Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_4d5f009c5b41ab88077bebe4c0a0d502_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_4d5f009c5b41ab88077bebe4c0a0d502_mafia_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-06_4d5f009c5b41ab88077bebe4c0a0d502_mafia_JC.exe
-
Size
486KB
-
MD5
4d5f009c5b41ab88077bebe4c0a0d502
-
SHA1
a97d0f29cae42fdba23833a7615a5504ea1e7de7
-
SHA256
f859c7661ad4c0bfdda2a7c17d9c1633118c1d697e5eef7472ba6754707407f5
-
SHA512
7ae414131b7ad85b6e0f72dce8eac8de95d83b74d61205c04dc0b1bf7cf9dd0e231818303ee5786533a4ce98ada9a6422a5dd4af6e01b2060da4d6e0917bb563
-
SSDEEP
12288:/U5rCOTeiD6fwqm07Xr+abaajtx2JnLctA7LvNZ:/UQOJDzqmW+gTRPtcN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4972 EBD7.tmp 4724 ECB2.tmp 1148 ED9C.tmp 2524 EE48.tmp 4808 EF23.tmp 392 EFFD.tmp 1792 F0E8.tmp 4940 F1D2.tmp 764 F2CC.tmp 1280 F397.tmp 1912 F424.tmp 3280 F54D.tmp 3696 F647.tmp 3364 F702.tmp 2108 F7DD.tmp 3968 F879.tmp 2340 F964.tmp 4360 FA00.tmp 1100 FB48.tmp 3880 FC13.tmp 3380 FCEE.tmp 4456 FDD8.tmp 4328 FE74.tmp 4812 FF30.tmp 2132 FFEB.tmp 2272 F5.tmp 1676 182.tmp 4512 26C.tmp 4740 366.tmp 3804 431.tmp 3544 4AE.tmp 4220 56A.tmp 2700 673.tmp 4476 710.tmp 4840 79C.tmp 4132 848.tmp 1016 8E4.tmp 3068 981.tmp 2940 A1D.tmp 1276 AA9.tmp 936 B36.tmp 1336 BC3.tmp 2564 C7E.tmp 2512 D2A.tmp 2176 DD6.tmp 2144 E82.tmp 5068 F3D.tmp 2160 FF9.tmp 3484 10A5.tmp 2268 1141.tmp 5060 11BE.tmp 1696 125A.tmp 1588 12F6.tmp 3156 13A2.tmp 3496 144E.tmp 788 14DB.tmp 4112 1587.tmp 3896 1613.tmp 4912 16BF.tmp 2928 175B.tmp 4548 17E8.tmp 3752 1846.tmp 3392 18D2.tmp 3940 197E.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4972 4236 NEAS.2023-09-06_4d5f009c5b41ab88077bebe4c0a0d502_mafia_JC.exe 80 PID 4236 wrote to memory of 4972 4236 NEAS.2023-09-06_4d5f009c5b41ab88077bebe4c0a0d502_mafia_JC.exe 80 PID 4236 wrote to memory of 4972 4236 NEAS.2023-09-06_4d5f009c5b41ab88077bebe4c0a0d502_mafia_JC.exe 80 PID 4972 wrote to memory of 4724 4972 EBD7.tmp 81 PID 4972 wrote to memory of 4724 4972 EBD7.tmp 81 PID 4972 wrote to memory of 4724 4972 EBD7.tmp 81 PID 4724 wrote to memory of 1148 4724 ECB2.tmp 82 PID 4724 wrote to memory of 1148 4724 ECB2.tmp 82 PID 4724 wrote to memory of 1148 4724 ECB2.tmp 82 PID 1148 wrote to memory of 2524 1148 ED9C.tmp 83 PID 1148 wrote to memory of 2524 1148 ED9C.tmp 83 PID 1148 wrote to memory of 2524 1148 ED9C.tmp 83 PID 2524 wrote to memory of 4808 2524 EE48.tmp 84 PID 2524 wrote to memory of 4808 2524 EE48.tmp 84 PID 2524 wrote to memory of 4808 2524 EE48.tmp 84 PID 4808 wrote to memory of 392 4808 EF23.tmp 85 PID 4808 wrote to memory of 392 4808 EF23.tmp 85 PID 4808 wrote to memory of 392 4808 EF23.tmp 85 PID 392 wrote to memory of 1792 392 EFFD.tmp 86 PID 392 wrote to memory of 1792 392 EFFD.tmp 86 PID 392 wrote to memory of 1792 392 EFFD.tmp 86 PID 1792 wrote to memory of 4940 1792 F0E8.tmp 87 PID 1792 wrote to memory of 4940 1792 F0E8.tmp 87 PID 1792 wrote to memory of 4940 1792 F0E8.tmp 87 PID 4940 wrote to memory of 764 4940 F1D2.tmp 88 PID 4940 wrote to memory of 764 4940 F1D2.tmp 88 PID 4940 wrote to memory of 764 4940 F1D2.tmp 88 PID 764 wrote to memory of 1280 764 F2CC.tmp 89 PID 764 wrote to memory of 1280 764 F2CC.tmp 89 PID 764 wrote to memory of 1280 764 F2CC.tmp 89 PID 1280 wrote to memory of 1912 1280 F397.tmp 90 PID 1280 wrote to memory of 1912 1280 F397.tmp 90 PID 1280 wrote to memory of 1912 1280 F397.tmp 90 PID 1912 wrote to memory of 3280 1912 F424.tmp 91 PID 1912 wrote to memory of 3280 1912 F424.tmp 91 PID 1912 wrote to memory of 3280 1912 F424.tmp 91 PID 3280 wrote to memory of 3696 3280 F54D.tmp 92 PID 3280 wrote to memory of 3696 3280 F54D.tmp 92 PID 3280 wrote to memory of 3696 3280 F54D.tmp 92 PID 3696 wrote to memory of 3364 3696 F647.tmp 93 PID 3696 wrote to memory of 3364 3696 F647.tmp 93 PID 3696 wrote to memory of 3364 3696 F647.tmp 93 PID 3364 wrote to memory of 2108 3364 F702.tmp 94 PID 3364 wrote to memory of 2108 3364 F702.tmp 94 PID 3364 wrote to memory of 2108 3364 F702.tmp 94 PID 2108 wrote to memory of 3968 2108 F7DD.tmp 95 PID 2108 wrote to memory of 3968 2108 F7DD.tmp 95 PID 2108 wrote to memory of 3968 2108 F7DD.tmp 95 PID 3968 wrote to memory of 2340 3968 F879.tmp 96 PID 3968 wrote to memory of 2340 3968 F879.tmp 96 PID 3968 wrote to memory of 2340 3968 F879.tmp 96 PID 2340 wrote to memory of 4360 2340 F964.tmp 97 PID 2340 wrote to memory of 4360 2340 F964.tmp 97 PID 2340 wrote to memory of 4360 2340 F964.tmp 97 PID 4360 wrote to memory of 1100 4360 FA00.tmp 98 PID 4360 wrote to memory of 1100 4360 FA00.tmp 98 PID 4360 wrote to memory of 1100 4360 FA00.tmp 98 PID 1100 wrote to memory of 3880 1100 FB48.tmp 99 PID 1100 wrote to memory of 3880 1100 FB48.tmp 99 PID 1100 wrote to memory of 3880 1100 FB48.tmp 99 PID 3880 wrote to memory of 3380 3880 FC13.tmp 100 PID 3880 wrote to memory of 3380 3880 FC13.tmp 100 PID 3880 wrote to memory of 3380 3880 FC13.tmp 100 PID 3380 wrote to memory of 4456 3380 FCEE.tmp 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_4d5f009c5b41ab88077bebe4c0a0d502_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_4d5f009c5b41ab88077bebe4c0a0d502_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"C:\Users\Admin\AppData\Local\Temp\ED9C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\EE48.tmp"C:\Users\Admin\AppData\Local\Temp\EE48.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\EF23.tmp"C:\Users\Admin\AppData\Local\Temp\EF23.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\F0E8.tmp"C:\Users\Admin\AppData\Local\Temp\F0E8.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\F1D2.tmp"C:\Users\Admin\AppData\Local\Temp\F1D2.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\F397.tmp"C:\Users\Admin\AppData\Local\Temp\F397.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\F424.tmp"C:\Users\Admin\AppData\Local\Temp\F424.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\F54D.tmp"C:\Users\Admin\AppData\Local\Temp\F54D.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\F647.tmp"C:\Users\Admin\AppData\Local\Temp\F647.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\F702.tmp"C:\Users\Admin\AppData\Local\Temp\F702.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\F879.tmp"C:\Users\Admin\AppData\Local\Temp\F879.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\F964.tmp"C:\Users\Admin\AppData\Local\Temp\F964.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\FA00.tmp"C:\Users\Admin\AppData\Local\Temp\FA00.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\FB48.tmp"C:\Users\Admin\AppData\Local\Temp\FB48.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\FC13.tmp"C:\Users\Admin\AppData\Local\Temp\FC13.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\FDD8.tmp"C:\Users\Admin\AppData\Local\Temp\FDD8.tmp"23⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\FE74.tmp"C:\Users\Admin\AppData\Local\Temp\FE74.tmp"24⤵
- Executes dropped EXE
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\FF30.tmp"C:\Users\Admin\AppData\Local\Temp\FF30.tmp"25⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\FFEB.tmp"C:\Users\Admin\AppData\Local\Temp\FFEB.tmp"26⤵
- Executes dropped EXE
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\F5.tmp"C:\Users\Admin\AppData\Local\Temp\F5.tmp"27⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\182.tmp"C:\Users\Admin\AppData\Local\Temp\182.tmp"28⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\26C.tmp"C:\Users\Admin\AppData\Local\Temp\26C.tmp"29⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\366.tmp"C:\Users\Admin\AppData\Local\Temp\366.tmp"30⤵
- Executes dropped EXE
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\431.tmp"C:\Users\Admin\AppData\Local\Temp\431.tmp"31⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\4AE.tmp"C:\Users\Admin\AppData\Local\Temp\4AE.tmp"32⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\56A.tmp"C:\Users\Admin\AppData\Local\Temp\56A.tmp"33⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\673.tmp"C:\Users\Admin\AppData\Local\Temp\673.tmp"34⤵
- Executes dropped EXE
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\710.tmp"C:\Users\Admin\AppData\Local\Temp\710.tmp"35⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\79C.tmp"C:\Users\Admin\AppData\Local\Temp\79C.tmp"36⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\848.tmp"C:\Users\Admin\AppData\Local\Temp\848.tmp"37⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\8E4.tmp"C:\Users\Admin\AppData\Local\Temp\8E4.tmp"38⤵
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\981.tmp"C:\Users\Admin\AppData\Local\Temp\981.tmp"39⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\A1D.tmp"C:\Users\Admin\AppData\Local\Temp\A1D.tmp"40⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\AA9.tmp"C:\Users\Admin\AppData\Local\Temp\AA9.tmp"41⤵
- Executes dropped EXE
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\B36.tmp"C:\Users\Admin\AppData\Local\Temp\B36.tmp"42⤵
- Executes dropped EXE
PID:936 -
C:\Users\Admin\AppData\Local\Temp\BC3.tmp"C:\Users\Admin\AppData\Local\Temp\BC3.tmp"43⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\C7E.tmp"C:\Users\Admin\AppData\Local\Temp\C7E.tmp"44⤵
- Executes dropped EXE
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\D2A.tmp"C:\Users\Admin\AppData\Local\Temp\D2A.tmp"45⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\DD6.tmp"C:\Users\Admin\AppData\Local\Temp\DD6.tmp"46⤵
- Executes dropped EXE
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\E82.tmp"C:\Users\Admin\AppData\Local\Temp\E82.tmp"47⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\F3D.tmp"C:\Users\Admin\AppData\Local\Temp\F3D.tmp"48⤵
- Executes dropped EXE
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\FF9.tmp"C:\Users\Admin\AppData\Local\Temp\FF9.tmp"49⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\10A5.tmp"C:\Users\Admin\AppData\Local\Temp\10A5.tmp"50⤵
- Executes dropped EXE
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\1141.tmp"C:\Users\Admin\AppData\Local\Temp\1141.tmp"51⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\11BE.tmp"C:\Users\Admin\AppData\Local\Temp\11BE.tmp"52⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\125A.tmp"C:\Users\Admin\AppData\Local\Temp\125A.tmp"53⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\12F6.tmp"C:\Users\Admin\AppData\Local\Temp\12F6.tmp"54⤵
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\13A2.tmp"C:\Users\Admin\AppData\Local\Temp\13A2.tmp"55⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\144E.tmp"C:\Users\Admin\AppData\Local\Temp\144E.tmp"56⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\14DB.tmp"C:\Users\Admin\AppData\Local\Temp\14DB.tmp"57⤵
- Executes dropped EXE
PID:788 -
C:\Users\Admin\AppData\Local\Temp\1587.tmp"C:\Users\Admin\AppData\Local\Temp\1587.tmp"58⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\1613.tmp"C:\Users\Admin\AppData\Local\Temp\1613.tmp"59⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\16BF.tmp"C:\Users\Admin\AppData\Local\Temp\16BF.tmp"60⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\175B.tmp"C:\Users\Admin\AppData\Local\Temp\175B.tmp"61⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\17E8.tmp"C:\Users\Admin\AppData\Local\Temp\17E8.tmp"62⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\1846.tmp"C:\Users\Admin\AppData\Local\Temp\1846.tmp"63⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\18D2.tmp"C:\Users\Admin\AppData\Local\Temp\18D2.tmp"64⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\197E.tmp"C:\Users\Admin\AppData\Local\Temp\197E.tmp"65⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\1A0B.tmp"C:\Users\Admin\AppData\Local\Temp\1A0B.tmp"66⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\1A98.tmp"C:\Users\Admin\AppData\Local\Temp\1A98.tmp"67⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\1B15.tmp"C:\Users\Admin\AppData\Local\Temp\1B15.tmp"68⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"69⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"70⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\1D18.tmp"C:\Users\Admin\AppData\Local\Temp\1D18.tmp"71⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\1D95.tmp"C:\Users\Admin\AppData\Local\Temp\1D95.tmp"72⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\1E22.tmp"C:\Users\Admin\AppData\Local\Temp\1E22.tmp"73⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\1EBE.tmp"C:\Users\Admin\AppData\Local\Temp\1EBE.tmp"74⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\1F6A.tmp"C:\Users\Admin\AppData\Local\Temp\1F6A.tmp"75⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\2025.tmp"C:\Users\Admin\AppData\Local\Temp\2025.tmp"76⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\20C2.tmp"C:\Users\Admin\AppData\Local\Temp\20C2.tmp"77⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\214E.tmp"C:\Users\Admin\AppData\Local\Temp\214E.tmp"78⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\21EB.tmp"C:\Users\Admin\AppData\Local\Temp\21EB.tmp"79⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\2296.tmp"C:\Users\Admin\AppData\Local\Temp\2296.tmp"80⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\2333.tmp"C:\Users\Admin\AppData\Local\Temp\2333.tmp"81⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\23CF.tmp"C:\Users\Admin\AppData\Local\Temp\23CF.tmp"82⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\246B.tmp"C:\Users\Admin\AppData\Local\Temp\246B.tmp"83⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\24F8.tmp"C:\Users\Admin\AppData\Local\Temp\24F8.tmp"84⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\2575.tmp"C:\Users\Admin\AppData\Local\Temp\2575.tmp"85⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\26AD.tmp"C:\Users\Admin\AppData\Local\Temp\26AD.tmp"86⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\274A.tmp"C:\Users\Admin\AppData\Local\Temp\274A.tmp"87⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\27F5.tmp"C:\Users\Admin\AppData\Local\Temp\27F5.tmp"88⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\2882.tmp"C:\Users\Admin\AppData\Local\Temp\2882.tmp"89⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\292E.tmp"C:\Users\Admin\AppData\Local\Temp\292E.tmp"90⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\29CA.tmp"C:\Users\Admin\AppData\Local\Temp\29CA.tmp"91⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\2A66.tmp"C:\Users\Admin\AppData\Local\Temp\2A66.tmp"92⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\2B03.tmp"C:\Users\Admin\AppData\Local\Temp\2B03.tmp"93⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"94⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\2C2C.tmp"C:\Users\Admin\AppData\Local\Temp\2C2C.tmp"95⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"96⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\2D54.tmp"C:\Users\Admin\AppData\Local\Temp\2D54.tmp"97⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\2DE1.tmp"C:\Users\Admin\AppData\Local\Temp\2DE1.tmp"98⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"99⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"100⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\2F87.tmp"C:\Users\Admin\AppData\Local\Temp\2F87.tmp"101⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\3023.tmp"C:\Users\Admin\AppData\Local\Temp\3023.tmp"102⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\30B0.tmp"C:\Users\Admin\AppData\Local\Temp\30B0.tmp"103⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\313C.tmp"C:\Users\Admin\AppData\Local\Temp\313C.tmp"104⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\31C9.tmp"C:\Users\Admin\AppData\Local\Temp\31C9.tmp"105⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\3294.tmp"C:\Users\Admin\AppData\Local\Temp\3294.tmp"106⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\3330.tmp"C:\Users\Admin\AppData\Local\Temp\3330.tmp"107⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"108⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\34A7.tmp"C:\Users\Admin\AppData\Local\Temp\34A7.tmp"109⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\3544.tmp"C:\Users\Admin\AppData\Local\Temp\3544.tmp"110⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"111⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\366D.tmp"C:\Users\Admin\AppData\Local\Temp\366D.tmp"112⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\3718.tmp"C:\Users\Admin\AppData\Local\Temp\3718.tmp"113⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\37A5.tmp"C:\Users\Admin\AppData\Local\Temp\37A5.tmp"114⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\3832.tmp"C:\Users\Admin\AppData\Local\Temp\3832.tmp"115⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\38BE.tmp"C:\Users\Admin\AppData\Local\Temp\38BE.tmp"116⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\395B.tmp"C:\Users\Admin\AppData\Local\Temp\395B.tmp"117⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\39D8.tmp"C:\Users\Admin\AppData\Local\Temp\39D8.tmp"118⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\3A64.tmp"C:\Users\Admin\AppData\Local\Temp\3A64.tmp"119⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"120⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\3B6E.tmp"C:\Users\Admin\AppData\Local\Temp\3B6E.tmp"121⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"122⤵PID:2940
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-