Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_e1b6f2abf0ffa379d9d1051937547141_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_e1b6f2abf0ffa379d9d1051937547141_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-07_e1b6f2abf0ffa379d9d1051937547141_mafia_JC.exe
-
Size
486KB
-
MD5
e1b6f2abf0ffa379d9d1051937547141
-
SHA1
47320b038111e9a8742234a75ab79b555d9c3572
-
SHA256
1daa868a473a5dcab5f725a54f29c177640ac002e505dbfeba6b0eaef8305801
-
SHA512
5efcfe5deafb40f7a3ef2b3bf43d58380f0bd1a4bb82c7675ada0ff7b95091d80e6d7dcbb075582edd3bbaaa423f7f80460b6dc15a2e33bfca04056663242041
-
SSDEEP
12288:UU5rCOTeiDEs2tMFOFR5rc1f2I5dKVTNNZ:UUQOJDEs9s3c195wNN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2016 94CE.tmp 1284 9589.tmp 2856 9645.tmp 3772 96E1.tmp 4084 97CB.tmp 3912 9867.tmp 3628 9913.tmp 2396 99FE.tmp 3132 9AC9.tmp 2032 9B55.tmp 2184 9C21.tmp 3624 9D69.tmp 3380 9DF5.tmp 1728 9EB1.tmp 1512 9F4D.tmp 3188 9FE9.tmp 5108 A23B.tmp 3104 A2C8.tmp 3904 A345.tmp 3804 A400.tmp 3768 A48D.tmp 5104 A6BF.tmp 384 B91E.tmp 4656 B9CA.tmp 4672 BAC4.tmp 4496 BB61.tmp 2308 BBDE.tmp 1864 BC99.tmp 4888 BD26.tmp 3992 BDC2.tmp 1440 BECC.tmp 3144 BFC6.tmp 4508 C043.tmp 4920 C10E.tmp 4844 C19A.tmp 5012 C227.tmp 3540 C2C3.tmp 3864 C35F.tmp 1768 C3FC.tmp 2812 C469.tmp 4352 C544.tmp 1524 C5E0.tmp 1076 C66D.tmp 3388 C6EA.tmp 3532 C767.tmp 748 C7E4.tmp 1784 C870.tmp 1124 C8ED.tmp 3152 C98A.tmp 4728 CA45.tmp 2916 CAC2.tmp 2380 CB4F.tmp 2456 CBEB.tmp 4824 CC78.tmp 1844 CD04.tmp 1980 CDA0.tmp 4380 CE5C.tmp 1376 CEE9.tmp 1640 CFD3.tmp 2396 D06F.tmp 632 D11B.tmp 2280 D1D7.tmp 4812 D273.tmp 2184 D2F0.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2016 2860 NEAS.2023-09-07_e1b6f2abf0ffa379d9d1051937547141_mafia_JC.exe 86 PID 2860 wrote to memory of 2016 2860 NEAS.2023-09-07_e1b6f2abf0ffa379d9d1051937547141_mafia_JC.exe 86 PID 2860 wrote to memory of 2016 2860 NEAS.2023-09-07_e1b6f2abf0ffa379d9d1051937547141_mafia_JC.exe 86 PID 2016 wrote to memory of 1284 2016 94CE.tmp 87 PID 2016 wrote to memory of 1284 2016 94CE.tmp 87 PID 2016 wrote to memory of 1284 2016 94CE.tmp 87 PID 1284 wrote to memory of 2856 1284 9589.tmp 89 PID 1284 wrote to memory of 2856 1284 9589.tmp 89 PID 1284 wrote to memory of 2856 1284 9589.tmp 89 PID 2856 wrote to memory of 3772 2856 9645.tmp 90 PID 2856 wrote to memory of 3772 2856 9645.tmp 90 PID 2856 wrote to memory of 3772 2856 9645.tmp 90 PID 3772 wrote to memory of 4084 3772 96E1.tmp 92 PID 3772 wrote to memory of 4084 3772 96E1.tmp 92 PID 3772 wrote to memory of 4084 3772 96E1.tmp 92 PID 4084 wrote to memory of 3912 4084 97CB.tmp 93 PID 4084 wrote to memory of 3912 4084 97CB.tmp 93 PID 4084 wrote to memory of 3912 4084 97CB.tmp 93 PID 3912 wrote to memory of 3628 3912 9867.tmp 94 PID 3912 wrote to memory of 3628 3912 9867.tmp 94 PID 3912 wrote to memory of 3628 3912 9867.tmp 94 PID 3628 wrote to memory of 2396 3628 9913.tmp 95 PID 3628 wrote to memory of 2396 3628 9913.tmp 95 PID 3628 wrote to memory of 2396 3628 9913.tmp 95 PID 2396 wrote to memory of 3132 2396 99FE.tmp 96 PID 2396 wrote to memory of 3132 2396 99FE.tmp 96 PID 2396 wrote to memory of 3132 2396 99FE.tmp 96 PID 3132 wrote to memory of 2032 3132 9AC9.tmp 97 PID 3132 wrote to memory of 2032 3132 9AC9.tmp 97 PID 3132 wrote to memory of 2032 3132 9AC9.tmp 97 PID 2032 wrote to memory of 2184 2032 9B55.tmp 98 PID 2032 wrote to memory of 2184 2032 9B55.tmp 98 PID 2032 wrote to memory of 2184 2032 9B55.tmp 98 PID 2184 wrote to memory of 3624 2184 9C21.tmp 99 PID 2184 wrote to memory of 3624 2184 9C21.tmp 99 PID 2184 wrote to memory of 3624 2184 9C21.tmp 99 PID 3624 wrote to memory of 3380 3624 9D69.tmp 100 PID 3624 wrote to memory of 3380 3624 9D69.tmp 100 PID 3624 wrote to memory of 3380 3624 9D69.tmp 100 PID 3380 wrote to memory of 1728 3380 9DF5.tmp 101 PID 3380 wrote to memory of 1728 3380 9DF5.tmp 101 PID 3380 wrote to memory of 1728 3380 9DF5.tmp 101 PID 1728 wrote to memory of 1512 1728 9EB1.tmp 102 PID 1728 wrote to memory of 1512 1728 9EB1.tmp 102 PID 1728 wrote to memory of 1512 1728 9EB1.tmp 102 PID 1512 wrote to memory of 3188 1512 9F4D.tmp 103 PID 1512 wrote to memory of 3188 1512 9F4D.tmp 103 PID 1512 wrote to memory of 3188 1512 9F4D.tmp 103 PID 3188 wrote to memory of 5108 3188 9FE9.tmp 104 PID 3188 wrote to memory of 5108 3188 9FE9.tmp 104 PID 3188 wrote to memory of 5108 3188 9FE9.tmp 104 PID 5108 wrote to memory of 3104 5108 A23B.tmp 105 PID 5108 wrote to memory of 3104 5108 A23B.tmp 105 PID 5108 wrote to memory of 3104 5108 A23B.tmp 105 PID 3104 wrote to memory of 3904 3104 A2C8.tmp 106 PID 3104 wrote to memory of 3904 3104 A2C8.tmp 106 PID 3104 wrote to memory of 3904 3104 A2C8.tmp 106 PID 3904 wrote to memory of 3804 3904 A345.tmp 108 PID 3904 wrote to memory of 3804 3904 A345.tmp 108 PID 3904 wrote to memory of 3804 3904 A345.tmp 108 PID 3804 wrote to memory of 3768 3804 A400.tmp 109 PID 3804 wrote to memory of 3768 3804 A400.tmp 109 PID 3804 wrote to memory of 3768 3804 A400.tmp 109 PID 3768 wrote to memory of 5104 3768 A48D.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_e1b6f2abf0ffa379d9d1051937547141_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_e1b6f2abf0ffa379d9d1051937547141_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\94CE.tmp"C:\Users\Admin\AppData\Local\Temp\94CE.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\9589.tmp"C:\Users\Admin\AppData\Local\Temp\9589.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\9645.tmp"C:\Users\Admin\AppData\Local\Temp\9645.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\96E1.tmp"C:\Users\Admin\AppData\Local\Temp\96E1.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\97CB.tmp"C:\Users\Admin\AppData\Local\Temp\97CB.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\9867.tmp"C:\Users\Admin\AppData\Local\Temp\9867.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\9913.tmp"C:\Users\Admin\AppData\Local\Temp\9913.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\99FE.tmp"C:\Users\Admin\AppData\Local\Temp\99FE.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\9AC9.tmp"C:\Users\Admin\AppData\Local\Temp\9AC9.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\9B55.tmp"C:\Users\Admin\AppData\Local\Temp\9B55.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\9C21.tmp"C:\Users\Admin\AppData\Local\Temp\9C21.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\9D69.tmp"C:\Users\Admin\AppData\Local\Temp\9D69.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\9DF5.tmp"C:\Users\Admin\AppData\Local\Temp\9DF5.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\9EB1.tmp"C:\Users\Admin\AppData\Local\Temp\9EB1.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\9F4D.tmp"C:\Users\Admin\AppData\Local\Temp\9F4D.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\9FE9.tmp"C:\Users\Admin\AppData\Local\Temp\9FE9.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\A23B.tmp"C:\Users\Admin\AppData\Local\Temp\A23B.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\A345.tmp"C:\Users\Admin\AppData\Local\Temp\A345.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\A400.tmp"C:\Users\Admin\AppData\Local\Temp\A400.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\A48D.tmp"C:\Users\Admin\AppData\Local\Temp\A48D.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"23⤵
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\B91E.tmp"C:\Users\Admin\AppData\Local\Temp\B91E.tmp"24⤵
- Executes dropped EXE
PID:384 -
C:\Users\Admin\AppData\Local\Temp\B9CA.tmp"C:\Users\Admin\AppData\Local\Temp\B9CA.tmp"25⤵
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"26⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\BB61.tmp"C:\Users\Admin\AppData\Local\Temp\BB61.tmp"27⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"28⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\BC99.tmp"C:\Users\Admin\AppData\Local\Temp\BC99.tmp"29⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\BD26.tmp"C:\Users\Admin\AppData\Local\Temp\BD26.tmp"30⤵
- Executes dropped EXE
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\BDC2.tmp"C:\Users\Admin\AppData\Local\Temp\BDC2.tmp"31⤵
- Executes dropped EXE
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\BECC.tmp"C:\Users\Admin\AppData\Local\Temp\BECC.tmp"32⤵
- Executes dropped EXE
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\BFC6.tmp"C:\Users\Admin\AppData\Local\Temp\BFC6.tmp"33⤵
- Executes dropped EXE
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\C043.tmp"C:\Users\Admin\AppData\Local\Temp\C043.tmp"34⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\C10E.tmp"C:\Users\Admin\AppData\Local\Temp\C10E.tmp"35⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\C19A.tmp"C:\Users\Admin\AppData\Local\Temp\C19A.tmp"36⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\C227.tmp"C:\Users\Admin\AppData\Local\Temp\C227.tmp"37⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\C2C3.tmp"C:\Users\Admin\AppData\Local\Temp\C2C3.tmp"38⤵
- Executes dropped EXE
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\C35F.tmp"C:\Users\Admin\AppData\Local\Temp\C35F.tmp"39⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\C3FC.tmp"C:\Users\Admin\AppData\Local\Temp\C3FC.tmp"40⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\C469.tmp"C:\Users\Admin\AppData\Local\Temp\C469.tmp"41⤵
- Executes dropped EXE
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\C544.tmp"C:\Users\Admin\AppData\Local\Temp\C544.tmp"42⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\C5E0.tmp"C:\Users\Admin\AppData\Local\Temp\C5E0.tmp"43⤵
- Executes dropped EXE
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\C66D.tmp"C:\Users\Admin\AppData\Local\Temp\C66D.tmp"44⤵
- Executes dropped EXE
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\C6EA.tmp"C:\Users\Admin\AppData\Local\Temp\C6EA.tmp"45⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\C767.tmp"C:\Users\Admin\AppData\Local\Temp\C767.tmp"46⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\C7E4.tmp"C:\Users\Admin\AppData\Local\Temp\C7E4.tmp"47⤵
- Executes dropped EXE
PID:748 -
C:\Users\Admin\AppData\Local\Temp\C870.tmp"C:\Users\Admin\AppData\Local\Temp\C870.tmp"48⤵
- Executes dropped EXE
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"49⤵
- Executes dropped EXE
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\C98A.tmp"C:\Users\Admin\AppData\Local\Temp\C98A.tmp"50⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\CA45.tmp"C:\Users\Admin\AppData\Local\Temp\CA45.tmp"51⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\CAC2.tmp"C:\Users\Admin\AppData\Local\Temp\CAC2.tmp"52⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"53⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\CBEB.tmp"C:\Users\Admin\AppData\Local\Temp\CBEB.tmp"54⤵
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\CC78.tmp"C:\Users\Admin\AppData\Local\Temp\CC78.tmp"55⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\CD04.tmp"C:\Users\Admin\AppData\Local\Temp\CD04.tmp"56⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"57⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"58⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\CEE9.tmp"C:\Users\Admin\AppData\Local\Temp\CEE9.tmp"59⤵
- Executes dropped EXE
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"C:\Users\Admin\AppData\Local\Temp\CFD3.tmp"60⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\D06F.tmp"C:\Users\Admin\AppData\Local\Temp\D06F.tmp"61⤵
- Executes dropped EXE
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\D11B.tmp"C:\Users\Admin\AppData\Local\Temp\D11B.tmp"62⤵
- Executes dropped EXE
PID:632 -
C:\Users\Admin\AppData\Local\Temp\D1D7.tmp"C:\Users\Admin\AppData\Local\Temp\D1D7.tmp"63⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\D273.tmp"C:\Users\Admin\AppData\Local\Temp\D273.tmp"64⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\D2F0.tmp"C:\Users\Admin\AppData\Local\Temp\D2F0.tmp"65⤵
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\D39C.tmp"C:\Users\Admin\AppData\Local\Temp\D39C.tmp"66⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\D428.tmp"C:\Users\Admin\AppData\Local\Temp\D428.tmp"67⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"68⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\D542.tmp"C:\Users\Admin\AppData\Local\Temp\D542.tmp"69⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"70⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\D65B.tmp"C:\Users\Admin\AppData\Local\Temp\D65B.tmp"71⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\D707.tmp"C:\Users\Admin\AppData\Local\Temp\D707.tmp"72⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\D784.tmp"C:\Users\Admin\AppData\Local\Temp\D784.tmp"73⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\D810.tmp"C:\Users\Admin\AppData\Local\Temp\D810.tmp"74⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\D89D.tmp"C:\Users\Admin\AppData\Local\Temp\D89D.tmp"75⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\D939.tmp"C:\Users\Admin\AppData\Local\Temp\D939.tmp"76⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\D9B6.tmp"C:\Users\Admin\AppData\Local\Temp\D9B6.tmp"77⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\DA62.tmp"C:\Users\Admin\AppData\Local\Temp\DA62.tmp"78⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\DACF.tmp"C:\Users\Admin\AppData\Local\Temp\DACF.tmp"79⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"80⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\DC18.tmp"C:\Users\Admin\AppData\Local\Temp\DC18.tmp"81⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\DCA4.tmp"C:\Users\Admin\AppData\Local\Temp\DCA4.tmp"82⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\DD31.tmp"C:\Users\Admin\AppData\Local\Temp\DD31.tmp"83⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"84⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"85⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\DEC7.tmp"C:\Users\Admin\AppData\Local\Temp\DEC7.tmp"86⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\DF63.tmp"C:\Users\Admin\AppData\Local\Temp\DF63.tmp"87⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"88⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\E05D.tmp"C:\Users\Admin\AppData\Local\Temp\E05D.tmp"89⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"90⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\E167.tmp"C:\Users\Admin\AppData\Local\Temp\E167.tmp"91⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\E203.tmp"C:\Users\Admin\AppData\Local\Temp\E203.tmp"92⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\E290.tmp"C:\Users\Admin\AppData\Local\Temp\E290.tmp"93⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\E33C.tmp"C:\Users\Admin\AppData\Local\Temp\E33C.tmp"94⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"95⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\E455.tmp"C:\Users\Admin\AppData\Local\Temp\E455.tmp"96⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\E55F.tmp"C:\Users\Admin\AppData\Local\Temp\E55F.tmp"97⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\E5FB.tmp"C:\Users\Admin\AppData\Local\Temp\E5FB.tmp"98⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\E687.tmp"C:\Users\Admin\AppData\Local\Temp\E687.tmp"99⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\E724.tmp"C:\Users\Admin\AppData\Local\Temp\E724.tmp"100⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"101⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"102⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"103⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\E947.tmp"C:\Users\Admin\AppData\Local\Temp\E947.tmp"104⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\E9B4.tmp"C:\Users\Admin\AppData\Local\Temp\E9B4.tmp"105⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\EA50.tmp"C:\Users\Admin\AppData\Local\Temp\EA50.tmp"106⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\EABE.tmp"C:\Users\Admin\AppData\Local\Temp\EABE.tmp"107⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"108⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\EB98.tmp"C:\Users\Admin\AppData\Local\Temp\EB98.tmp"109⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\EC06.tmp"C:\Users\Admin\AppData\Local\Temp\EC06.tmp"110⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\EC83.tmp"C:\Users\Admin\AppData\Local\Temp\EC83.tmp"111⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\ED1F.tmp"C:\Users\Admin\AppData\Local\Temp\ED1F.tmp"112⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\EDAC.tmp"C:\Users\Admin\AppData\Local\Temp\EDAC.tmp"113⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\EE19.tmp"C:\Users\Admin\AppData\Local\Temp\EE19.tmp"114⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\EE86.tmp"C:\Users\Admin\AppData\Local\Temp\EE86.tmp"115⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\EF23.tmp"C:\Users\Admin\AppData\Local\Temp\EF23.tmp"116⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"117⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\F04B.tmp"C:\Users\Admin\AppData\Local\Temp\F04B.tmp"118⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"119⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\F126.tmp"C:\Users\Admin\AppData\Local\Temp\F126.tmp"120⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\F1C2.tmp"C:\Users\Admin\AppData\Local\Temp\F1C2.tmp"121⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\F230.tmp"C:\Users\Admin\AppData\Local\Temp\F230.tmp"122⤵PID:2964
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-