Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_a583cba57c5863e23c58c30ae93f12c2_mafia_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_a583cba57c5863e23c58c30ae93f12c2_mafia_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-06_a583cba57c5863e23c58c30ae93f12c2_mafia_JC.exe
-
Size
486KB
-
MD5
a583cba57c5863e23c58c30ae93f12c2
-
SHA1
f952fb7cfce31812fd3f6288a0ee0e25723e2594
-
SHA256
95e006d3bca5909a9052d137b25219d702a3ec9f387e7dba140c382a2f4aec80
-
SHA512
dd4f611cb26e06bd3652afc4055d5feab88c04916b556ec50547287a1cbc9ac73b31357190ecbb2187581e871a44c4d18da1aa94f705ebadcd9918a94026f2dc
-
SSDEEP
6144:Forf3lPvovsgZnqG2C7mOTeiLfD7CFTOdw5Q2Du8pA0feBeZ65B8/G6E6sH3dZ:UU5rCOTeiDkTDm24e84+ZLNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1804 D7D2.tmp 2064 D85E.tmp 5028 D90A.tmp 1956 D997.tmp 4576 DB0E.tmp 2024 DBC9.tmp 5044 E290.tmp 3628 E33C.tmp 4968 E3F7.tmp 3584 E484.tmp 1316 E530.tmp 3408 E5BC.tmp 3900 E649.tmp 2664 E6E5.tmp 2428 E7A1.tmp 4004 E82D.tmp 4852 E8F8.tmp 4664 E9A4.tmp 1396 EA31.tmp 4476 EABE.tmp 4424 EB4A.tmp 2960 EBD7.tmp 4988 EC54.tmp 4548 ED2F.tmp 2432 EDBB.tmp 316 EE96.tmp 1716 EF23.tmp 2500 EFFD.tmp 4704 F07A.tmp 4180 F107.tmp 3224 F1D2.tmp 4404 F23F.tmp 4848 F31A.tmp 5024 F388.tmp 2848 F405.tmp 4496 F472.tmp 1336 F4EF.tmp 4996 F55C.tmp 4128 F5F9.tmp 4200 F6A4.tmp 4036 F760.tmp 436 F81B.tmp 1112 F973.tmp 1332 FA0F.tmp 3372 FACB.tmp 3648 FBB5.tmp 624 FC61.tmp 1704 FCFD.tmp 3708 FDD8.tmp 3564 FE65.tmp 4508 FF5F.tmp 1972 49.tmp 4420 124.tmp 216 1C0.tmp 2852 27C.tmp 3816 366.tmp 2232 450.tmp 3532 56A.tmp 1640 654.tmp 4316 71F.tmp 4300 80A.tmp 3780 896.tmp 2348 923.tmp 4624 9AF.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4624 wrote to memory of 1804 4624 NEAS.2023-09-06_a583cba57c5863e23c58c30ae93f12c2_mafia_JC.exe 27 PID 4624 wrote to memory of 1804 4624 NEAS.2023-09-06_a583cba57c5863e23c58c30ae93f12c2_mafia_JC.exe 27 PID 4624 wrote to memory of 1804 4624 NEAS.2023-09-06_a583cba57c5863e23c58c30ae93f12c2_mafia_JC.exe 27 PID 1804 wrote to memory of 2064 1804 D7D2.tmp 24 PID 1804 wrote to memory of 2064 1804 D7D2.tmp 24 PID 1804 wrote to memory of 2064 1804 D7D2.tmp 24 PID 2064 wrote to memory of 5028 2064 D85E.tmp 26 PID 2064 wrote to memory of 5028 2064 D85E.tmp 26 PID 2064 wrote to memory of 5028 2064 D85E.tmp 26 PID 5028 wrote to memory of 1956 5028 D90A.tmp 25 PID 5028 wrote to memory of 1956 5028 D90A.tmp 25 PID 5028 wrote to memory of 1956 5028 D90A.tmp 25 PID 1956 wrote to memory of 4576 1956 D997.tmp 32 PID 1956 wrote to memory of 4576 1956 D997.tmp 32 PID 1956 wrote to memory of 4576 1956 D997.tmp 32 PID 4576 wrote to memory of 2024 4576 DB0E.tmp 74 PID 4576 wrote to memory of 2024 4576 DB0E.tmp 74 PID 4576 wrote to memory of 2024 4576 DB0E.tmp 74 PID 2024 wrote to memory of 5044 2024 DBC9.tmp 75 PID 2024 wrote to memory of 5044 2024 DBC9.tmp 75 PID 2024 wrote to memory of 5044 2024 DBC9.tmp 75 PID 5044 wrote to memory of 3628 5044 E290.tmp 76 PID 5044 wrote to memory of 3628 5044 E290.tmp 76 PID 5044 wrote to memory of 3628 5044 E290.tmp 76 PID 3628 wrote to memory of 4968 3628 E33C.tmp 77 PID 3628 wrote to memory of 4968 3628 E33C.tmp 77 PID 3628 wrote to memory of 4968 3628 E33C.tmp 77 PID 4968 wrote to memory of 3584 4968 E3F7.tmp 78 PID 4968 wrote to memory of 3584 4968 E3F7.tmp 78 PID 4968 wrote to memory of 3584 4968 E3F7.tmp 78 PID 3584 wrote to memory of 1316 3584 E484.tmp 83 PID 3584 wrote to memory of 1316 3584 E484.tmp 83 PID 3584 wrote to memory of 1316 3584 E484.tmp 83 PID 1316 wrote to memory of 3408 1316 E530.tmp 80 PID 1316 wrote to memory of 3408 1316 E530.tmp 80 PID 1316 wrote to memory of 3408 1316 E530.tmp 80 PID 3408 wrote to memory of 3900 3408 E5BC.tmp 82 PID 3408 wrote to memory of 3900 3408 E5BC.tmp 82 PID 3408 wrote to memory of 3900 3408 E5BC.tmp 82 PID 3900 wrote to memory of 2664 3900 E649.tmp 81 PID 3900 wrote to memory of 2664 3900 E649.tmp 81 PID 3900 wrote to memory of 2664 3900 E649.tmp 81 PID 2664 wrote to memory of 2428 2664 E6E5.tmp 84 PID 2664 wrote to memory of 2428 2664 E6E5.tmp 84 PID 2664 wrote to memory of 2428 2664 E6E5.tmp 84 PID 2428 wrote to memory of 4004 2428 E7A1.tmp 85 PID 2428 wrote to memory of 4004 2428 E7A1.tmp 85 PID 2428 wrote to memory of 4004 2428 E7A1.tmp 85 PID 4004 wrote to memory of 4852 4004 E82D.tmp 89 PID 4004 wrote to memory of 4852 4004 E82D.tmp 89 PID 4004 wrote to memory of 4852 4004 E82D.tmp 89 PID 4852 wrote to memory of 4664 4852 E8F8.tmp 94 PID 4852 wrote to memory of 4664 4852 E8F8.tmp 94 PID 4852 wrote to memory of 4664 4852 E8F8.tmp 94 PID 4664 wrote to memory of 1396 4664 E9A4.tmp 95 PID 4664 wrote to memory of 1396 4664 E9A4.tmp 95 PID 4664 wrote to memory of 1396 4664 E9A4.tmp 95 PID 1396 wrote to memory of 4476 1396 EA31.tmp 96 PID 1396 wrote to memory of 4476 1396 EA31.tmp 96 PID 1396 wrote to memory of 4476 1396 EA31.tmp 96 PID 4476 wrote to memory of 4424 4476 EABE.tmp 97 PID 4476 wrote to memory of 4424 4476 EABE.tmp 97 PID 4476 wrote to memory of 4424 4476 EABE.tmp 97 PID 4424 wrote to memory of 2960 4424 EB4A.tmp 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_a583cba57c5863e23c58c30ae93f12c2_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_a583cba57c5863e23c58c30ae93f12c2_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\D85E.tmp"C:\Users\Admin\AppData\Local\Temp\D85E.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\D90A.tmp"C:\Users\Admin\AppData\Local\Temp\D90A.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\D997.tmp"C:\Users\Admin\AppData\Local\Temp\D997.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\DB0E.tmp"C:\Users\Admin\AppData\Local\Temp\DB0E.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"C:\Users\Admin\AppData\Local\Temp\DBC9.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\E290.tmp"C:\Users\Admin\AppData\Local\Temp\E290.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\E33C.tmp"C:\Users\Admin\AppData\Local\Temp\E33C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\E3F7.tmp"C:\Users\Admin\AppData\Local\Temp\E3F7.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\E484.tmp"C:\Users\Admin\AppData\Local\Temp\E484.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\E530.tmp"C:\Users\Admin\AppData\Local\Temp\E530.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\E649.tmp"C:\Users\Admin\AppData\Local\Temp\E649.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"C:\Users\Admin\AppData\Local\Temp\E7A1.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\E82D.tmp"C:\Users\Admin\AppData\Local\Temp\E82D.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\E9A4.tmp"C:\Users\Admin\AppData\Local\Temp\E9A4.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\EA31.tmp"C:\Users\Admin\AppData\Local\Temp\EA31.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\EABE.tmp"C:\Users\Admin\AppData\Local\Temp\EABE.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"9⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\EC54.tmp"C:\Users\Admin\AppData\Local\Temp\EC54.tmp"10⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\ED2F.tmp"C:\Users\Admin\AppData\Local\Temp\ED2F.tmp"11⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\EDBB.tmp"C:\Users\Admin\AppData\Local\Temp\EDBB.tmp"12⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\EE96.tmp"C:\Users\Admin\AppData\Local\Temp\EE96.tmp"13⤵
- Executes dropped EXE
PID:316 -
C:\Users\Admin\AppData\Local\Temp\EF23.tmp"C:\Users\Admin\AppData\Local\Temp\EF23.tmp"14⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"15⤵
- Executes dropped EXE
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\F07A.tmp"C:\Users\Admin\AppData\Local\Temp\F07A.tmp"16⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\F107.tmp"C:\Users\Admin\AppData\Local\Temp\F107.tmp"17⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\F1D2.tmp"C:\Users\Admin\AppData\Local\Temp\F1D2.tmp"18⤵
- Executes dropped EXE
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\F23F.tmp"C:\Users\Admin\AppData\Local\Temp\F23F.tmp"19⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\F31A.tmp"C:\Users\Admin\AppData\Local\Temp\F31A.tmp"20⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\F388.tmp"C:\Users\Admin\AppData\Local\Temp\F388.tmp"21⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\F405.tmp"C:\Users\Admin\AppData\Local\Temp\F405.tmp"22⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\F472.tmp"C:\Users\Admin\AppData\Local\Temp\F472.tmp"23⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"24⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\F55C.tmp"C:\Users\Admin\AppData\Local\Temp\F55C.tmp"25⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"26⤵
- Executes dropped EXE
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"27⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\F760.tmp"C:\Users\Admin\AppData\Local\Temp\F760.tmp"28⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\F81B.tmp"C:\Users\Admin\AppData\Local\Temp\F81B.tmp"29⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\F973.tmp"C:\Users\Admin\AppData\Local\Temp\F973.tmp"30⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"31⤵
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\FACB.tmp"C:\Users\Admin\AppData\Local\Temp\FACB.tmp"32⤵
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"33⤵
- Executes dropped EXE
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\FC61.tmp"C:\Users\Admin\AppData\Local\Temp\FC61.tmp"34⤵
- Executes dropped EXE
PID:624 -
C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"35⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\FDD8.tmp"C:\Users\Admin\AppData\Local\Temp\FDD8.tmp"36⤵
- Executes dropped EXE
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\FE65.tmp"C:\Users\Admin\AppData\Local\Temp\FE65.tmp"37⤵
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"38⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\49.tmp"C:\Users\Admin\AppData\Local\Temp\49.tmp"39⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\124.tmp"C:\Users\Admin\AppData\Local\Temp\124.tmp"40⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\1C0.tmp"C:\Users\Admin\AppData\Local\Temp\1C0.tmp"41⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\27C.tmp"C:\Users\Admin\AppData\Local\Temp\27C.tmp"42⤵
- Executes dropped EXE
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\366.tmp"C:\Users\Admin\AppData\Local\Temp\366.tmp"43⤵
- Executes dropped EXE
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\450.tmp"C:\Users\Admin\AppData\Local\Temp\450.tmp"44⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\56A.tmp"C:\Users\Admin\AppData\Local\Temp\56A.tmp"45⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\654.tmp"C:\Users\Admin\AppData\Local\Temp\654.tmp"46⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\71F.tmp"C:\Users\Admin\AppData\Local\Temp\71F.tmp"47⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\80A.tmp"C:\Users\Admin\AppData\Local\Temp\80A.tmp"48⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\896.tmp"C:\Users\Admin\AppData\Local\Temp\896.tmp"49⤵
- Executes dropped EXE
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\923.tmp"C:\Users\Admin\AppData\Local\Temp\923.tmp"50⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\9AF.tmp"C:\Users\Admin\AppData\Local\Temp\9AF.tmp"51⤵
- Executes dropped EXE
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\A4C.tmp"C:\Users\Admin\AppData\Local\Temp\A4C.tmp"52⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\AF8.tmp"C:\Users\Admin\AppData\Local\Temp\AF8.tmp"53⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\B84.tmp"C:\Users\Admin\AppData\Local\Temp\B84.tmp"54⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\C11.tmp"C:\Users\Admin\AppData\Local\Temp\C11.tmp"55⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\CAD.tmp"C:\Users\Admin\AppData\Local\Temp\CAD.tmp"56⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\D49.tmp"C:\Users\Admin\AppData\Local\Temp\D49.tmp"57⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\DD6.tmp"C:\Users\Admin\AppData\Local\Temp\DD6.tmp"58⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\E53.tmp"C:\Users\Admin\AppData\Local\Temp\E53.tmp"59⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\EEF.tmp"C:\Users\Admin\AppData\Local\Temp\EEF.tmp"60⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\F8B.tmp"C:\Users\Admin\AppData\Local\Temp\F8B.tmp"61⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\1047.tmp"C:\Users\Admin\AppData\Local\Temp\1047.tmp"62⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\10D4.tmp"C:\Users\Admin\AppData\Local\Temp\10D4.tmp"63⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\119F.tmp"C:\Users\Admin\AppData\Local\Temp\119F.tmp"64⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\125A.tmp"C:\Users\Admin\AppData\Local\Temp\125A.tmp"65⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\1335.tmp"C:\Users\Admin\AppData\Local\Temp\1335.tmp"66⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\13D1.tmp"C:\Users\Admin\AppData\Local\Temp\13D1.tmp"67⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\148D.tmp"C:\Users\Admin\AppData\Local\Temp\148D.tmp"68⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\1529.tmp"C:\Users\Admin\AppData\Local\Temp\1529.tmp"69⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\15E4.tmp"C:\Users\Admin\AppData\Local\Temp\15E4.tmp"70⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\1681.tmp"C:\Users\Admin\AppData\Local\Temp\1681.tmp"71⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\171D.tmp"C:\Users\Admin\AppData\Local\Temp\171D.tmp"72⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\17B9.tmp"C:\Users\Admin\AppData\Local\Temp\17B9.tmp"73⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\1855.tmp"C:\Users\Admin\AppData\Local\Temp\1855.tmp"74⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\18F2.tmp"C:\Users\Admin\AppData\Local\Temp\18F2.tmp"75⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\19AD.tmp"C:\Users\Admin\AppData\Local\Temp\19AD.tmp"76⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\1A69.tmp"C:\Users\Admin\AppData\Local\Temp\1A69.tmp"77⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\1B15.tmp"C:\Users\Admin\AppData\Local\Temp\1B15.tmp"78⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"79⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"80⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\1D57.tmp"C:\Users\Admin\AppData\Local\Temp\1D57.tmp"81⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"82⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"83⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"84⤵PID:508
-
C:\Users\Admin\AppData\Local\Temp\1FA8.tmp"C:\Users\Admin\AppData\Local\Temp\1FA8.tmp"85⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\2054.tmp"C:\Users\Admin\AppData\Local\Temp\2054.tmp"86⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\20E1.tmp"C:\Users\Admin\AppData\Local\Temp\20E1.tmp"87⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\217D.tmp"C:\Users\Admin\AppData\Local\Temp\217D.tmp"88⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\220A.tmp"C:\Users\Admin\AppData\Local\Temp\220A.tmp"89⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\22B6.tmp"C:\Users\Admin\AppData\Local\Temp\22B6.tmp"90⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\2352.tmp"C:\Users\Admin\AppData\Local\Temp\2352.tmp"91⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\23EE.tmp"C:\Users\Admin\AppData\Local\Temp\23EE.tmp"92⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\249A.tmp"C:\Users\Admin\AppData\Local\Temp\249A.tmp"93⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\2517.tmp"C:\Users\Admin\AppData\Local\Temp\2517.tmp"94⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\2594.tmp"C:\Users\Admin\AppData\Local\Temp\2594.tmp"95⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\2630.tmp"C:\Users\Admin\AppData\Local\Temp\2630.tmp"96⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\26AD.tmp"C:\Users\Admin\AppData\Local\Temp\26AD.tmp"97⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\273A.tmp"C:\Users\Admin\AppData\Local\Temp\273A.tmp"98⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\27C7.tmp"C:\Users\Admin\AppData\Local\Temp\27C7.tmp"99⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\2844.tmp"C:\Users\Admin\AppData\Local\Temp\2844.tmp"100⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\28C1.tmp"C:\Users\Admin\AppData\Local\Temp\28C1.tmp"101⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"102⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\29CA.tmp"C:\Users\Admin\AppData\Local\Temp\29CA.tmp"103⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\2A57.tmp"C:\Users\Admin\AppData\Local\Temp\2A57.tmp"104⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\2AE3.tmp"C:\Users\Admin\AppData\Local\Temp\2AE3.tmp"105⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\2B60.tmp"C:\Users\Admin\AppData\Local\Temp\2B60.tmp"106⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"107⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\2C6A.tmp"C:\Users\Admin\AppData\Local\Temp\2C6A.tmp"108⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"109⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\2D93.tmp"C:\Users\Admin\AppData\Local\Temp\2D93.tmp"110⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"111⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\2EBC.tmp"C:\Users\Admin\AppData\Local\Temp\2EBC.tmp"112⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\2F39.tmp"C:\Users\Admin\AppData\Local\Temp\2F39.tmp"113⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\2FC5.tmp"C:\Users\Admin\AppData\Local\Temp\2FC5.tmp"114⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"115⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\30BF.tmp"C:\Users\Admin\AppData\Local\Temp\30BF.tmp"116⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\313C.tmp"C:\Users\Admin\AppData\Local\Temp\313C.tmp"117⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\31B9.tmp"C:\Users\Admin\AppData\Local\Temp\31B9.tmp"118⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\3236.tmp"C:\Users\Admin\AppData\Local\Temp\3236.tmp"119⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\32B3.tmp"C:\Users\Admin\AppData\Local\Temp\32B3.tmp"120⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\3321.tmp"C:\Users\Admin\AppData\Local\Temp\3321.tmp"121⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\33AD.tmp"C:\Users\Admin\AppData\Local\Temp\33AD.tmp"122⤵PID:3400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-