Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-08_ffe495a63bd05ab9031eb6fd0b931e39_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-08_ffe495a63bd05ab9031eb6fd0b931e39_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-08_ffe495a63bd05ab9031eb6fd0b931e39_mafia_JC.exe
-
Size
486KB
-
MD5
ffe495a63bd05ab9031eb6fd0b931e39
-
SHA1
531605b2c52621220c096b69d11677e4dc9b5bfa
-
SHA256
d0b1a1dec6ef954b1e262e85cfd9c95b7d0c942cefac36c64fd4eeecb2314688
-
SHA512
312fcec489d417d58adf8a6c35791dd45f0b4a01bccfc7f2f0d70dcdd33bcb8601419a5098bc9ca21723304dffe2fb6fee2d96ef03b0838cfc391e90728e4ee1
-
SSDEEP
12288:/U5rCOTeiDMueP30uYIsp9rZsb811sNZ:/UQOJDO30FtZsbqSN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4648 8637.tmp 1748 86F3.tmp 4960 87CD.tmp 4364 88B8.tmp 1052 8944.tmp 4196 89E1.tmp 4056 8ADB.tmp 4092 8B67.tmp 4860 8C04.tmp 4736 8CDE.tmp 2904 8D6B.tmp 1604 8DE8.tmp 5032 8E65.tmp 1620 8EF2.tmp 4472 8FDC.tmp 2760 90B7.tmp 1348 9172.tmp 1372 920E.tmp 2932 92AB.tmp 2196 9337.tmp 2728 9422.tmp 2468 94AE.tmp 2264 9589.tmp 4000 9654.tmp 2724 96F0.tmp 4856 97BC.tmp 3048 9877.tmp 4900 9961.tmp 3092 9A0D.tmp 1380 9AD8.tmp 4752 9B84.tmp 4244 9CCC.tmp 2480 9DA7.tmp 4512 9E43.tmp 396 9EE0.tmp 3016 9F7C.tmp 4920 A028.tmp 1524 A0B4.tmp 736 A141.tmp 4200 A1DD.tmp 5064 A26A.tmp 4048 A316.tmp 3768 A3B2.tmp 4836 A42F.tmp 4992 A4CB.tmp 4076 A548.tmp 3944 A5D5.tmp 2068 A671.tmp 1452 A6FE.tmp 3004 A79A.tmp 1132 A884.tmp 3788 A8F2.tmp 636 A96F.tmp 4776 A9DC.tmp 1548 AA78.tmp 1112 AAE6.tmp 1656 AB82.tmp 3416 AC0F.tmp 4020 ACAB.tmp 1604 AD38.tmp 5100 ADB5.tmp 3968 AE51.tmp 1620 AECE.tmp 2868 AF4B.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 4648 2340 NEAS.2023-09-08_ffe495a63bd05ab9031eb6fd0b931e39_mafia_JC.exe 87 PID 2340 wrote to memory of 4648 2340 NEAS.2023-09-08_ffe495a63bd05ab9031eb6fd0b931e39_mafia_JC.exe 87 PID 2340 wrote to memory of 4648 2340 NEAS.2023-09-08_ffe495a63bd05ab9031eb6fd0b931e39_mafia_JC.exe 87 PID 4648 wrote to memory of 1748 4648 8637.tmp 89 PID 4648 wrote to memory of 1748 4648 8637.tmp 89 PID 4648 wrote to memory of 1748 4648 8637.tmp 89 PID 1748 wrote to memory of 4960 1748 86F3.tmp 90 PID 1748 wrote to memory of 4960 1748 86F3.tmp 90 PID 1748 wrote to memory of 4960 1748 86F3.tmp 90 PID 4960 wrote to memory of 4364 4960 87CD.tmp 91 PID 4960 wrote to memory of 4364 4960 87CD.tmp 91 PID 4960 wrote to memory of 4364 4960 87CD.tmp 91 PID 4364 wrote to memory of 1052 4364 88B8.tmp 92 PID 4364 wrote to memory of 1052 4364 88B8.tmp 92 PID 4364 wrote to memory of 1052 4364 88B8.tmp 92 PID 1052 wrote to memory of 4196 1052 8944.tmp 93 PID 1052 wrote to memory of 4196 1052 8944.tmp 93 PID 1052 wrote to memory of 4196 1052 8944.tmp 93 PID 4196 wrote to memory of 4056 4196 89E1.tmp 94 PID 4196 wrote to memory of 4056 4196 89E1.tmp 94 PID 4196 wrote to memory of 4056 4196 89E1.tmp 94 PID 4056 wrote to memory of 4092 4056 8ADB.tmp 95 PID 4056 wrote to memory of 4092 4056 8ADB.tmp 95 PID 4056 wrote to memory of 4092 4056 8ADB.tmp 95 PID 4092 wrote to memory of 4860 4092 8B67.tmp 96 PID 4092 wrote to memory of 4860 4092 8B67.tmp 96 PID 4092 wrote to memory of 4860 4092 8B67.tmp 96 PID 4860 wrote to memory of 4736 4860 8C04.tmp 97 PID 4860 wrote to memory of 4736 4860 8C04.tmp 97 PID 4860 wrote to memory of 4736 4860 8C04.tmp 97 PID 4736 wrote to memory of 2904 4736 8CDE.tmp 98 PID 4736 wrote to memory of 2904 4736 8CDE.tmp 98 PID 4736 wrote to memory of 2904 4736 8CDE.tmp 98 PID 2904 wrote to memory of 1604 2904 8D6B.tmp 99 PID 2904 wrote to memory of 1604 2904 8D6B.tmp 99 PID 2904 wrote to memory of 1604 2904 8D6B.tmp 99 PID 1604 wrote to memory of 5032 1604 8DE8.tmp 100 PID 1604 wrote to memory of 5032 1604 8DE8.tmp 100 PID 1604 wrote to memory of 5032 1604 8DE8.tmp 100 PID 5032 wrote to memory of 1620 5032 8E65.tmp 101 PID 5032 wrote to memory of 1620 5032 8E65.tmp 101 PID 5032 wrote to memory of 1620 5032 8E65.tmp 101 PID 1620 wrote to memory of 4472 1620 8EF2.tmp 102 PID 1620 wrote to memory of 4472 1620 8EF2.tmp 102 PID 1620 wrote to memory of 4472 1620 8EF2.tmp 102 PID 4472 wrote to memory of 2760 4472 8FDC.tmp 103 PID 4472 wrote to memory of 2760 4472 8FDC.tmp 103 PID 4472 wrote to memory of 2760 4472 8FDC.tmp 103 PID 2760 wrote to memory of 1348 2760 90B7.tmp 105 PID 2760 wrote to memory of 1348 2760 90B7.tmp 105 PID 2760 wrote to memory of 1348 2760 90B7.tmp 105 PID 1348 wrote to memory of 1372 1348 9172.tmp 106 PID 1348 wrote to memory of 1372 1348 9172.tmp 106 PID 1348 wrote to memory of 1372 1348 9172.tmp 106 PID 1372 wrote to memory of 2932 1372 920E.tmp 107 PID 1372 wrote to memory of 2932 1372 920E.tmp 107 PID 1372 wrote to memory of 2932 1372 920E.tmp 107 PID 2932 wrote to memory of 2196 2932 92AB.tmp 108 PID 2932 wrote to memory of 2196 2932 92AB.tmp 108 PID 2932 wrote to memory of 2196 2932 92AB.tmp 108 PID 2196 wrote to memory of 2728 2196 9337.tmp 109 PID 2196 wrote to memory of 2728 2196 9337.tmp 109 PID 2196 wrote to memory of 2728 2196 9337.tmp 109 PID 2728 wrote to memory of 2468 2728 9422.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-08_ffe495a63bd05ab9031eb6fd0b931e39_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-08_ffe495a63bd05ab9031eb6fd0b931e39_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\8637.tmp"C:\Users\Admin\AppData\Local\Temp\8637.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\86F3.tmp"C:\Users\Admin\AppData\Local\Temp\86F3.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\87CD.tmp"C:\Users\Admin\AppData\Local\Temp\87CD.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\88B8.tmp"C:\Users\Admin\AppData\Local\Temp\88B8.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\8944.tmp"C:\Users\Admin\AppData\Local\Temp\8944.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\89E1.tmp"C:\Users\Admin\AppData\Local\Temp\89E1.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"C:\Users\Admin\AppData\Local\Temp\8ADB.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\8B67.tmp"C:\Users\Admin\AppData\Local\Temp\8B67.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\8C04.tmp"C:\Users\Admin\AppData\Local\Temp\8C04.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\8CDE.tmp"C:\Users\Admin\AppData\Local\Temp\8CDE.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\8D6B.tmp"C:\Users\Admin\AppData\Local\Temp\8D6B.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\8E65.tmp"C:\Users\Admin\AppData\Local\Temp\8E65.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\8FDC.tmp"C:\Users\Admin\AppData\Local\Temp\8FDC.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\90B7.tmp"C:\Users\Admin\AppData\Local\Temp\90B7.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\9172.tmp"C:\Users\Admin\AppData\Local\Temp\9172.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\920E.tmp"C:\Users\Admin\AppData\Local\Temp\920E.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\92AB.tmp"C:\Users\Admin\AppData\Local\Temp\92AB.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\9337.tmp"C:\Users\Admin\AppData\Local\Temp\9337.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\9422.tmp"C:\Users\Admin\AppData\Local\Temp\9422.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\94AE.tmp"C:\Users\Admin\AppData\Local\Temp\94AE.tmp"23⤵
- Executes dropped EXE
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\9589.tmp"C:\Users\Admin\AppData\Local\Temp\9589.tmp"24⤵
- Executes dropped EXE
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\9654.tmp"C:\Users\Admin\AppData\Local\Temp\9654.tmp"25⤵
- Executes dropped EXE
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\96F0.tmp"C:\Users\Admin\AppData\Local\Temp\96F0.tmp"26⤵
- Executes dropped EXE
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\97BC.tmp"C:\Users\Admin\AppData\Local\Temp\97BC.tmp"27⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\9877.tmp"C:\Users\Admin\AppData\Local\Temp\9877.tmp"28⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\9961.tmp"C:\Users\Admin\AppData\Local\Temp\9961.tmp"29⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\9A0D.tmp"C:\Users\Admin\AppData\Local\Temp\9A0D.tmp"30⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\9AD8.tmp"C:\Users\Admin\AppData\Local\Temp\9AD8.tmp"31⤵
- Executes dropped EXE
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\9B84.tmp"C:\Users\Admin\AppData\Local\Temp\9B84.tmp"32⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\9CCC.tmp"C:\Users\Admin\AppData\Local\Temp\9CCC.tmp"33⤵
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\9DA7.tmp"C:\Users\Admin\AppData\Local\Temp\9DA7.tmp"34⤵
- Executes dropped EXE
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\9E43.tmp"C:\Users\Admin\AppData\Local\Temp\9E43.tmp"35⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"36⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"37⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\A028.tmp"C:\Users\Admin\AppData\Local\Temp\A028.tmp"38⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\A0B4.tmp"C:\Users\Admin\AppData\Local\Temp\A0B4.tmp"39⤵
- Executes dropped EXE
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\A141.tmp"C:\Users\Admin\AppData\Local\Temp\A141.tmp"40⤵
- Executes dropped EXE
PID:736 -
C:\Users\Admin\AppData\Local\Temp\A1DD.tmp"C:\Users\Admin\AppData\Local\Temp\A1DD.tmp"41⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\A26A.tmp"C:\Users\Admin\AppData\Local\Temp\A26A.tmp"42⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\A316.tmp"C:\Users\Admin\AppData\Local\Temp\A316.tmp"43⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\A3B2.tmp"C:\Users\Admin\AppData\Local\Temp\A3B2.tmp"44⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\A42F.tmp"C:\Users\Admin\AppData\Local\Temp\A42F.tmp"45⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"46⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\A548.tmp"C:\Users\Admin\AppData\Local\Temp\A548.tmp"47⤵
- Executes dropped EXE
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\A5D5.tmp"C:\Users\Admin\AppData\Local\Temp\A5D5.tmp"48⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\A671.tmp"C:\Users\Admin\AppData\Local\Temp\A671.tmp"49⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\A6FE.tmp"C:\Users\Admin\AppData\Local\Temp\A6FE.tmp"50⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\A79A.tmp"C:\Users\Admin\AppData\Local\Temp\A79A.tmp"51⤵
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\A884.tmp"C:\Users\Admin\AppData\Local\Temp\A884.tmp"52⤵
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\A8F2.tmp"C:\Users\Admin\AppData\Local\Temp\A8F2.tmp"53⤵
- Executes dropped EXE
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\A96F.tmp"C:\Users\Admin\AppData\Local\Temp\A96F.tmp"54⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\A9DC.tmp"C:\Users\Admin\AppData\Local\Temp\A9DC.tmp"55⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\AA78.tmp"C:\Users\Admin\AppData\Local\Temp\AA78.tmp"56⤵
- Executes dropped EXE
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\AAE6.tmp"C:\Users\Admin\AppData\Local\Temp\AAE6.tmp"57⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\AB82.tmp"C:\Users\Admin\AppData\Local\Temp\AB82.tmp"58⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"59⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"60⤵
- Executes dropped EXE
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\AD38.tmp"C:\Users\Admin\AppData\Local\Temp\AD38.tmp"61⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\ADB5.tmp"C:\Users\Admin\AppData\Local\Temp\ADB5.tmp"62⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\AE51.tmp"C:\Users\Admin\AppData\Local\Temp\AE51.tmp"63⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\AECE.tmp"C:\Users\Admin\AppData\Local\Temp\AECE.tmp"64⤵
- Executes dropped EXE
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\AF4B.tmp"C:\Users\Admin\AppData\Local\Temp\AF4B.tmp"65⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\AFD7.tmp"C:\Users\Admin\AppData\Local\Temp\AFD7.tmp"66⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\B064.tmp"C:\Users\Admin\AppData\Local\Temp\B064.tmp"67⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\B100.tmp"C:\Users\Admin\AppData\Local\Temp\B100.tmp"68⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\B1AC.tmp"C:\Users\Admin\AppData\Local\Temp\B1AC.tmp"69⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\B248.tmp"C:\Users\Admin\AppData\Local\Temp\B248.tmp"70⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"71⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\B362.tmp"C:\Users\Admin\AppData\Local\Temp\B362.tmp"72⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"73⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\B47B.tmp"C:\Users\Admin\AppData\Local\Temp\B47B.tmp"74⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\B508.tmp"C:\Users\Admin\AppData\Local\Temp\B508.tmp"75⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\B585.tmp"C:\Users\Admin\AppData\Local\Temp\B585.tmp"76⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\B621.tmp"C:\Users\Admin\AppData\Local\Temp\B621.tmp"77⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"78⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\B74A.tmp"C:\Users\Admin\AppData\Local\Temp\B74A.tmp"79⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"80⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\B863.tmp"C:\Users\Admin\AppData\Local\Temp\B863.tmp"81⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\B8E0.tmp"C:\Users\Admin\AppData\Local\Temp\B8E0.tmp"82⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\B95D.tmp"C:\Users\Admin\AppData\Local\Temp\B95D.tmp"83⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\B9CA.tmp"C:\Users\Admin\AppData\Local\Temp\B9CA.tmp"84⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\BA76.tmp"C:\Users\Admin\AppData\Local\Temp\BA76.tmp"85⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"86⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\BB80.tmp"C:\Users\Admin\AppData\Local\Temp\BB80.tmp"87⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\BBFD.tmp"C:\Users\Admin\AppData\Local\Temp\BBFD.tmp"88⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\BC89.tmp"C:\Users\Admin\AppData\Local\Temp\BC89.tmp"89⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\BCE7.tmp"C:\Users\Admin\AppData\Local\Temp\BCE7.tmp"90⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\BD64.tmp"C:\Users\Admin\AppData\Local\Temp\BD64.tmp"91⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"92⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\BE6E.tmp"C:\Users\Admin\AppData\Local\Temp\BE6E.tmp"93⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\BF29.tmp"C:\Users\Admin\AppData\Local\Temp\BF29.tmp"94⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\BFB6.tmp"C:\Users\Admin\AppData\Local\Temp\BFB6.tmp"95⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\C052.tmp"C:\Users\Admin\AppData\Local\Temp\C052.tmp"96⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"97⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\C12D.tmp"C:\Users\Admin\AppData\Local\Temp\C12D.tmp"98⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\C1C9.tmp"C:\Users\Admin\AppData\Local\Temp\C1C9.tmp"99⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\C246.tmp"C:\Users\Admin\AppData\Local\Temp\C246.tmp"100⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\C2B4.tmp"C:\Users\Admin\AppData\Local\Temp\C2B4.tmp"101⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\C340.tmp"C:\Users\Admin\AppData\Local\Temp\C340.tmp"102⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\C3DC.tmp"C:\Users\Admin\AppData\Local\Temp\C3DC.tmp"103⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\C469.tmp"C:\Users\Admin\AppData\Local\Temp\C469.tmp"104⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"105⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\C582.tmp"C:\Users\Admin\AppData\Local\Temp\C582.tmp"106⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\C60F.tmp"C:\Users\Admin\AppData\Local\Temp\C60F.tmp"107⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"108⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\C719.tmp"C:\Users\Admin\AppData\Local\Temp\C719.tmp"109⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\C7A5.tmp"C:\Users\Admin\AppData\Local\Temp\C7A5.tmp"110⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\C841.tmp"C:\Users\Admin\AppData\Local\Temp\C841.tmp"111⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"112⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\C95B.tmp"C:\Users\Admin\AppData\Local\Temp\C95B.tmp"113⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\C9D8.tmp"C:\Users\Admin\AppData\Local\Temp\C9D8.tmp"114⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\CA35.tmp"C:\Users\Admin\AppData\Local\Temp\CA35.tmp"115⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\CAD2.tmp"C:\Users\Admin\AppData\Local\Temp\CAD2.tmp"116⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\CB6E.tmp"C:\Users\Admin\AppData\Local\Temp\CB6E.tmp"117⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\CBEB.tmp"C:\Users\Admin\AppData\Local\Temp\CBEB.tmp"118⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\CC58.tmp"C:\Users\Admin\AppData\Local\Temp\CC58.tmp"119⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\CCD5.tmp"C:\Users\Admin\AppData\Local\Temp\CCD5.tmp"120⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\CD33.tmp"C:\Users\Admin\AppData\Local\Temp\CD33.tmp"121⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\CDCF.tmp"C:\Users\Admin\AppData\Local\Temp\CDCF.tmp"122⤵PID:1112
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-