Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_b9be844387ad05b2d19321d821483a73_mafia_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_b9be844387ad05b2d19321d821483a73_mafia_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-06_b9be844387ad05b2d19321d821483a73_mafia_JC.exe
-
Size
520KB
-
MD5
b9be844387ad05b2d19321d821483a73
-
SHA1
6f54e84b3259a3273e1947c66a25e92e96bbcdc0
-
SHA256
ae7fb8f2330fc86748339e4f453c44e9a75d6c8dcd78b3b42727013dbdf687b5
-
SHA512
ba44658b685bca2a91856464dc6205882bb40d7926526427775d1fcbbf49fd82a5fb880792ce45181c4fac981fcd1a04924cea15704133509c786a8ad738c8ab
-
SSDEEP
12288:gj8fuxR21t5i8fAnCy6CuxiA8iTtQHXP64YjUdAKNZ:gj8fuK1GYBBUsTtQHXyLjUbN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5040 9441.tmp 4380 94DD.tmp 820 9589.tmp 2144 9635.tmp 1844 9710.tmp 4532 9952.tmp 396 99EE.tmp 2504 9A7B.tmp 2964 9BA4.tmp 3552 9C4F.tmp 2520 A018.tmp 2892 A0A5.tmp 3992 A131.tmp 232 A1ED.tmp 1160 A27A.tmp 764 A2F7.tmp 1676 A364.tmp 4372 A410.tmp 3756 A4EB.tmp 4584 A587.tmp 3000 A604.tmp 4048 A6BF.tmp 3976 A74C.tmp 4256 A846.tmp 4908 A901.tmp 556 A9BD.tmp 4468 AA78.tmp 2652 AB34.tmp 2740 AC0F.tmp 1628 ACBB.tmp 4980 AD76.tmp 3532 AE03.tmp 4932 AE9F.tmp 5056 AF0C.tmp 4156 AF89.tmp 1532 B006.tmp 2484 B892.tmp 4716 B91E.tmp 3872 B99B.tmp 3292 BA76.tmp 4392 BAF3.tmp 3648 BB8F.tmp 1192 BBFD.tmp 2192 BCA9.tmp 2536 BD16.tmp 1412 BDA3.tmp 1028 BE2F.tmp 1792 BEBC.tmp 2752 BF39.tmp 2784 BFA6.tmp 4316 C033.tmp 2776 C0C0.tmp 2888 C14C.tmp 1616 C1D9.tmp 3796 C294.tmp 1744 C302.tmp 624 C38E.tmp 1960 C40B.tmp 4860 C488.tmp 1664 C515.tmp 2516 C5A2.tmp 3984 C62E.tmp 2392 C6AB.tmp 1844 C738.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 5040 1504 NEAS.2023-09-06_b9be844387ad05b2d19321d821483a73_mafia_JC.exe 82 PID 1504 wrote to memory of 5040 1504 NEAS.2023-09-06_b9be844387ad05b2d19321d821483a73_mafia_JC.exe 82 PID 1504 wrote to memory of 5040 1504 NEAS.2023-09-06_b9be844387ad05b2d19321d821483a73_mafia_JC.exe 82 PID 5040 wrote to memory of 4380 5040 9441.tmp 83 PID 5040 wrote to memory of 4380 5040 9441.tmp 83 PID 5040 wrote to memory of 4380 5040 9441.tmp 83 PID 4380 wrote to memory of 820 4380 94DD.tmp 84 PID 4380 wrote to memory of 820 4380 94DD.tmp 84 PID 4380 wrote to memory of 820 4380 94DD.tmp 84 PID 820 wrote to memory of 2144 820 9589.tmp 85 PID 820 wrote to memory of 2144 820 9589.tmp 85 PID 820 wrote to memory of 2144 820 9589.tmp 85 PID 2144 wrote to memory of 1844 2144 9635.tmp 86 PID 2144 wrote to memory of 1844 2144 9635.tmp 86 PID 2144 wrote to memory of 1844 2144 9635.tmp 86 PID 1844 wrote to memory of 4532 1844 9710.tmp 87 PID 1844 wrote to memory of 4532 1844 9710.tmp 87 PID 1844 wrote to memory of 4532 1844 9710.tmp 87 PID 4532 wrote to memory of 396 4532 9952.tmp 89 PID 4532 wrote to memory of 396 4532 9952.tmp 89 PID 4532 wrote to memory of 396 4532 9952.tmp 89 PID 396 wrote to memory of 2504 396 99EE.tmp 90 PID 396 wrote to memory of 2504 396 99EE.tmp 90 PID 396 wrote to memory of 2504 396 99EE.tmp 90 PID 2504 wrote to memory of 2964 2504 9A7B.tmp 91 PID 2504 wrote to memory of 2964 2504 9A7B.tmp 91 PID 2504 wrote to memory of 2964 2504 9A7B.tmp 91 PID 2964 wrote to memory of 3552 2964 9BA4.tmp 92 PID 2964 wrote to memory of 3552 2964 9BA4.tmp 92 PID 2964 wrote to memory of 3552 2964 9BA4.tmp 92 PID 3552 wrote to memory of 2520 3552 9C4F.tmp 93 PID 3552 wrote to memory of 2520 3552 9C4F.tmp 93 PID 3552 wrote to memory of 2520 3552 9C4F.tmp 93 PID 2520 wrote to memory of 2892 2520 A018.tmp 95 PID 2520 wrote to memory of 2892 2520 A018.tmp 95 PID 2520 wrote to memory of 2892 2520 A018.tmp 95 PID 2892 wrote to memory of 3992 2892 A0A5.tmp 96 PID 2892 wrote to memory of 3992 2892 A0A5.tmp 96 PID 2892 wrote to memory of 3992 2892 A0A5.tmp 96 PID 3992 wrote to memory of 232 3992 A131.tmp 97 PID 3992 wrote to memory of 232 3992 A131.tmp 97 PID 3992 wrote to memory of 232 3992 A131.tmp 97 PID 232 wrote to memory of 1160 232 A1ED.tmp 98 PID 232 wrote to memory of 1160 232 A1ED.tmp 98 PID 232 wrote to memory of 1160 232 A1ED.tmp 98 PID 1160 wrote to memory of 764 1160 A27A.tmp 99 PID 1160 wrote to memory of 764 1160 A27A.tmp 99 PID 1160 wrote to memory of 764 1160 A27A.tmp 99 PID 764 wrote to memory of 1676 764 A2F7.tmp 100 PID 764 wrote to memory of 1676 764 A2F7.tmp 100 PID 764 wrote to memory of 1676 764 A2F7.tmp 100 PID 1676 wrote to memory of 4372 1676 A364.tmp 101 PID 1676 wrote to memory of 4372 1676 A364.tmp 101 PID 1676 wrote to memory of 4372 1676 A364.tmp 101 PID 4372 wrote to memory of 3756 4372 A410.tmp 102 PID 4372 wrote to memory of 3756 4372 A410.tmp 102 PID 4372 wrote to memory of 3756 4372 A410.tmp 102 PID 3756 wrote to memory of 4584 3756 A4EB.tmp 103 PID 3756 wrote to memory of 4584 3756 A4EB.tmp 103 PID 3756 wrote to memory of 4584 3756 A4EB.tmp 103 PID 4584 wrote to memory of 3000 4584 A587.tmp 104 PID 4584 wrote to memory of 3000 4584 A587.tmp 104 PID 4584 wrote to memory of 3000 4584 A587.tmp 104 PID 3000 wrote to memory of 4048 3000 A604.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_b9be844387ad05b2d19321d821483a73_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_b9be844387ad05b2d19321d821483a73_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\9441.tmp"C:\Users\Admin\AppData\Local\Temp\9441.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\94DD.tmp"C:\Users\Admin\AppData\Local\Temp\94DD.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\9589.tmp"C:\Users\Admin\AppData\Local\Temp\9589.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\9635.tmp"C:\Users\Admin\AppData\Local\Temp\9635.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\9710.tmp"C:\Users\Admin\AppData\Local\Temp\9710.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\9952.tmp"C:\Users\Admin\AppData\Local\Temp\9952.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\99EE.tmp"C:\Users\Admin\AppData\Local\Temp\99EE.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\9A7B.tmp"C:\Users\Admin\AppData\Local\Temp\9A7B.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\9BA4.tmp"C:\Users\Admin\AppData\Local\Temp\9BA4.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\9C4F.tmp"C:\Users\Admin\AppData\Local\Temp\9C4F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\A018.tmp"C:\Users\Admin\AppData\Local\Temp\A018.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\A131.tmp"C:\Users\Admin\AppData\Local\Temp\A131.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\A1ED.tmp"C:\Users\Admin\AppData\Local\Temp\A1ED.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\A27A.tmp"C:\Users\Admin\AppData\Local\Temp\A27A.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\A2F7.tmp"C:\Users\Admin\AppData\Local\Temp\A2F7.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\A364.tmp"C:\Users\Admin\AppData\Local\Temp\A364.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\A410.tmp"C:\Users\Admin\AppData\Local\Temp\A410.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\A587.tmp"C:\Users\Admin\AppData\Local\Temp\A587.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\A604.tmp"C:\Users\Admin\AppData\Local\Temp\A604.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"23⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\A74C.tmp"C:\Users\Admin\AppData\Local\Temp\A74C.tmp"24⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\A846.tmp"C:\Users\Admin\AppData\Local\Temp\A846.tmp"25⤵
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\A901.tmp"C:\Users\Admin\AppData\Local\Temp\A901.tmp"26⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\A9BD.tmp"C:\Users\Admin\AppData\Local\Temp\A9BD.tmp"27⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\AA78.tmp"C:\Users\Admin\AppData\Local\Temp\AA78.tmp"28⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\AB34.tmp"C:\Users\Admin\AppData\Local\Temp\AB34.tmp"29⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"30⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"31⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\AD76.tmp"C:\Users\Admin\AppData\Local\Temp\AD76.tmp"32⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\AE03.tmp"C:\Users\Admin\AppData\Local\Temp\AE03.tmp"33⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\AE9F.tmp"C:\Users\Admin\AppData\Local\Temp\AE9F.tmp"34⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\AF0C.tmp"C:\Users\Admin\AppData\Local\Temp\AF0C.tmp"35⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\AF89.tmp"C:\Users\Admin\AppData\Local\Temp\AF89.tmp"36⤵
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\B006.tmp"C:\Users\Admin\AppData\Local\Temp\B006.tmp"37⤵
- Executes dropped EXE
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\B892.tmp"C:\Users\Admin\AppData\Local\Temp\B892.tmp"38⤵
- Executes dropped EXE
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\B91E.tmp"C:\Users\Admin\AppData\Local\Temp\B91E.tmp"39⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\B99B.tmp"C:\Users\Admin\AppData\Local\Temp\B99B.tmp"40⤵
- Executes dropped EXE
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\BA76.tmp"C:\Users\Admin\AppData\Local\Temp\BA76.tmp"41⤵
- Executes dropped EXE
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\BAF3.tmp"C:\Users\Admin\AppData\Local\Temp\BAF3.tmp"42⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"43⤵
- Executes dropped EXE
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\BBFD.tmp"C:\Users\Admin\AppData\Local\Temp\BBFD.tmp"44⤵
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\BCA9.tmp"C:\Users\Admin\AppData\Local\Temp\BCA9.tmp"45⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\BD16.tmp"C:\Users\Admin\AppData\Local\Temp\BD16.tmp"46⤵
- Executes dropped EXE
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\BDA3.tmp"C:\Users\Admin\AppData\Local\Temp\BDA3.tmp"47⤵
- Executes dropped EXE
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"48⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\BEBC.tmp"C:\Users\Admin\AppData\Local\Temp\BEBC.tmp"49⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\BF39.tmp"C:\Users\Admin\AppData\Local\Temp\BF39.tmp"50⤵
- Executes dropped EXE
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\BFA6.tmp"C:\Users\Admin\AppData\Local\Temp\BFA6.tmp"51⤵
- Executes dropped EXE
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\C033.tmp"C:\Users\Admin\AppData\Local\Temp\C033.tmp"52⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"C:\Users\Admin\AppData\Local\Temp\C0C0.tmp"53⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\C14C.tmp"C:\Users\Admin\AppData\Local\Temp\C14C.tmp"54⤵
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"55⤵
- Executes dropped EXE
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\C294.tmp"C:\Users\Admin\AppData\Local\Temp\C294.tmp"56⤵
- Executes dropped EXE
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\C302.tmp"C:\Users\Admin\AppData\Local\Temp\C302.tmp"57⤵
- Executes dropped EXE
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\C38E.tmp"C:\Users\Admin\AppData\Local\Temp\C38E.tmp"58⤵
- Executes dropped EXE
PID:624 -
C:\Users\Admin\AppData\Local\Temp\C40B.tmp"C:\Users\Admin\AppData\Local\Temp\C40B.tmp"59⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\C488.tmp"C:\Users\Admin\AppData\Local\Temp\C488.tmp"60⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\C515.tmp"C:\Users\Admin\AppData\Local\Temp\C515.tmp"61⤵
- Executes dropped EXE
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\C5A2.tmp"C:\Users\Admin\AppData\Local\Temp\C5A2.tmp"62⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\C62E.tmp"C:\Users\Admin\AppData\Local\Temp\C62E.tmp"63⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"64⤵
- Executes dropped EXE
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\C738.tmp"C:\Users\Admin\AppData\Local\Temp\C738.tmp"65⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\C7C4.tmp"C:\Users\Admin\AppData\Local\Temp\C7C4.tmp"66⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\C841.tmp"C:\Users\Admin\AppData\Local\Temp\C841.tmp"67⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"68⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\C95B.tmp"C:\Users\Admin\AppData\Local\Temp\C95B.tmp"69⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"70⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\CA64.tmp"C:\Users\Admin\AppData\Local\Temp\CA64.tmp"71⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\CAE1.tmp"C:\Users\Admin\AppData\Local\Temp\CAE1.tmp"72⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\CB6E.tmp"C:\Users\Admin\AppData\Local\Temp\CB6E.tmp"73⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\CBDB.tmp"C:\Users\Admin\AppData\Local\Temp\CBDB.tmp"74⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\CC58.tmp"C:\Users\Admin\AppData\Local\Temp\CC58.tmp"75⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\CCD5.tmp"C:\Users\Admin\AppData\Local\Temp\CCD5.tmp"76⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\CD52.tmp"C:\Users\Admin\AppData\Local\Temp\CD52.tmp"77⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\CDDF.tmp"C:\Users\Admin\AppData\Local\Temp\CDDF.tmp"78⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"79⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\D244.tmp"C:\Users\Admin\AppData\Local\Temp\D244.tmp"80⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\D2F0.tmp"C:\Users\Admin\AppData\Local\Temp\D2F0.tmp"81⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\D35D.tmp"C:\Users\Admin\AppData\Local\Temp\D35D.tmp"82⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"83⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\D486.tmp"C:\Users\Admin\AppData\Local\Temp\D486.tmp"84⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\D503.tmp"C:\Users\Admin\AppData\Local\Temp\D503.tmp"85⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\D570.tmp"C:\Users\Admin\AppData\Local\Temp\D570.tmp"86⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"87⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\D67A.tmp"C:\Users\Admin\AppData\Local\Temp\D67A.tmp"88⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\D6E7.tmp"C:\Users\Admin\AppData\Local\Temp\D6E7.tmp"89⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\D774.tmp"C:\Users\Admin\AppData\Local\Temp\D774.tmp"90⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\D801.tmp"C:\Users\Admin\AppData\Local\Temp\D801.tmp"91⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\D87E.tmp"C:\Users\Admin\AppData\Local\Temp\D87E.tmp"92⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\D91A.tmp"C:\Users\Admin\AppData\Local\Temp\D91A.tmp"93⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\D9A7.tmp"C:\Users\Admin\AppData\Local\Temp\D9A7.tmp"94⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\DA14.tmp"C:\Users\Admin\AppData\Local\Temp\DA14.tmp"95⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\DAA1.tmp"C:\Users\Admin\AppData\Local\Temp\DAA1.tmp"96⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\DB0E.tmp"C:\Users\Admin\AppData\Local\Temp\DB0E.tmp"97⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\E01F.tmp"C:\Users\Admin\AppData\Local\Temp\E01F.tmp"98⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\E09C.tmp"C:\Users\Admin\AppData\Local\Temp\E09C.tmp"99⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\E119.tmp"C:\Users\Admin\AppData\Local\Temp\E119.tmp"100⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\E1F4.tmp"C:\Users\Admin\AppData\Local\Temp\E1F4.tmp"101⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\E2DE.tmp"C:\Users\Admin\AppData\Local\Temp\E2DE.tmp"102⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\E37A.tmp"C:\Users\Admin\AppData\Local\Temp\E37A.tmp"103⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\E436.tmp"C:\Users\Admin\AppData\Local\Temp\E436.tmp"104⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\E697.tmp"C:\Users\Admin\AppData\Local\Temp\E697.tmp"105⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\E724.tmp"C:\Users\Admin\AppData\Local\Temp\E724.tmp"106⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"107⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"108⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"109⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\E985.tmp"C:\Users\Admin\AppData\Local\Temp\E985.tmp"110⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\EA50.tmp"C:\Users\Admin\AppData\Local\Temp\EA50.tmp"111⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"112⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\EB98.tmp"C:\Users\Admin\AppData\Local\Temp\EB98.tmp"113⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\EC54.tmp"C:\Users\Admin\AppData\Local\Temp\EC54.tmp"114⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"115⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"116⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"117⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\EE38.tmp"C:\Users\Admin\AppData\Local\Temp\EE38.tmp"118⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"119⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\EF32.tmp"C:\Users\Admin\AppData\Local\Temp\EF32.tmp"120⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"121⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\F00D.tmp"C:\Users\Admin\AppData\Local\Temp\F00D.tmp"122⤵PID:1412
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-