Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 16:10 UTC
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_1a6517ec32ad49154e5db409076fab4e_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_1a6517ec32ad49154e5db409076fab4e_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-05_1a6517ec32ad49154e5db409076fab4e_mafia_JC.exe
-
Size
486KB
-
MD5
1a6517ec32ad49154e5db409076fab4e
-
SHA1
c771efe8b3018dd59dc025d755bbd4d1db0cab10
-
SHA256
7cd4dcd3f671e74c02d55637b731192b8246b264c1bbd6613d40cddde1a8afeb
-
SHA512
2d8e17b7b4047ed1eda10c6b086ccc8751443582a5e8f4df81544eef7c3e09314d9b23510667d37e70134ebe2ecedc7a7168a5086ac08f03b06542b69cd21454
-
SSDEEP
12288:oU5rCOTeiDs8d93/44iSYrZ8CGktPgNZ:oUQOJDs8d1/grntYN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4244 98A6.tmp 452 9990.tmp 4052 9A4C.tmp 3408 9B07.tmp 3872 9C01.tmp 4716 9CAD.tmp 4376 9D2A.tmp 1004 9DD6.tmp 972 9E82.tmp 1492 9EFF.tmp 3648 9F9B.tmp 2864 A037.tmp 4916 A1DD.tmp 4980 A27A.tmp 4460 A2E7.tmp 2936 A364.tmp 2400 A3E1.tmp 4448 A45E.tmp 3908 A4EB.tmp 4432 A5A6.tmp 4304 A633.tmp 2884 A6B0.tmp 1112 A73C.tmp 3084 A7F8.tmp 5116 A875.tmp 1448 A8F2.tmp 3684 A98E.tmp 1528 AA3A.tmp 2444 AAE6.tmp 4552 AB82.tmp 1348 ABFF.tmp 3564 AC9B.tmp 4788 AD09.tmp 3736 AD76.tmp 2456 ADF3.tmp 1968 AE80.tmp 3016 AF5A.tmp 4200 AFE7.tmp 324 B064.tmp 1884 B0D1.tmp 3288 B13F.tmp 3392 B1BC.tmp 4696 B239.tmp 2944 B2C5.tmp 4260 B342.tmp 1352 B3BF.tmp 2784 B42D.tmp 1800 B4AA.tmp 3172 B527.tmp 1856 B5B3.tmp 3408 B6AD.tmp 4732 B72A.tmp 2808 B7A7.tmp 4548 B824.tmp 1648 B892.tmp 1608 B90F.tmp 4724 B99B.tmp 2380 BA18.tmp 5096 BA86.tmp 4660 BB03.tmp 4948 BB9F.tmp 976 BC2C.tmp 3612 BC99.tmp 3928 BD16.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2920 wrote to memory of 4244 2920 NEAS.2023-09-05_1a6517ec32ad49154e5db409076fab4e_mafia_JC.exe 86 PID 2920 wrote to memory of 4244 2920 NEAS.2023-09-05_1a6517ec32ad49154e5db409076fab4e_mafia_JC.exe 86 PID 2920 wrote to memory of 4244 2920 NEAS.2023-09-05_1a6517ec32ad49154e5db409076fab4e_mafia_JC.exe 86 PID 4244 wrote to memory of 452 4244 98A6.tmp 88 PID 4244 wrote to memory of 452 4244 98A6.tmp 88 PID 4244 wrote to memory of 452 4244 98A6.tmp 88 PID 452 wrote to memory of 4052 452 9990.tmp 90 PID 452 wrote to memory of 4052 452 9990.tmp 90 PID 452 wrote to memory of 4052 452 9990.tmp 90 PID 4052 wrote to memory of 3408 4052 9A4C.tmp 91 PID 4052 wrote to memory of 3408 4052 9A4C.tmp 91 PID 4052 wrote to memory of 3408 4052 9A4C.tmp 91 PID 3408 wrote to memory of 3872 3408 9B07.tmp 92 PID 3408 wrote to memory of 3872 3408 9B07.tmp 92 PID 3408 wrote to memory of 3872 3408 9B07.tmp 92 PID 3872 wrote to memory of 4716 3872 9C01.tmp 93 PID 3872 wrote to memory of 4716 3872 9C01.tmp 93 PID 3872 wrote to memory of 4716 3872 9C01.tmp 93 PID 4716 wrote to memory of 4376 4716 9CAD.tmp 94 PID 4716 wrote to memory of 4376 4716 9CAD.tmp 94 PID 4716 wrote to memory of 4376 4716 9CAD.tmp 94 PID 4376 wrote to memory of 1004 4376 9D2A.tmp 95 PID 4376 wrote to memory of 1004 4376 9D2A.tmp 95 PID 4376 wrote to memory of 1004 4376 9D2A.tmp 95 PID 1004 wrote to memory of 972 1004 9DD6.tmp 96 PID 1004 wrote to memory of 972 1004 9DD6.tmp 96 PID 1004 wrote to memory of 972 1004 9DD6.tmp 96 PID 972 wrote to memory of 1492 972 9E82.tmp 97 PID 972 wrote to memory of 1492 972 9E82.tmp 97 PID 972 wrote to memory of 1492 972 9E82.tmp 97 PID 1492 wrote to memory of 3648 1492 9EFF.tmp 98 PID 1492 wrote to memory of 3648 1492 9EFF.tmp 98 PID 1492 wrote to memory of 3648 1492 9EFF.tmp 98 PID 3648 wrote to memory of 2864 3648 9F9B.tmp 99 PID 3648 wrote to memory of 2864 3648 9F9B.tmp 99 PID 3648 wrote to memory of 2864 3648 9F9B.tmp 99 PID 2864 wrote to memory of 4916 2864 A037.tmp 100 PID 2864 wrote to memory of 4916 2864 A037.tmp 100 PID 2864 wrote to memory of 4916 2864 A037.tmp 100 PID 4916 wrote to memory of 4980 4916 A1DD.tmp 101 PID 4916 wrote to memory of 4980 4916 A1DD.tmp 101 PID 4916 wrote to memory of 4980 4916 A1DD.tmp 101 PID 4980 wrote to memory of 4460 4980 A27A.tmp 102 PID 4980 wrote to memory of 4460 4980 A27A.tmp 102 PID 4980 wrote to memory of 4460 4980 A27A.tmp 102 PID 4460 wrote to memory of 2936 4460 A2E7.tmp 103 PID 4460 wrote to memory of 2936 4460 A2E7.tmp 103 PID 4460 wrote to memory of 2936 4460 A2E7.tmp 103 PID 2936 wrote to memory of 2400 2936 A364.tmp 105 PID 2936 wrote to memory of 2400 2936 A364.tmp 105 PID 2936 wrote to memory of 2400 2936 A364.tmp 105 PID 2400 wrote to memory of 4448 2400 A3E1.tmp 106 PID 2400 wrote to memory of 4448 2400 A3E1.tmp 106 PID 2400 wrote to memory of 4448 2400 A3E1.tmp 106 PID 4448 wrote to memory of 3908 4448 A45E.tmp 107 PID 4448 wrote to memory of 3908 4448 A45E.tmp 107 PID 4448 wrote to memory of 3908 4448 A45E.tmp 107 PID 3908 wrote to memory of 4432 3908 A4EB.tmp 108 PID 3908 wrote to memory of 4432 3908 A4EB.tmp 108 PID 3908 wrote to memory of 4432 3908 A4EB.tmp 108 PID 4432 wrote to memory of 4304 4432 A5A6.tmp 109 PID 4432 wrote to memory of 4304 4432 A5A6.tmp 109 PID 4432 wrote to memory of 4304 4432 A5A6.tmp 109 PID 4304 wrote to memory of 2884 4304 A633.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_1a6517ec32ad49154e5db409076fab4e_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_1a6517ec32ad49154e5db409076fab4e_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\98A6.tmp"C:\Users\Admin\AppData\Local\Temp\98A6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\9990.tmp"C:\Users\Admin\AppData\Local\Temp\9990.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\9A4C.tmp"C:\Users\Admin\AppData\Local\Temp\9A4C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\9B07.tmp"C:\Users\Admin\AppData\Local\Temp\9B07.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\9C01.tmp"C:\Users\Admin\AppData\Local\Temp\9C01.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\9CAD.tmp"C:\Users\Admin\AppData\Local\Temp\9CAD.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\9D2A.tmp"C:\Users\Admin\AppData\Local\Temp\9D2A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\9DD6.tmp"C:\Users\Admin\AppData\Local\Temp\9DD6.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\9E82.tmp"C:\Users\Admin\AppData\Local\Temp\9E82.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\9EFF.tmp"C:\Users\Admin\AppData\Local\Temp\9EFF.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\9F9B.tmp"C:\Users\Admin\AppData\Local\Temp\9F9B.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\A037.tmp"C:\Users\Admin\AppData\Local\Temp\A037.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\A1DD.tmp"C:\Users\Admin\AppData\Local\Temp\A1DD.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\A27A.tmp"C:\Users\Admin\AppData\Local\Temp\A27A.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\A2E7.tmp"C:\Users\Admin\AppData\Local\Temp\A2E7.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\A364.tmp"C:\Users\Admin\AppData\Local\Temp\A364.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\A3E1.tmp"C:\Users\Admin\AppData\Local\Temp\A3E1.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\A45E.tmp"C:\Users\Admin\AppData\Local\Temp\A45E.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\A633.tmp"C:\Users\Admin\AppData\Local\Temp\A633.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\A6B0.tmp"C:\Users\Admin\AppData\Local\Temp\A6B0.tmp"23⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\A73C.tmp"C:\Users\Admin\AppData\Local\Temp\A73C.tmp"24⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"25⤵
- Executes dropped EXE
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\A875.tmp"C:\Users\Admin\AppData\Local\Temp\A875.tmp"26⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\A8F2.tmp"C:\Users\Admin\AppData\Local\Temp\A8F2.tmp"27⤵
- Executes dropped EXE
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\A98E.tmp"C:\Users\Admin\AppData\Local\Temp\A98E.tmp"28⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\AA3A.tmp"C:\Users\Admin\AppData\Local\Temp\AA3A.tmp"29⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\AAE6.tmp"C:\Users\Admin\AppData\Local\Temp\AAE6.tmp"30⤵
- Executes dropped EXE
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\AB82.tmp"C:\Users\Admin\AppData\Local\Temp\AB82.tmp"31⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\ABFF.tmp"C:\Users\Admin\AppData\Local\Temp\ABFF.tmp"32⤵
- Executes dropped EXE
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"33⤵
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\AD09.tmp"C:\Users\Admin\AppData\Local\Temp\AD09.tmp"34⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\AD76.tmp"C:\Users\Admin\AppData\Local\Temp\AD76.tmp"35⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\ADF3.tmp"C:\Users\Admin\AppData\Local\Temp\ADF3.tmp"36⤵
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\AE80.tmp"C:\Users\Admin\AppData\Local\Temp\AE80.tmp"37⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\AF5A.tmp"C:\Users\Admin\AppData\Local\Temp\AF5A.tmp"38⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\AFE7.tmp"C:\Users\Admin\AppData\Local\Temp\AFE7.tmp"39⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\B064.tmp"C:\Users\Admin\AppData\Local\Temp\B064.tmp"40⤵
- Executes dropped EXE
PID:324 -
C:\Users\Admin\AppData\Local\Temp\B0D1.tmp"C:\Users\Admin\AppData\Local\Temp\B0D1.tmp"41⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\B13F.tmp"C:\Users\Admin\AppData\Local\Temp\B13F.tmp"42⤵
- Executes dropped EXE
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"43⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\B239.tmp"C:\Users\Admin\AppData\Local\Temp\B239.tmp"44⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\B2C5.tmp"C:\Users\Admin\AppData\Local\Temp\B2C5.tmp"45⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\B342.tmp"C:\Users\Admin\AppData\Local\Temp\B342.tmp"46⤵
- Executes dropped EXE
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"47⤵
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\B42D.tmp"C:\Users\Admin\AppData\Local\Temp\B42D.tmp"48⤵
- Executes dropped EXE
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\B4AA.tmp"C:\Users\Admin\AppData\Local\Temp\B4AA.tmp"49⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\B527.tmp"C:\Users\Admin\AppData\Local\Temp\B527.tmp"50⤵
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\B5B3.tmp"C:\Users\Admin\AppData\Local\Temp\B5B3.tmp"51⤵
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"C:\Users\Admin\AppData\Local\Temp\B6AD.tmp"52⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\B72A.tmp"C:\Users\Admin\AppData\Local\Temp\B72A.tmp"53⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\B7A7.tmp"C:\Users\Admin\AppData\Local\Temp\B7A7.tmp"54⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\B824.tmp"C:\Users\Admin\AppData\Local\Temp\B824.tmp"55⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\B892.tmp"C:\Users\Admin\AppData\Local\Temp\B892.tmp"56⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\B90F.tmp"C:\Users\Admin\AppData\Local\Temp\B90F.tmp"57⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\B99B.tmp"C:\Users\Admin\AppData\Local\Temp\B99B.tmp"58⤵
- Executes dropped EXE
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\BA18.tmp"C:\Users\Admin\AppData\Local\Temp\BA18.tmp"59⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\BA86.tmp"C:\Users\Admin\AppData\Local\Temp\BA86.tmp"60⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\BB03.tmp"C:\Users\Admin\AppData\Local\Temp\BB03.tmp"61⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\BB9F.tmp"C:\Users\Admin\AppData\Local\Temp\BB9F.tmp"62⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"63⤵
- Executes dropped EXE
PID:976 -
C:\Users\Admin\AppData\Local\Temp\BC99.tmp"C:\Users\Admin\AppData\Local\Temp\BC99.tmp"64⤵
- Executes dropped EXE
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\BD16.tmp"C:\Users\Admin\AppData\Local\Temp\BD16.tmp"65⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\BD93.tmp"C:\Users\Admin\AppData\Local\Temp\BD93.tmp"66⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\BE10.tmp"C:\Users\Admin\AppData\Local\Temp\BE10.tmp"67⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"68⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"69⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\BF97.tmp"C:\Users\Admin\AppData\Local\Temp\BF97.tmp"70⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\C014.tmp"C:\Users\Admin\AppData\Local\Temp\C014.tmp"71⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\C081.tmp"C:\Users\Admin\AppData\Local\Temp\C081.tmp"72⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\C11D.tmp"C:\Users\Admin\AppData\Local\Temp\C11D.tmp"73⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\C19A.tmp"C:\Users\Admin\AppData\Local\Temp\C19A.tmp"74⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\C1F8.tmp"C:\Users\Admin\AppData\Local\Temp\C1F8.tmp"75⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\C265.tmp"C:\Users\Admin\AppData\Local\Temp\C265.tmp"76⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\C2F2.tmp"C:\Users\Admin\AppData\Local\Temp\C2F2.tmp"77⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\C37F.tmp"C:\Users\Admin\AppData\Local\Temp\C37F.tmp"78⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"79⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\C459.tmp"C:\Users\Admin\AppData\Local\Temp\C459.tmp"80⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"81⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\C534.tmp"C:\Users\Admin\AppData\Local\Temp\C534.tmp"82⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\C592.tmp"C:\Users\Admin\AppData\Local\Temp\C592.tmp"83⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"84⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\C67C.tmp"C:\Users\Admin\AppData\Local\Temp\C67C.tmp"85⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"86⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\C796.tmp"C:\Users\Admin\AppData\Local\Temp\C796.tmp"87⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"88⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\C870.tmp"C:\Users\Admin\AppData\Local\Temp\C870.tmp"89⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"90⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\C95B.tmp"C:\Users\Admin\AppData\Local\Temp\C95B.tmp"91⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"92⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\CA45.tmp"C:\Users\Admin\AppData\Local\Temp\CA45.tmp"93⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\CAC2.tmp"C:\Users\Admin\AppData\Local\Temp\CAC2.tmp"94⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"95⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"96⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\CC29.tmp"C:\Users\Admin\AppData\Local\Temp\CC29.tmp"97⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\CCA6.tmp"C:\Users\Admin\AppData\Local\Temp\CCA6.tmp"98⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\CD33.tmp"C:\Users\Admin\AppData\Local\Temp\CD33.tmp"99⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\CDB0.tmp"C:\Users\Admin\AppData\Local\Temp\CDB0.tmp"100⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\CE2D.tmp"C:\Users\Admin\AppData\Local\Temp\CE2D.tmp"101⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\CEAA.tmp"C:\Users\Admin\AppData\Local\Temp\CEAA.tmp"102⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\CF27.tmp"C:\Users\Admin\AppData\Local\Temp\CF27.tmp"103⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\CFB4.tmp"C:\Users\Admin\AppData\Local\Temp\CFB4.tmp"104⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\D031.tmp"C:\Users\Admin\AppData\Local\Temp\D031.tmp"105⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\D09E.tmp"C:\Users\Admin\AppData\Local\Temp\D09E.tmp"106⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\D11B.tmp"C:\Users\Admin\AppData\Local\Temp\D11B.tmp"107⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\D179.tmp"C:\Users\Admin\AppData\Local\Temp\D179.tmp"108⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"C:\Users\Admin\AppData\Local\Temp\D1F6.tmp"109⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\D263.tmp"C:\Users\Admin\AppData\Local\Temp\D263.tmp"110⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"111⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\D34E.tmp"C:\Users\Admin\AppData\Local\Temp\D34E.tmp"112⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"113⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\D438.tmp"C:\Users\Admin\AppData\Local\Temp\D438.tmp"114⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\D496.tmp"C:\Users\Admin\AppData\Local\Temp\D496.tmp"115⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\D513.tmp"C:\Users\Admin\AppData\Local\Temp\D513.tmp"116⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\D590.tmp"C:\Users\Admin\AppData\Local\Temp\D590.tmp"117⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\D65B.tmp"C:\Users\Admin\AppData\Local\Temp\D65B.tmp"118⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"119⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\D774.tmp"C:\Users\Admin\AppData\Local\Temp\D774.tmp"120⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\D7F1.tmp"C:\Users\Admin\AppData\Local\Temp\D7F1.tmp"121⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\D85E.tmp"C:\Users\Admin\AppData\Local\Temp\D85E.tmp"122⤵PID:3956
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-