Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_51a2d98cbe1d7a82f81b903f0da3fe75_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_51a2d98cbe1d7a82f81b903f0da3fe75_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-05_51a2d98cbe1d7a82f81b903f0da3fe75_mafia_JC.exe
-
Size
527KB
-
MD5
51a2d98cbe1d7a82f81b903f0da3fe75
-
SHA1
e9bdee2b645b6aad87cc749daa0243e4f62debe4
-
SHA256
9746317ec60cb0a4e06174a6c1a7f539bd9058ff3a41605134a920676395c932
-
SHA512
2d540b58be68b7c0f51f060627b270f659cdfd5adbf735479e59d540e1e5a22b1a9512a4fe8ecaafe49009e17d8a4aea587ea2c2c4ae1206fc65609b0bb110ce
-
SSDEEP
12288:fU5rCOTeidH9l5PUSooPqGmIMOfdYxxQa+z6DZu:fUQOJdHBPF7AGmaX6Do
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2616 C5A2.tmp 2768 C767.tmp 4828 CBBC.tmp 2696 CC68.tmp 4424 D3F9.tmp 5096 D89D.tmp 3024 DEE6.tmp 4132 E157.tmp 2388 E2DE.tmp 2600 E3C8.tmp 2304 E455.tmp 4080 E4D2.tmp 1792 E57E.tmp 5092 E60A.tmp 3804 E6D6.tmp 1980 E762.tmp 4768 F09A.tmp 4296 F174.tmp 4816 F56C.tmp 4908 F695.tmp 4328 97.tmp 4028 50C.tmp 928 5B8.tmp 3092 D59.tmp 3940 DE6.tmp 3100 1383.tmp 684 15F4.tmp 2612 16DE.tmp 3884 177B.tmp 3132 1827.tmp 4472 1940.tmp 2664 22C5.tmp 3980 2D64.tmp 4788 30CF.tmp 2028 315C.tmp 1436 3246.tmp 348 35FF.tmp 3504 366D.tmp 2912 36F9.tmp 4808 3B7D.tmp 5044 3C0A.tmp 4240 3CA6.tmp 2200 3D91.tmp 4396 490A.tmp 4320 4978.tmp 4204 4A23.tmp 2768 4A81.tmp 3600 4AEF.tmp 316 4B4C.tmp 3820 4BAA.tmp 2624 4D02.tmp 2696 5BD7.tmp 2288 604B.tmp 2268 68C7.tmp 4052 70E5.tmp 4152 7162.tmp 344 71EF.tmp 4132 72D9.tmp 3048 7356.tmp 4308 73E3.tmp 4612 747F.tmp 2304 751B.tmp 3308 7598.tmp 3944 77DB.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4320 wrote to memory of 2616 4320 NEAS.2023-09-05_51a2d98cbe1d7a82f81b903f0da3fe75_mafia_JC.exe 85 PID 4320 wrote to memory of 2616 4320 NEAS.2023-09-05_51a2d98cbe1d7a82f81b903f0da3fe75_mafia_JC.exe 85 PID 4320 wrote to memory of 2616 4320 NEAS.2023-09-05_51a2d98cbe1d7a82f81b903f0da3fe75_mafia_JC.exe 85 PID 2616 wrote to memory of 2768 2616 C5A2.tmp 86 PID 2616 wrote to memory of 2768 2616 C5A2.tmp 86 PID 2616 wrote to memory of 2768 2616 C5A2.tmp 86 PID 2768 wrote to memory of 4828 2768 C767.tmp 87 PID 2768 wrote to memory of 4828 2768 C767.tmp 87 PID 2768 wrote to memory of 4828 2768 C767.tmp 87 PID 4828 wrote to memory of 2696 4828 CBBC.tmp 88 PID 4828 wrote to memory of 2696 4828 CBBC.tmp 88 PID 4828 wrote to memory of 2696 4828 CBBC.tmp 88 PID 2696 wrote to memory of 4424 2696 CC68.tmp 89 PID 2696 wrote to memory of 4424 2696 CC68.tmp 89 PID 2696 wrote to memory of 4424 2696 CC68.tmp 89 PID 4424 wrote to memory of 5096 4424 D3F9.tmp 90 PID 4424 wrote to memory of 5096 4424 D3F9.tmp 90 PID 4424 wrote to memory of 5096 4424 D3F9.tmp 90 PID 5096 wrote to memory of 3024 5096 D89D.tmp 91 PID 5096 wrote to memory of 3024 5096 D89D.tmp 91 PID 5096 wrote to memory of 3024 5096 D89D.tmp 91 PID 3024 wrote to memory of 4132 3024 DEE6.tmp 92 PID 3024 wrote to memory of 4132 3024 DEE6.tmp 92 PID 3024 wrote to memory of 4132 3024 DEE6.tmp 92 PID 4132 wrote to memory of 2388 4132 E157.tmp 93 PID 4132 wrote to memory of 2388 4132 E157.tmp 93 PID 4132 wrote to memory of 2388 4132 E157.tmp 93 PID 2388 wrote to memory of 2600 2388 E2DE.tmp 94 PID 2388 wrote to memory of 2600 2388 E2DE.tmp 94 PID 2388 wrote to memory of 2600 2388 E2DE.tmp 94 PID 2600 wrote to memory of 2304 2600 E3C8.tmp 95 PID 2600 wrote to memory of 2304 2600 E3C8.tmp 95 PID 2600 wrote to memory of 2304 2600 E3C8.tmp 95 PID 2304 wrote to memory of 4080 2304 E455.tmp 96 PID 2304 wrote to memory of 4080 2304 E455.tmp 96 PID 2304 wrote to memory of 4080 2304 E455.tmp 96 PID 4080 wrote to memory of 1792 4080 E4D2.tmp 97 PID 4080 wrote to memory of 1792 4080 E4D2.tmp 97 PID 4080 wrote to memory of 1792 4080 E4D2.tmp 97 PID 1792 wrote to memory of 5092 1792 E57E.tmp 98 PID 1792 wrote to memory of 5092 1792 E57E.tmp 98 PID 1792 wrote to memory of 5092 1792 E57E.tmp 98 PID 5092 wrote to memory of 3804 5092 E60A.tmp 99 PID 5092 wrote to memory of 3804 5092 E60A.tmp 99 PID 5092 wrote to memory of 3804 5092 E60A.tmp 99 PID 3804 wrote to memory of 1980 3804 E6D6.tmp 100 PID 3804 wrote to memory of 1980 3804 E6D6.tmp 100 PID 3804 wrote to memory of 1980 3804 E6D6.tmp 100 PID 1980 wrote to memory of 4768 1980 E762.tmp 101 PID 1980 wrote to memory of 4768 1980 E762.tmp 101 PID 1980 wrote to memory of 4768 1980 E762.tmp 101 PID 4768 wrote to memory of 4296 4768 F09A.tmp 102 PID 4768 wrote to memory of 4296 4768 F09A.tmp 102 PID 4768 wrote to memory of 4296 4768 F09A.tmp 102 PID 4296 wrote to memory of 4816 4296 F174.tmp 104 PID 4296 wrote to memory of 4816 4296 F174.tmp 104 PID 4296 wrote to memory of 4816 4296 F174.tmp 104 PID 4816 wrote to memory of 4908 4816 F56C.tmp 105 PID 4816 wrote to memory of 4908 4816 F56C.tmp 105 PID 4816 wrote to memory of 4908 4816 F56C.tmp 105 PID 4908 wrote to memory of 4328 4908 F695.tmp 107 PID 4908 wrote to memory of 4328 4908 F695.tmp 107 PID 4908 wrote to memory of 4328 4908 F695.tmp 107 PID 4328 wrote to memory of 4028 4328 97.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_51a2d98cbe1d7a82f81b903f0da3fe75_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_51a2d98cbe1d7a82f81b903f0da3fe75_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\C5A2.tmp"C:\Users\Admin\AppData\Local\Temp\C5A2.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\C767.tmp"C:\Users\Admin\AppData\Local\Temp\C767.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\CC68.tmp"C:\Users\Admin\AppData\Local\Temp\CC68.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\D89D.tmp"C:\Users\Admin\AppData\Local\Temp\D89D.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\E157.tmp"C:\Users\Admin\AppData\Local\Temp\E157.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\E2DE.tmp"C:\Users\Admin\AppData\Local\Temp\E2DE.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\E3C8.tmp"C:\Users\Admin\AppData\Local\Temp\E3C8.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\E455.tmp"C:\Users\Admin\AppData\Local\Temp\E455.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\E57E.tmp"C:\Users\Admin\AppData\Local\Temp\E57E.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\E60A.tmp"C:\Users\Admin\AppData\Local\Temp\E60A.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\E6D6.tmp"C:\Users\Admin\AppData\Local\Temp\E6D6.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\E762.tmp"C:\Users\Admin\AppData\Local\Temp\E762.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\F09A.tmp"C:\Users\Admin\AppData\Local\Temp\F09A.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\F174.tmp"C:\Users\Admin\AppData\Local\Temp\F174.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\F56C.tmp"C:\Users\Admin\AppData\Local\Temp\F56C.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\F695.tmp"C:\Users\Admin\AppData\Local\Temp\F695.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\97.tmp"C:\Users\Admin\AppData\Local\Temp\97.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\50C.tmp"C:\Users\Admin\AppData\Local\Temp\50C.tmp"23⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\5B8.tmp"C:\Users\Admin\AppData\Local\Temp\5B8.tmp"24⤵
- Executes dropped EXE
PID:928 -
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"25⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\DE6.tmp"C:\Users\Admin\AppData\Local\Temp\DE6.tmp"26⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\1383.tmp"C:\Users\Admin\AppData\Local\Temp\1383.tmp"27⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\15F4.tmp"C:\Users\Admin\AppData\Local\Temp\15F4.tmp"28⤵
- Executes dropped EXE
PID:684 -
C:\Users\Admin\AppData\Local\Temp\16DE.tmp"C:\Users\Admin\AppData\Local\Temp\16DE.tmp"29⤵
- Executes dropped EXE
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\177B.tmp"C:\Users\Admin\AppData\Local\Temp\177B.tmp"30⤵
- Executes dropped EXE
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\1827.tmp"C:\Users\Admin\AppData\Local\Temp\1827.tmp"31⤵
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\1940.tmp"C:\Users\Admin\AppData\Local\Temp\1940.tmp"32⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\22C5.tmp"C:\Users\Admin\AppData\Local\Temp\22C5.tmp"33⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\2D64.tmp"C:\Users\Admin\AppData\Local\Temp\2D64.tmp"34⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\30CF.tmp"C:\Users\Admin\AppData\Local\Temp\30CF.tmp"35⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\315C.tmp"C:\Users\Admin\AppData\Local\Temp\315C.tmp"36⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\3246.tmp"C:\Users\Admin\AppData\Local\Temp\3246.tmp"37⤵
- Executes dropped EXE
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\35FF.tmp"C:\Users\Admin\AppData\Local\Temp\35FF.tmp"38⤵
- Executes dropped EXE
PID:348 -
C:\Users\Admin\AppData\Local\Temp\366D.tmp"C:\Users\Admin\AppData\Local\Temp\366D.tmp"39⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\36F9.tmp"C:\Users\Admin\AppData\Local\Temp\36F9.tmp"40⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"41⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"42⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"43⤵
- Executes dropped EXE
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\3D91.tmp"C:\Users\Admin\AppData\Local\Temp\3D91.tmp"44⤵
- Executes dropped EXE
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\490A.tmp"C:\Users\Admin\AppData\Local\Temp\490A.tmp"45⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\4978.tmp"C:\Users\Admin\AppData\Local\Temp\4978.tmp"46⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\4A23.tmp"C:\Users\Admin\AppData\Local\Temp\4A23.tmp"47⤵
- Executes dropped EXE
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\4A81.tmp"C:\Users\Admin\AppData\Local\Temp\4A81.tmp"48⤵
- Executes dropped EXE
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\4AEF.tmp"C:\Users\Admin\AppData\Local\Temp\4AEF.tmp"49⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"50⤵
- Executes dropped EXE
PID:316 -
C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"C:\Users\Admin\AppData\Local\Temp\4BAA.tmp"51⤵
- Executes dropped EXE
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\4D02.tmp"C:\Users\Admin\AppData\Local\Temp\4D02.tmp"52⤵
- Executes dropped EXE
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\5BD7.tmp"C:\Users\Admin\AppData\Local\Temp\5BD7.tmp"53⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\604B.tmp"C:\Users\Admin\AppData\Local\Temp\604B.tmp"54⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\68C7.tmp"C:\Users\Admin\AppData\Local\Temp\68C7.tmp"55⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\70E5.tmp"C:\Users\Admin\AppData\Local\Temp\70E5.tmp"56⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\7162.tmp"C:\Users\Admin\AppData\Local\Temp\7162.tmp"57⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\71EF.tmp"C:\Users\Admin\AppData\Local\Temp\71EF.tmp"58⤵
- Executes dropped EXE
PID:344 -
C:\Users\Admin\AppData\Local\Temp\72D9.tmp"C:\Users\Admin\AppData\Local\Temp\72D9.tmp"59⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\7356.tmp"C:\Users\Admin\AppData\Local\Temp\7356.tmp"60⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\73E3.tmp"C:\Users\Admin\AppData\Local\Temp\73E3.tmp"61⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\747F.tmp"C:\Users\Admin\AppData\Local\Temp\747F.tmp"62⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\751B.tmp"C:\Users\Admin\AppData\Local\Temp\751B.tmp"63⤵
- Executes dropped EXE
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\7598.tmp"C:\Users\Admin\AppData\Local\Temp\7598.tmp"64⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\77DB.tmp"C:\Users\Admin\AppData\Local\Temp\77DB.tmp"65⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\7858.tmp"C:\Users\Admin\AppData\Local\Temp\7858.tmp"66⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\78E4.tmp"C:\Users\Admin\AppData\Local\Temp\78E4.tmp"67⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\7980.tmp"C:\Users\Admin\AppData\Local\Temp\7980.tmp"68⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\7A0D.tmp"C:\Users\Admin\AppData\Local\Temp\7A0D.tmp"69⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\7AA9.tmp"C:\Users\Admin\AppData\Local\Temp\7AA9.tmp"70⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\7B26.tmp"C:\Users\Admin\AppData\Local\Temp\7B26.tmp"71⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"72⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\941D.tmp"C:\Users\Admin\AppData\Local\Temp\941D.tmp"73⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\9C7A.tmp"C:\Users\Admin\AppData\Local\Temp\9C7A.tmp"74⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\A39E.tmp"C:\Users\Admin\AppData\Local\Temp\A39E.tmp"75⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\AAB2.tmp"C:\Users\Admin\AppData\Local\Temp\AAB2.tmp"76⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\B6B8.tmp"C:\Users\Admin\AppData\Local\Temp\B6B8.tmp"77⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\BD31.tmp"C:\Users\Admin\AppData\Local\Temp\BD31.tmp"78⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\C0F9.tmp"C:\Users\Admin\AppData\Local\Temp\C0F9.tmp"79⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\C196.tmp"C:\Users\Admin\AppData\Local\Temp\C196.tmp"80⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\C222.tmp"C:\Users\Admin\AppData\Local\Temp\C222.tmp"81⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\CC73.tmp"C:\Users\Admin\AppData\Local\Temp\CC73.tmp"82⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\CDBB.tmp"C:\Users\Admin\AppData\Local\Temp\CDBB.tmp"83⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\D58B.tmp"C:\Users\Admin\AppData\Local\Temp\D58B.tmp"84⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\E327.tmp"C:\Users\Admin\AppData\Local\Temp\E327.tmp"85⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\EDD6.tmp"C:\Users\Admin\AppData\Local\Temp\EDD6.tmp"86⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\F99D.tmp"C:\Users\Admin\AppData\Local\Temp\F99D.tmp"87⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\FBD0.tmp"C:\Users\Admin\AppData\Local\Temp\FBD0.tmp"88⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\6DC.tmp"C:\Users\Admin\AppData\Local\Temp\6DC.tmp"89⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\E8D.tmp"C:\Users\Admin\AppData\Local\Temp\E8D.tmp"90⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\1B7D.tmp"C:\Users\Admin\AppData\Local\Temp\1B7D.tmp"91⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\3147.tmp"C:\Users\Admin\AppData\Local\Temp\3147.tmp"92⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\31F3.tmp"C:\Users\Admin\AppData\Local\Temp\31F3.tmp"93⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\328F.tmp"C:\Users\Admin\AppData\Local\Temp\328F.tmp"94⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\331C.tmp"C:\Users\Admin\AppData\Local\Temp\331C.tmp"95⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\34A3.tmp"C:\Users\Admin\AppData\Local\Temp\34A3.tmp"96⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\7286.tmp"C:\Users\Admin\AppData\Local\Temp\7286.tmp"97⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\7303.tmp"C:\Users\Admin\AppData\Local\Temp\7303.tmp"98⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\7390.tmp"C:\Users\Admin\AppData\Local\Temp\7390.tmp"99⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\740D.tmp"C:\Users\Admin\AppData\Local\Temp\740D.tmp"100⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\74A9.tmp"C:\Users\Admin\AppData\Local\Temp\74A9.tmp"101⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\7536.tmp"C:\Users\Admin\AppData\Local\Temp\7536.tmp"102⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\75D2.tmp"C:\Users\Admin\AppData\Local\Temp\75D2.tmp"103⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\765F.tmp"C:\Users\Admin\AppData\Local\Temp\765F.tmp"104⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\76DC.tmp"C:\Users\Admin\AppData\Local\Temp\76DC.tmp"105⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\7759.tmp"C:\Users\Admin\AppData\Local\Temp\7759.tmp"106⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\77F5.tmp"C:\Users\Admin\AppData\Local\Temp\77F5.tmp"107⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\841A.tmp"C:\Users\Admin\AppData\Local\Temp\841A.tmp"108⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\84A7.tmp"C:\Users\Admin\AppData\Local\Temp\84A7.tmp"109⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\9263.tmp"C:\Users\Admin\AppData\Local\Temp\9263.tmp"110⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\92E0.tmp"C:\Users\Admin\AppData\Local\Temp\92E0.tmp"111⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\934D.tmp"C:\Users\Admin\AppData\Local\Temp\934D.tmp"112⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\93BA.tmp"C:\Users\Admin\AppData\Local\Temp\93BA.tmp"113⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\9541.tmp"C:\Users\Admin\AppData\Local\Temp\9541.tmp"114⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\95FD.tmp"C:\Users\Admin\AppData\Local\Temp\95FD.tmp"115⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\967A.tmp"C:\Users\Admin\AppData\Local\Temp\967A.tmp"116⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\9706.tmp"C:\Users\Admin\AppData\Local\Temp\9706.tmp"117⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\97F1.tmp"C:\Users\Admin\AppData\Local\Temp\97F1.tmp"118⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\988D.tmp"C:\Users\Admin\AppData\Local\Temp\988D.tmp"119⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\9919.tmp"C:\Users\Admin\AppData\Local\Temp\9919.tmp"120⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\99A6.tmp"C:\Users\Admin\AppData\Local\Temp\99A6.tmp"121⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\9A42.tmp"C:\Users\Admin\AppData\Local\Temp\9A42.tmp"122⤵PID:2164
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-