31F.tmp 87 PID 2140 wrote to memory of 3616 2140 D31F.tmp 87 PID 2140 wrote to memory of 3616 2140 D31F.tmp 87 PID 3616 wrote to memory of 3504 3616 D3CB.tmp 88 PID 3616 wrote to memory of 3504 3616 D3CB.tmp 88 PID 3616 wrote to memory of 3504 3616 D3CB.tmp 88 PID 3504 wrote to memory of 708 3504 D467.tmp 89 PID 3504 wrote to memory of 708 3504 D467.tmp 89 PID 3504 wrote to memory of 708 3504 D467.tmp 89 PID 708 wrote to memory of 1648 708 D570.tmp 90 PID 708 wrote to memory of 1648 708 D570.tmp 90 PID 708 wrote to memory of 1648 708 D570.tmp 90 PID 1648 wrote to memory of 3280 1648 D62C.tmp 92 PID 1648 wrote to memory of 3280 1648 D62C.tmp 92 PID 1648 wrote to memory of 3280 1648 D62C.tmp 92 PID 3280 wrote to memory of 4460 3280 D6C8.tmp 93 PID 3280 wrote to memory of 4460 3280 D6C8.tmp 93 PID 3280 wrote to memory of 4460 3280 D6C8.tmp 93 PID 4460 wrote to memory of 4980 4460 D774.tmp 94 PID 4460 wrote to memory of 4980 4460 D774.tmp 94 PID 4460 wrote to memory of 4980 4460 D774.tmp 94 PID 4980 wrote to memory of 3664 4980 D810.tmp 95 PID 4980 wrote to memory of 3664 4980 D810.tmp 95 PID 4980 wrote to memory of 3664 4980 D810.tmp 95 PID 3664 wrote to memory of 4884 3664 D8CC.tmp 96 PID 3664 wrote to memory of 4884 3664 D8CC.tmp 96 PID 3664 wrote to memory of 4884 3664 D8CC.tmp 96 PID 4884 wrote to memory of 440 4884 D978.tmp 97 PID 4884 wrote to memory of 440 4884 D978.tmp 97 PID 4884 wrote to memory of 440 4884 D978.tmp 97 PID 440 wrote to memory of 4856 440 DA14.tmp 98 PID 440 wrote to memory of 4856 440 DA14.tmp 98 PID 440 wrote to memory of 4856 440 DA14.tmp 98 PID 4856 wrote to memory of 3384 4856 DAEF.tmp 99 PID 4856 wrote to memory of 3384 4856 DAEF.tmp 99 PID 4856 wrote to memory of 3384 4856 DAEF.tmp 99 PID 3384 wrote to memory of 1468 3384 DBC9.tmp 100 PID 3384 wrote to memory of 1468 3384 DBC9.tmp 100 PID 3384 wrote to memory of 1468 3384 DBC9.tmp 100 PID 1468 wrote to memory of 4304 1468 DC75.tmp 101 PID 1468 wrote to memory of 4304 1468 DC75.tmp 101 PID 1468 wrote to memory of 4304 1468 DC75.tmp 101 PID 4304 wrote to memory of 1460 4304 DD31.tmp 102 PID 4304 wrote to memory of 1460 4304 DD31.tmp 102 PID 4304 wrote to memory of 1460 4304 DD31.tmp 102 PID 1460 wrote to memory of 3984 1460 DEC7.tmp 103 PID 1460 wrote to memory of 3984 1460 DEC7.tmp 103 PID 1460 wrote to memory of 3984 1460 DEC7.tmp 103 PID 3984 wrote to memory of 3100 3984 DF83.tmp 104 PID 3984 wrote to memory of 3100 3984 DF83.tmp 104 PID 3984 wrote to memory of 3100 3984 DF83.tmp 104 PID 3100 wrote to memory of 4596 3100 E03E.tmp 105 PID 3100 wrote to memory of 4596 3100 E03E.tmp 105 PID 3100 wrote to memory of 4596 3100 E03E.tmp 105 PID 4596 wrote to memory of 4696 4596 E0FA.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_ba2ef4b3f59ed48e591d4add2e424350_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_ba2ef4b3f59ed48e591d4add2e424350_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\D273.tmp"C:\Users\Admin\AppData\Local\Temp\D273.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\D31F.tmp"C:\Users\Admin\AppData\Local\Temp\D31F.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\D467.tmp"C:\Users\Admin\AppData\Local\Temp\D467.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\D570.tmp"C:\Users\Admin\AppData\Local\Temp\D570.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\D62C.tmp"C:\Users\Admin\AppData\Local\Temp\D62C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\D774.tmp"C:\Users\Admin\AppData\Local\Temp\D774.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\D810.tmp"C:\Users\Admin\AppData\Local\Temp\D810.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\D8CC.tmp"C:\Users\Admin\AppData\Local\Temp\D8CC.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\D978.tmp"C:\Users\Admin\AppData\Local\Temp\D978.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\DA14.tmp"C:\Users\Admin\AppData\Local\Temp\DA14.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\DAEF.tmp"C:\Users\Admin\AppData\Local\Temp\DAEF.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\DC75.tmp"C:\Users\Admin\AppData\Local\Temp\DC75.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\DD31.tmp"C:\Users\Admin\AppData\Local\Temp\DD31.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\DEC7.tmp"C:\Users\Admin\AppData\Local\Temp\DEC7.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\DF83.tmp"C:\Users\Admin\AppData\Local\Temp\DF83.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\E03E.tmp"C:\Users\Admin\AppData\Local\Temp\E03E.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"23⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\E280.tmp"C:\Users\Admin\AppData\Local\Temp\E280.tmp"24⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\E33C.tmp"C:\Users\Admin\AppData\Local\Temp\E33C.tmp"25⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\E3F7.tmp"C:\Users\Admin\AppData\Local\Temp\E3F7.tmp"26⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"27⤵
- Executes dropped EXE
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\E55F.tmp"C:\Users\Admin\AppData\Local\Temp\E55F.tmp"28⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\E60A.tmp"C:\Users\Admin\AppData\Local\Temp\E60A.tmp"29⤵
- Executes dropped EXE
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\E704.tmp"C:\Users\Admin\AppData\Local\Temp\E704.tmp"30⤵
- Executes dropped EXE
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"31⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\E89B.tmp"C:\Users\Admin\AppData\Local\Temp\E89B.tmp"32⤵
- Executes dropped EXE
PID:60 -
C:\Users\Admin\AppData\Local\Temp\E966.tmp"C:\Users\Admin\AppData\Local\Temp\E966.tmp"33⤵
- Executes dropped EXE
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\EA31.tmp"C:\Users\Admin\AppData\Local\Temp\EA31.tmp"34⤵
- Executes dropped EXE
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"35⤵
- Executes dropped EXE
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"36⤵
- Executes dropped EXE
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\EC73.tmp"C:\Users\Admin\AppData\Local\Temp\EC73.tmp"37⤵
- Executes dropped EXE
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\ED3E.tmp"C:\Users\Admin\AppData\Local\Temp\ED3E.tmp"38⤵
- Executes dropped EXE
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"39⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\EE77.tmp"C:\Users\Admin\AppData\Local\Temp\EE77.tmp"40⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\EF32.tmp"C:\Users\Admin\AppData\Local\Temp\EF32.tmp"41⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\EFDE.tmp"C:\Users\Admin\AppData\Local\Temp\EFDE.tmp"42⤵
- Executes dropped EXE
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\F07A.tmp"C:\Users\Admin\AppData\Local\Temp\F07A.tmp"43⤵
- Executes dropped EXE
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\F117.tmp"C:\Users\Admin\AppData\Local\Temp\F117.tmp"44⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\F184.tmp"C:\Users\Admin\AppData\Local\Temp\F184.tmp"45⤵
- Executes dropped EXE
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\F230.tmp"C:\Users\Admin\AppData\Local\Temp\F230.tmp"46⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"47⤵
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\F368.tmp"C:\Users\Admin\AppData\Local\Temp\F368.tmp"48⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\F433.tmp"C:\Users\Admin\AppData\Local\Temp\F433.tmp"49⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\F4D0.tmp"C:\Users\Admin\AppData\Local\Temp\F4D0.tmp"50⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\F55C.tmp"C:\Users\Admin\AppData\Local\Temp\F55C.tmp"51⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"52⤵
- Executes dropped EXE
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\F695.tmp"C:\Users\Admin\AppData\Local\Temp\F695.tmp"53⤵
- Executes dropped EXE
PID:860 -
C:\Users\Admin\AppData\Local\Temp\F731.tmp"C:\Users\Admin\AppData\Local\Temp\F731.tmp"54⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"55⤵
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\F879.tmp"C:\Users\Admin\AppData\Local\Temp\F879.tmp"56⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\F906.tmp"C:\Users\Admin\AppData\Local\Temp\F906.tmp"57⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\F9B2.tmp"C:\Users\Admin\AppData\Local\Temp\F9B2.tmp"58⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\FA6D.tmp"C:\Users\Admin\AppData\Local\Temp\FA6D.tmp"59⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\FB09.tmp"C:\Users\Admin\AppData\Local\Temp\FB09.tmp"60⤵
- Executes dropped EXE
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\FB86.tmp"C:\Users\Admin\AppData\Local\Temp\FB86.tmp"61⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\FC13.tmp"C:\Users\Admin\AppData\Local\Temp\FC13.tmp"62⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"63⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"64⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"65⤵
- Executes dropped EXE
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\FE94.tmp"C:\Users\Admin\AppData\Local\Temp\FE94.tmp"66⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\FF40.tmp"C:\Users\Admin\AppData\Local\Temp\FF40.tmp"67⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"68⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\59.tmp"C:\Users\Admin\AppData\Local\Temp\59.tmp"69⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\105.tmp"C:\Users\Admin\AppData\Local\Temp\105.tmp"70⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\191.tmp"C:\Users\Admin\AppData\Local\Temp\191.tmp"71⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\20E.tmp"C:\Users\Admin\AppData\Local\Temp\20E.tmp"72⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\28B.tmp"C:\Users\Admin\AppData\Local\Temp\28B.tmp"73⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\347.tmp"C:\Users\Admin\AppData\Local\Temp\347.tmp"74⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\3F3.tmp"C:\Users\Admin\AppData\Local\Temp\3F3.tmp"75⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\48F.tmp"C:\Users\Admin\AppData\Local\Temp\48F.tmp"76⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\52B.tmp"C:\Users\Admin\AppData\Local\Temp\52B.tmp"77⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\5C7.tmp"C:\Users\Admin\AppData\Local\Temp\5C7.tmp"78⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\654.tmp"C:\Users\Admin\AppData\Local\Temp\654.tmp"79⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\6E1.tmp"C:\Users\Admin\AppData\Local\Temp\6E1.tmp"80⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\77D.tmp"C:\Users\Admin\AppData\Local\Temp\77D.tmp"81⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\848.tmp"C:\Users\Admin\AppData\Local\Temp\848.tmp"82⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\8E4.tmp"C:\Users\Admin\AppData\Local\Temp\8E4.tmp"83⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\981.tmp"C:\Users\Admin\AppData\Local\Temp\981.tmp"84⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\A0D.tmp"C:\Users\Admin\AppData\Local\Temp\A0D.tmp"85⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\A8A.tmp"C:\Users\Admin\AppData\Local\Temp\A8A.tmp"86⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\B17.tmp"C:\Users\Admin\AppData\Local\Temp\B17.tmp"87⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\BC3.tmp"C:\Users\Admin\AppData\Local\Temp\BC3.tmp"88⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\C6F.tmp"C:\Users\Admin\AppData\Local\Temp\C6F.tmp"89⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\D0B.tmp"C:\Users\Admin\AppData\Local\Temp\D0B.tmp"90⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\DE6.tmp"C:\Users\Admin\AppData\Local\Temp\DE6.tmp"91⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\E91.tmp"C:\Users\Admin\AppData\Local\Temp\E91.tmp"92⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\F4D.tmp"C:\Users\Admin\AppData\Local\Temp\F4D.tmp"93⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\FDA.tmp"C:\Users\Admin\AppData\Local\Temp\FDA.tmp"94⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\1066.tmp"C:\Users\Admin\AppData\Local\Temp\1066.tmp"95⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\1112.tmp"C:\Users\Admin\AppData\Local\Temp\1112.tmp"96⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\11BE.tmp"C:\Users\Admin\AppData\Local\Temp\11BE.tmp"97⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\123B.tmp"C:\Users\Admin\AppData\Local\Temp\123B.tmp"98⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\12C8.tmp"C:\Users\Admin\AppData\Local\Temp\12C8.tmp"99⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\1345.tmp"C:\Users\Admin\AppData\Local\Temp\1345.tmp"100⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\13D1.tmp"C:\Users\Admin\AppData\Local\Temp\13D1.tmp"101⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\145E.tmp"C:\Users\Admin\AppData\Local\Temp\145E.tmp"102⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\14FA.tmp"C:\Users\Admin\AppData\Local\Temp\14FA.tmp"103⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\1596.tmp"C:\Users\Admin\AppData\Local\Temp\1596.tmp"104⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\1642.tmp"C:\Users\Admin\AppData\Local\Temp\1642.tmp"105⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\16EE.tmp"C:\Users\Admin\AppData\Local\Temp\16EE.tmp"106⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\177B.tmp"C:\Users\Admin\AppData\Local\Temp\177B.tmp"107⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\1817.tmp"C:\Users\Admin\AppData\Local\Temp\1817.tmp"108⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\18E2.tmp"C:\Users\Admin\AppData\Local\Temp\18E2.tmp"109⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\195F.tmp"C:\Users\Admin\AppData\Local\Temp\195F.tmp"110⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\19EC.tmp"C:\Users\Admin\AppData\Local\Temp\19EC.tmp"111⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\1A78.tmp"C:\Users\Admin\AppData\Local\Temp\1A78.tmp"112⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\1B24.tmp"C:\Users\Admin\AppData\Local\Temp\1B24.tmp"113⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"114⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"115⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\1CE9.tmp"C:\Users\Admin\AppData\Local\Temp\1CE9.tmp"116⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\1D76.tmp"C:\Users\Admin\AppData\Local\Temp\1D76.tmp"117⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\1E12.tmp"C:\Users\Admin\AppData\Local\Temp\1E12.tmp"118⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"119⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"120⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\1FB8.tmp"C:\Users\Admin\AppData\Local\Temp\1FB8.tmp"121⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\2054.tmp"C:\Users\Admin\AppData\Local\Temp\2054.tmp"122⤵PID:1452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-