Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_553e122fec341e78da5c1089826e724e_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_553e122fec341e78da5c1089826e724e_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-06_553e122fec341e78da5c1089826e724e_mafia_JC.exe
-
Size
487KB
-
MD5
553e122fec341e78da5c1089826e724e
-
SHA1
e788e46c00834e14eb0bbfa00f6f7b730799bfcb
-
SHA256
e97635e8151a89819cb46ac347efa3fc8009e5e7bdc1a437e303df72bb625750
-
SHA512
b2fab0cada5de0b853394ce32c103edd20fca55184b5b98d25453db88c800fbb41edfbfe3232a95e000432d3376d5069a1de967afff861ff84ab93d282368777
-
SSDEEP
6144:qorf3lPvovsgZnqG2C7mOTeiL9DUGJLXCMD8eH1arz1CqjaLOdK8KdP5wuBmTHkj:HU5rCOTeiJFXZ1arzo5LBdP5Wv0NZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4704 D5BF.tmp 1428 D699.tmp 1136 D755.tmp 4892 D810.tmp 5016 D8AD.tmp 3380 D949.tmp 4308 DA04.tmp 1028 DA81.tmp 4124 DB6C.tmp 4216 DC18.tmp 4516 DCD3.tmp 5108 DD7F.tmp 568 DEE6.tmp 1528 DF83.tmp 2168 E00F.tmp 2532 E0CB.tmp 1572 E148.tmp 3692 E203.tmp 2668 E290.tmp 2408 E38A.tmp 2096 E436.tmp 3040 E501.tmp 764 E58D.tmp 3916 E649.tmp 4336 E6F5.tmp 3968 E7C0.tmp 4952 E8AA.tmp 1540 E985.tmp 1584 EA6F.tmp 4000 EB0C.tmp 1780 EBC7.tmp 524 ECB2.tmp 3172 ED7D.tmp 4832 EE09.tmp 2932 EEE4.tmp 4524 EF71.tmp 1816 EFFD.tmp 4208 F08A.tmp 3364 F107.tmp 4108 F194.tmp 2032 F230.tmp 3420 F2AD.tmp 2900 F339.tmp 2328 F3B6.tmp 3896 F433.tmp 5044 F4C0.tmp 4824 F54D.tmp 2856 F5D9.tmp 1112 F676.tmp 4104 F712.tmp 212 F7BE.tmp 4800 F86A.tmp 4212 F8F6.tmp 4416 F983.tmp 3588 FA1F.tmp 1992 FAAC.tmp 824 FB38.tmp 3676 FBD5.tmp 784 FC61.tmp 4520 FCFD.tmp 4892 FD9A.tmp 2880 FE26.tmp 2064 FED2.tmp 4036 FF8E.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 4704 4212 NEAS.2023-09-06_553e122fec341e78da5c1089826e724e_mafia_JC.exe 86 PID 4212 wrote to memory of 4704 4212 NEAS.2023-09-06_553e122fec341e78da5c1089826e724e_mafia_JC.exe 86 PID 4212 wrote to memory of 4704 4212 NEAS.2023-09-06_553e122fec341e78da5c1089826e724e_mafia_JC.exe 86 PID 4704 wrote to memory of 1428 4704 D5BF.tmp 87 PID 4704 wrote to memory of 1428 4704 D5BF.tmp 87 PID 4704 wrote to memory of 1428 4704 D5BF.tmp 87 PID 1428 wrote to memory of 1136 1428 D699.tmp 89 PID 1428 wrote to memory of 1136 1428 D699.tmp 89 PID 1428 wrote to memory of 1136 1428 D699.tmp 89 PID 1136 wrote to memory of 4892 1136 D755.tmp 90 PID 1136 wrote to memory of 4892 1136 D755.tmp 90 PID 1136 wrote to memory of 4892 1136 D755.tmp 90 PID 4892 wrote to memory of 5016 4892 D810.tmp 91 PID 4892 wrote to memory of 5016 4892 D810.tmp 91 PID 4892 wrote to memory of 5016 4892 D810.tmp 91 PID 5016 wrote to memory of 3380 5016 D8AD.tmp 92 PID 5016 wrote to memory of 3380 5016 D8AD.tmp 92 PID 5016 wrote to memory of 3380 5016 D8AD.tmp 92 PID 3380 wrote to memory of 4308 3380 D949.tmp 93 PID 3380 wrote to memory of 4308 3380 D949.tmp 93 PID 3380 wrote to memory of 4308 3380 D949.tmp 93 PID 4308 wrote to memory of 1028 4308 DA04.tmp 94 PID 4308 wrote to memory of 1028 4308 DA04.tmp 94 PID 4308 wrote to memory of 1028 4308 DA04.tmp 94 PID 1028 wrote to memory of 4124 1028 DA81.tmp 95 PID 1028 wrote to memory of 4124 1028 DA81.tmp 95 PID 1028 wrote to memory of 4124 1028 DA81.tmp 95 PID 4124 wrote to memory of 4216 4124 DB6C.tmp 96 PID 4124 wrote to memory of 4216 4124 DB6C.tmp 96 PID 4124 wrote to memory of 4216 4124 DB6C.tmp 96 PID 4216 wrote to memory of 4516 4216 DC18.tmp 97 PID 4216 wrote to memory of 4516 4216 DC18.tmp 97 PID 4216 wrote to memory of 4516 4216 DC18.tmp 97 PID 4516 wrote to memory of 5108 4516 DCD3.tmp 98 PID 4516 wrote to memory of 5108 4516 DCD3.tmp 98 PID 4516 wrote to memory of 5108 4516 DCD3.tmp 98 PID 5108 wrote to memory of 568 5108 DD7F.tmp 99 PID 5108 wrote to memory of 568 5108 DD7F.tmp 99 PID 5108 wrote to memory of 568 5108 DD7F.tmp 99 PID 568 wrote to memory of 1528 568 DEE6.tmp 100 PID 568 wrote to memory of 1528 568 DEE6.tmp 100 PID 568 wrote to memory of 1528 568 DEE6.tmp 100 PID 1528 wrote to memory of 2168 1528 DF83.tmp 101 PID 1528 wrote to memory of 2168 1528 DF83.tmp 101 PID 1528 wrote to memory of 2168 1528 DF83.tmp 101 PID 2168 wrote to memory of 2532 2168 E00F.tmp 102 PID 2168 wrote to memory of 2532 2168 E00F.tmp 102 PID 2168 wrote to memory of 2532 2168 E00F.tmp 102 PID 2532 wrote to memory of 1572 2532 E0CB.tmp 103 PID 2532 wrote to memory of 1572 2532 E0CB.tmp 103 PID 2532 wrote to memory of 1572 2532 E0CB.tmp 103 PID 1572 wrote to memory of 3692 1572 E148.tmp 104 PID 1572 wrote to memory of 3692 1572 E148.tmp 104 PID 1572 wrote to memory of 3692 1572 E148.tmp 104 PID 3692 wrote to memory of 2668 3692 E203.tmp 105 PID 3692 wrote to memory of 2668 3692 E203.tmp 105 PID 3692 wrote to memory of 2668 3692 E203.tmp 105 PID 2668 wrote to memory of 2408 2668 E290.tmp 106 PID 2668 wrote to memory of 2408 2668 E290.tmp 106 PID 2668 wrote to memory of 2408 2668 E290.tmp 106 PID 2408 wrote to memory of 2096 2408 E38A.tmp 107 PID 2408 wrote to memory of 2096 2408 E38A.tmp 107 PID 2408 wrote to memory of 2096 2408 E38A.tmp 107 PID 2096 wrote to memory of 3040 2096 E436.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_553e122fec341e78da5c1089826e724e_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_553e122fec341e78da5c1089826e724e_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\D699.tmp"C:\Users\Admin\AppData\Local\Temp\D699.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\D755.tmp"C:\Users\Admin\AppData\Local\Temp\D755.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\D810.tmp"C:\Users\Admin\AppData\Local\Temp\D810.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\D8AD.tmp"C:\Users\Admin\AppData\Local\Temp\D8AD.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\D949.tmp"C:\Users\Admin\AppData\Local\Temp\D949.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\DA04.tmp"C:\Users\Admin\AppData\Local\Temp\DA04.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\DA81.tmp"C:\Users\Admin\AppData\Local\Temp\DA81.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\DC18.tmp"C:\Users\Admin\AppData\Local\Temp\DC18.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\DCD3.tmp"C:\Users\Admin\AppData\Local\Temp\DCD3.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\DF83.tmp"C:\Users\Admin\AppData\Local\Temp\DF83.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\E00F.tmp"C:\Users\Admin\AppData\Local\Temp\E00F.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\E0CB.tmp"C:\Users\Admin\AppData\Local\Temp\E0CB.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\E148.tmp"C:\Users\Admin\AppData\Local\Temp\E148.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\E203.tmp"C:\Users\Admin\AppData\Local\Temp\E203.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\E290.tmp"C:\Users\Admin\AppData\Local\Temp\E290.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\E38A.tmp"C:\Users\Admin\AppData\Local\Temp\E38A.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\E436.tmp"C:\Users\Admin\AppData\Local\Temp\E436.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\E501.tmp"C:\Users\Admin\AppData\Local\Temp\E501.tmp"23⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\E58D.tmp"C:\Users\Admin\AppData\Local\Temp\E58D.tmp"24⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\E649.tmp"C:\Users\Admin\AppData\Local\Temp\E649.tmp"25⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\E6F5.tmp"C:\Users\Admin\AppData\Local\Temp\E6F5.tmp"26⤵
- Executes dropped EXE
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\E7C0.tmp"C:\Users\Admin\AppData\Local\Temp\E7C0.tmp"27⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\E8AA.tmp"C:\Users\Admin\AppData\Local\Temp\E8AA.tmp"28⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\E985.tmp"C:\Users\Admin\AppData\Local\Temp\E985.tmp"29⤵
- Executes dropped EXE
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"30⤵
- Executes dropped EXE
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"31⤵
- Executes dropped EXE
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\EBC7.tmp"C:\Users\Admin\AppData\Local\Temp\EBC7.tmp"32⤵
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"33⤵
- Executes dropped EXE
PID:524 -
C:\Users\Admin\AppData\Local\Temp\ED7D.tmp"C:\Users\Admin\AppData\Local\Temp\ED7D.tmp"34⤵
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\EE09.tmp"C:\Users\Admin\AppData\Local\Temp\EE09.tmp"35⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"36⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\EF71.tmp"C:\Users\Admin\AppData\Local\Temp\EF71.tmp"37⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"38⤵
- Executes dropped EXE
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\F08A.tmp"C:\Users\Admin\AppData\Local\Temp\F08A.tmp"39⤵
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\F107.tmp"C:\Users\Admin\AppData\Local\Temp\F107.tmp"40⤵
- Executes dropped EXE
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\F194.tmp"C:\Users\Admin\AppData\Local\Temp\F194.tmp"41⤵
- Executes dropped EXE
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\F230.tmp"C:\Users\Admin\AppData\Local\Temp\F230.tmp"42⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"43⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\F339.tmp"C:\Users\Admin\AppData\Local\Temp\F339.tmp"44⤵
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\F3B6.tmp"C:\Users\Admin\AppData\Local\Temp\F3B6.tmp"45⤵
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\F433.tmp"C:\Users\Admin\AppData\Local\Temp\F433.tmp"46⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\F4C0.tmp"C:\Users\Admin\AppData\Local\Temp\F4C0.tmp"47⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\F54D.tmp"C:\Users\Admin\AppData\Local\Temp\F54D.tmp"48⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\F5D9.tmp"C:\Users\Admin\AppData\Local\Temp\F5D9.tmp"49⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\F676.tmp"C:\Users\Admin\AppData\Local\Temp\F676.tmp"50⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\F712.tmp"C:\Users\Admin\AppData\Local\Temp\F712.tmp"51⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"52⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\F86A.tmp"C:\Users\Admin\AppData\Local\Temp\F86A.tmp"53⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"54⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\F983.tmp"C:\Users\Admin\AppData\Local\Temp\F983.tmp"55⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"56⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"57⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\FB38.tmp"C:\Users\Admin\AppData\Local\Temp\FB38.tmp"58⤵
- Executes dropped EXE
PID:824 -
C:\Users\Admin\AppData\Local\Temp\FBD5.tmp"C:\Users\Admin\AppData\Local\Temp\FBD5.tmp"59⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\FC61.tmp"C:\Users\Admin\AppData\Local\Temp\FC61.tmp"60⤵
- Executes dropped EXE
PID:784 -
C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"61⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"62⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\FE26.tmp"C:\Users\Admin\AppData\Local\Temp\FE26.tmp"63⤵
- Executes dropped EXE
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\FED2.tmp"C:\Users\Admin\AppData\Local\Temp\FED2.tmp"64⤵
- Executes dropped EXE
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\FF8E.tmp"C:\Users\Admin\AppData\Local\Temp\FF8E.tmp"65⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\1A.tmp"C:\Users\Admin\AppData\Local\Temp\1A.tmp"66⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\B7.tmp"C:\Users\Admin\AppData\Local\Temp\B7.tmp"67⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\143.tmp"C:\Users\Admin\AppData\Local\Temp\143.tmp"68⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\1D0.tmp"C:\Users\Admin\AppData\Local\Temp\1D0.tmp"69⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\24D.tmp"C:\Users\Admin\AppData\Local\Temp\24D.tmp"70⤵PID:496
-
C:\Users\Admin\AppData\Local\Temp\2BA.tmp"C:\Users\Admin\AppData\Local\Temp\2BA.tmp"71⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\337.tmp"C:\Users\Admin\AppData\Local\Temp\337.tmp"72⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\3A5.tmp"C:\Users\Admin\AppData\Local\Temp\3A5.tmp"73⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\412.tmp"C:\Users\Admin\AppData\Local\Temp\412.tmp"74⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\49F.tmp"C:\Users\Admin\AppData\Local\Temp\49F.tmp"75⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\51C.tmp"C:\Users\Admin\AppData\Local\Temp\51C.tmp"76⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\5A8.tmp"C:\Users\Admin\AppData\Local\Temp\5A8.tmp"77⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\625.tmp"C:\Users\Admin\AppData\Local\Temp\625.tmp"78⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"79⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\73E.tmp"C:\Users\Admin\AppData\Local\Temp\73E.tmp"80⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\7AC.tmp"C:\Users\Admin\AppData\Local\Temp\7AC.tmp"81⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\829.tmp"C:\Users\Admin\AppData\Local\Temp\829.tmp"82⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\8B5.tmp"C:\Users\Admin\AppData\Local\Temp\8B5.tmp"83⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\961.tmp"C:\Users\Admin\AppData\Local\Temp\961.tmp"84⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\9EE.tmp"C:\Users\Admin\AppData\Local\Temp\9EE.tmp"85⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\A8A.tmp"C:\Users\Admin\AppData\Local\Temp\A8A.tmp"86⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\B17.tmp"C:\Users\Admin\AppData\Local\Temp\B17.tmp"87⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\BA3.tmp"C:\Users\Admin\AppData\Local\Temp\BA3.tmp"88⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\C4F.tmp"C:\Users\Admin\AppData\Local\Temp\C4F.tmp"89⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"90⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\D49.tmp"C:\Users\Admin\AppData\Local\Temp\D49.tmp"91⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\DD6.tmp"C:\Users\Admin\AppData\Local\Temp\DD6.tmp"92⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\E43.tmp"C:\Users\Admin\AppData\Local\Temp\E43.tmp"93⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\EE0.tmp"C:\Users\Admin\AppData\Local\Temp\EE0.tmp"94⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\F6C.tmp"C:\Users\Admin\AppData\Local\Temp\F6C.tmp"95⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\FF9.tmp"C:\Users\Admin\AppData\Local\Temp\FF9.tmp"96⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\1076.tmp"C:\Users\Admin\AppData\Local\Temp\1076.tmp"97⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\10F3.tmp"C:\Users\Admin\AppData\Local\Temp\10F3.tmp"98⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\1170.tmp"C:\Users\Admin\AppData\Local\Temp\1170.tmp"99⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\120C.tmp"C:\Users\Admin\AppData\Local\Temp\120C.tmp"100⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\1299.tmp"C:\Users\Admin\AppData\Local\Temp\1299.tmp"101⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\1306.tmp"C:\Users\Admin\AppData\Local\Temp\1306.tmp"102⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\1393.tmp"C:\Users\Admin\AppData\Local\Temp\1393.tmp"103⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\141F.tmp"C:\Users\Admin\AppData\Local\Temp\141F.tmp"104⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\149C.tmp"C:\Users\Admin\AppData\Local\Temp\149C.tmp"105⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\1539.tmp"C:\Users\Admin\AppData\Local\Temp\1539.tmp"106⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\15B6.tmp"C:\Users\Admin\AppData\Local\Temp\15B6.tmp"107⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\1652.tmp"C:\Users\Admin\AppData\Local\Temp\1652.tmp"108⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\16DE.tmp"C:\Users\Admin\AppData\Local\Temp\16DE.tmp"109⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\176B.tmp"C:\Users\Admin\AppData\Local\Temp\176B.tmp"110⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\1807.tmp"C:\Users\Admin\AppData\Local\Temp\1807.tmp"111⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\1884.tmp"C:\Users\Admin\AppData\Local\Temp\1884.tmp"112⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\1911.tmp"C:\Users\Admin\AppData\Local\Temp\1911.tmp"113⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\19AD.tmp"C:\Users\Admin\AppData\Local\Temp\19AD.tmp"114⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\1A3A.tmp"C:\Users\Admin\AppData\Local\Temp\1A3A.tmp"115⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\1AC6.tmp"C:\Users\Admin\AppData\Local\Temp\1AC6.tmp"116⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\1B34.tmp"C:\Users\Admin\AppData\Local\Temp\1B34.tmp"117⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"118⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"119⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\1D09.tmp"C:\Users\Admin\AppData\Local\Temp\1D09.tmp"120⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"121⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\1E22.tmp"C:\Users\Admin\AppData\Local\Temp\1E22.tmp"122⤵PID:4104
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-