Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
166s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_d29d55a2cebd3082adadc10bd01f49e5_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_d29d55a2cebd3082adadc10bd01f49e5_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-07_d29d55a2cebd3082adadc10bd01f49e5_mafia_JC.exe
-
Size
486KB
-
MD5
d29d55a2cebd3082adadc10bd01f49e5
-
SHA1
56f74d1574c1ddf04dd287ccf05bc7f05cda5428
-
SHA256
c8a388a030e341e5c81120e2bcb65960ba7c84a353c9d99094787c8d2c75b82e
-
SHA512
9e478ed46b94f51b5f554149b9c3c5aa50211b6f8074450198e5e225bf6255b90fd2db8036378da0426ae0cf8e9d008d8ee4981258f118ba671c4ceea06fe78a
-
SSDEEP
12288:UU5rCOTeiDn0Bt0+5EAeX9FRHnpKkM7W9JDZKAKthNZ:UUQOJDE/EnX9nHBMKxZKFN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 392 C20.tmp 4540 D2A.tmp 4536 DF5.tmp 1844 E72.tmp 4656 F1E.tmp 4520 FBA.tmp 4188 1057.tmp 680 1112.tmp 4516 11ED.tmp 1784 126A.tmp 4000 12F6.tmp 4040 146D.tmp 3936 150A.tmp 4888 1577.tmp 2608 1604.tmp 3048 177B.tmp 1572 1884.tmp 3004 194F.tmp 864 19CC.tmp 3000 1A69.tmp 1580 1B15.tmp 4500 1B82.tmp 3084 1C1E.tmp 3960 1CBA.tmp 1856 1D86.tmp 3172 1E51.tmp 2432 1F1C.tmp 1432 1FD7.tmp 4416 2093.tmp 1820 21FA.tmp 2020 2287.tmp 4672 2381.tmp 3140 241D.tmp 2284 249A.tmp 1692 2536.tmp 3600 25C3.tmp 4640 265F.tmp 2720 26FB.tmp 3980 2788.tmp 2788 2824.tmp 3204 28E0.tmp 4308 295D.tmp 5112 29E9.tmp 3224 2A86.tmp 3292 2B12.tmp 3452 2B9F.tmp 3712 2C3B.tmp 1708 2CD7.tmp 4540 2D83.tmp 2084 2E00.tmp 3504 2E8D.tmp 1844 2F39.tmp 4788 2FB6.tmp 5116 3042.tmp 1412 30FE.tmp 1732 31AA.tmp 4436 3236.tmp 432 32C3.tmp 220 3330.tmp 2892 33AD.tmp 1612 343A.tmp 1628 34B7.tmp 4704 3544.tmp 4000 35E0.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1264 wrote to memory of 392 1264 NEAS.2023-09-07_d29d55a2cebd3082adadc10bd01f49e5_mafia_JC.exe 87 PID 1264 wrote to memory of 392 1264 NEAS.2023-09-07_d29d55a2cebd3082adadc10bd01f49e5_mafia_JC.exe 87 PID 1264 wrote to memory of 392 1264 NEAS.2023-09-07_d29d55a2cebd3082adadc10bd01f49e5_mafia_JC.exe 87 PID 392 wrote to memory of 4540 392 C20.tmp 89 PID 392 wrote to memory of 4540 392 C20.tmp 89 PID 392 wrote to memory of 4540 392 C20.tmp 89 PID 4540 wrote to memory of 4536 4540 D2A.tmp 90 PID 4540 wrote to memory of 4536 4540 D2A.tmp 90 PID 4540 wrote to memory of 4536 4540 D2A.tmp 90 PID 4536 wrote to memory of 1844 4536 DF5.tmp 91 PID 4536 wrote to memory of 1844 4536 DF5.tmp 91 PID 4536 wrote to memory of 1844 4536 DF5.tmp 91 PID 1844 wrote to memory of 4656 1844 E72.tmp 92 PID 1844 wrote to memory of 4656 1844 E72.tmp 92 PID 1844 wrote to memory of 4656 1844 E72.tmp 92 PID 4656 wrote to memory of 4520 4656 F1E.tmp 93 PID 4656 wrote to memory of 4520 4656 F1E.tmp 93 PID 4656 wrote to memory of 4520 4656 F1E.tmp 93 PID 4520 wrote to memory of 4188 4520 FBA.tmp 94 PID 4520 wrote to memory of 4188 4520 FBA.tmp 94 PID 4520 wrote to memory of 4188 4520 FBA.tmp 94 PID 4188 wrote to memory of 680 4188 1057.tmp 95 PID 4188 wrote to memory of 680 4188 1057.tmp 95 PID 4188 wrote to memory of 680 4188 1057.tmp 95 PID 680 wrote to memory of 4516 680 1112.tmp 96 PID 680 wrote to memory of 4516 680 1112.tmp 96 PID 680 wrote to memory of 4516 680 1112.tmp 96 PID 4516 wrote to memory of 1784 4516 11ED.tmp 97 PID 4516 wrote to memory of 1784 4516 11ED.tmp 97 PID 4516 wrote to memory of 1784 4516 11ED.tmp 97 PID 1784 wrote to memory of 4000 1784 126A.tmp 99 PID 1784 wrote to memory of 4000 1784 126A.tmp 99 PID 1784 wrote to memory of 4000 1784 126A.tmp 99 PID 4000 wrote to memory of 4040 4000 12F6.tmp 100 PID 4000 wrote to memory of 4040 4000 12F6.tmp 100 PID 4000 wrote to memory of 4040 4000 12F6.tmp 100 PID 4040 wrote to memory of 3936 4040 146D.tmp 101 PID 4040 wrote to memory of 3936 4040 146D.tmp 101 PID 4040 wrote to memory of 3936 4040 146D.tmp 101 PID 3936 wrote to memory of 4888 3936 150A.tmp 102 PID 3936 wrote to memory of 4888 3936 150A.tmp 102 PID 3936 wrote to memory of 4888 3936 150A.tmp 102 PID 4888 wrote to memory of 2608 4888 1577.tmp 103 PID 4888 wrote to memory of 2608 4888 1577.tmp 103 PID 4888 wrote to memory of 2608 4888 1577.tmp 103 PID 2608 wrote to memory of 3048 2608 1604.tmp 104 PID 2608 wrote to memory of 3048 2608 1604.tmp 104 PID 2608 wrote to memory of 3048 2608 1604.tmp 104 PID 3048 wrote to memory of 1572 3048 177B.tmp 106 PID 3048 wrote to memory of 1572 3048 177B.tmp 106 PID 3048 wrote to memory of 1572 3048 177B.tmp 106 PID 1572 wrote to memory of 3004 1572 1884.tmp 107 PID 1572 wrote to memory of 3004 1572 1884.tmp 107 PID 1572 wrote to memory of 3004 1572 1884.tmp 107 PID 3004 wrote to memory of 864 3004 194F.tmp 108 PID 3004 wrote to memory of 864 3004 194F.tmp 108 PID 3004 wrote to memory of 864 3004 194F.tmp 108 PID 864 wrote to memory of 3000 864 19CC.tmp 109 PID 864 wrote to memory of 3000 864 19CC.tmp 109 PID 864 wrote to memory of 3000 864 19CC.tmp 109 PID 3000 wrote to memory of 1580 3000 1A69.tmp 110 PID 3000 wrote to memory of 1580 3000 1A69.tmp 110 PID 3000 wrote to memory of 1580 3000 1A69.tmp 110 PID 1580 wrote to memory of 4500 1580 1B15.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_d29d55a2cebd3082adadc10bd01f49e5_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_d29d55a2cebd3082adadc10bd01f49e5_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\C20.tmp"C:\Users\Admin\AppData\Local\Temp\C20.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\D2A.tmp"C:\Users\Admin\AppData\Local\Temp\D2A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\DF5.tmp"C:\Users\Admin\AppData\Local\Temp\DF5.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\E72.tmp"C:\Users\Admin\AppData\Local\Temp\E72.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\F1E.tmp"C:\Users\Admin\AppData\Local\Temp\F1E.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\FBA.tmp"C:\Users\Admin\AppData\Local\Temp\FBA.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\1057.tmp"C:\Users\Admin\AppData\Local\Temp\1057.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\1112.tmp"C:\Users\Admin\AppData\Local\Temp\1112.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\11ED.tmp"C:\Users\Admin\AppData\Local\Temp\11ED.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\126A.tmp"C:\Users\Admin\AppData\Local\Temp\126A.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\12F6.tmp"C:\Users\Admin\AppData\Local\Temp\12F6.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\146D.tmp"C:\Users\Admin\AppData\Local\Temp\146D.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\150A.tmp"C:\Users\Admin\AppData\Local\Temp\150A.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\1577.tmp"C:\Users\Admin\AppData\Local\Temp\1577.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\1604.tmp"C:\Users\Admin\AppData\Local\Temp\1604.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\177B.tmp"C:\Users\Admin\AppData\Local\Temp\177B.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\1884.tmp"C:\Users\Admin\AppData\Local\Temp\1884.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\194F.tmp"C:\Users\Admin\AppData\Local\Temp\194F.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\19CC.tmp"C:\Users\Admin\AppData\Local\Temp\19CC.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\1A69.tmp"C:\Users\Admin\AppData\Local\Temp\1A69.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\1B15.tmp"C:\Users\Admin\AppData\Local\Temp\1B15.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\1B82.tmp"C:\Users\Admin\AppData\Local\Temp\1B82.tmp"23⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"24⤵
- Executes dropped EXE
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"25⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\1D86.tmp"C:\Users\Admin\AppData\Local\Temp\1D86.tmp"26⤵
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\1E51.tmp"C:\Users\Admin\AppData\Local\Temp\1E51.tmp"27⤵
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"28⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"29⤵
- Executes dropped EXE
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\2093.tmp"C:\Users\Admin\AppData\Local\Temp\2093.tmp"30⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\21FA.tmp"C:\Users\Admin\AppData\Local\Temp\21FA.tmp"31⤵
- Executes dropped EXE
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\2287.tmp"C:\Users\Admin\AppData\Local\Temp\2287.tmp"32⤵
- Executes dropped EXE
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\2381.tmp"C:\Users\Admin\AppData\Local\Temp\2381.tmp"33⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\241D.tmp"C:\Users\Admin\AppData\Local\Temp\241D.tmp"34⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\249A.tmp"C:\Users\Admin\AppData\Local\Temp\249A.tmp"35⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\2536.tmp"C:\Users\Admin\AppData\Local\Temp\2536.tmp"36⤵
- Executes dropped EXE
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\25C3.tmp"C:\Users\Admin\AppData\Local\Temp\25C3.tmp"37⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\265F.tmp"C:\Users\Admin\AppData\Local\Temp\265F.tmp"38⤵
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\26FB.tmp"C:\Users\Admin\AppData\Local\Temp\26FB.tmp"39⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\2788.tmp"C:\Users\Admin\AppData\Local\Temp\2788.tmp"40⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\2824.tmp"C:\Users\Admin\AppData\Local\Temp\2824.tmp"41⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\28E0.tmp"C:\Users\Admin\AppData\Local\Temp\28E0.tmp"42⤵
- Executes dropped EXE
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\295D.tmp"C:\Users\Admin\AppData\Local\Temp\295D.tmp"43⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\29E9.tmp"C:\Users\Admin\AppData\Local\Temp\29E9.tmp"44⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\2A86.tmp"C:\Users\Admin\AppData\Local\Temp\2A86.tmp"45⤵
- Executes dropped EXE
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\2B12.tmp"C:\Users\Admin\AppData\Local\Temp\2B12.tmp"46⤵
- Executes dropped EXE
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"47⤵
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"C:\Users\Admin\AppData\Local\Temp\2C3B.tmp"48⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"C:\Users\Admin\AppData\Local\Temp\2CD7.tmp"49⤵
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\2D83.tmp"C:\Users\Admin\AppData\Local\Temp\2D83.tmp"50⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\2E00.tmp"C:\Users\Admin\AppData\Local\Temp\2E00.tmp"51⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"C:\Users\Admin\AppData\Local\Temp\2E8D.tmp"52⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\2F39.tmp"C:\Users\Admin\AppData\Local\Temp\2F39.tmp"53⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"54⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"55⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\30FE.tmp"C:\Users\Admin\AppData\Local\Temp\30FE.tmp"56⤵
- Executes dropped EXE
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\31AA.tmp"C:\Users\Admin\AppData\Local\Temp\31AA.tmp"57⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\3236.tmp"C:\Users\Admin\AppData\Local\Temp\3236.tmp"58⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\32C3.tmp"C:\Users\Admin\AppData\Local\Temp\32C3.tmp"59⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\3330.tmp"C:\Users\Admin\AppData\Local\Temp\3330.tmp"60⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\33AD.tmp"C:\Users\Admin\AppData\Local\Temp\33AD.tmp"61⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\343A.tmp"C:\Users\Admin\AppData\Local\Temp\343A.tmp"62⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\34B7.tmp"C:\Users\Admin\AppData\Local\Temp\34B7.tmp"63⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\3544.tmp"C:\Users\Admin\AppData\Local\Temp\3544.tmp"64⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\35E0.tmp"C:\Users\Admin\AppData\Local\Temp\35E0.tmp"65⤵
- Executes dropped EXE
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\364D.tmp"C:\Users\Admin\AppData\Local\Temp\364D.tmp"66⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\36CA.tmp"C:\Users\Admin\AppData\Local\Temp\36CA.tmp"67⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"68⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\37F3.tmp"C:\Users\Admin\AppData\Local\Temp\37F3.tmp"69⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\3870.tmp"C:\Users\Admin\AppData\Local\Temp\3870.tmp"70⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\38ED.tmp"C:\Users\Admin\AppData\Local\Temp\38ED.tmp"71⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\3989.tmp"C:\Users\Admin\AppData\Local\Temp\3989.tmp"72⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\39F7.tmp"C:\Users\Admin\AppData\Local\Temp\39F7.tmp"73⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\3A83.tmp"C:\Users\Admin\AppData\Local\Temp\3A83.tmp"74⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3B10.tmp"C:\Users\Admin\AppData\Local\Temp\3B10.tmp"75⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"C:\Users\Admin\AppData\Local\Temp\3B7D.tmp"76⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"77⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\3C77.tmp"C:\Users\Admin\AppData\Local\Temp\3C77.tmp"78⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"79⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\3D71.tmp"C:\Users\Admin\AppData\Local\Temp\3D71.tmp"80⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\3DDF.tmp"C:\Users\Admin\AppData\Local\Temp\3DDF.tmp"81⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"C:\Users\Admin\AppData\Local\Temp\3E6B.tmp"82⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\3EE8.tmp"C:\Users\Admin\AppData\Local\Temp\3EE8.tmp"83⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\3F75.tmp"C:\Users\Admin\AppData\Local\Temp\3F75.tmp"84⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"85⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\407F.tmp"C:\Users\Admin\AppData\Local\Temp\407F.tmp"86⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\410B.tmp"C:\Users\Admin\AppData\Local\Temp\410B.tmp"87⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\41A8.tmp"C:\Users\Admin\AppData\Local\Temp\41A8.tmp"88⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\4244.tmp"C:\Users\Admin\AppData\Local\Temp\4244.tmp"89⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\42F0.tmp"C:\Users\Admin\AppData\Local\Temp\42F0.tmp"90⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\436D.tmp"C:\Users\Admin\AppData\Local\Temp\436D.tmp"91⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\43EA.tmp"C:\Users\Admin\AppData\Local\Temp\43EA.tmp"92⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\4447.tmp"C:\Users\Admin\AppData\Local\Temp\4447.tmp"93⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\44B5.tmp"C:\Users\Admin\AppData\Local\Temp\44B5.tmp"94⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\4522.tmp"C:\Users\Admin\AppData\Local\Temp\4522.tmp"95⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\459F.tmp"C:\Users\Admin\AppData\Local\Temp\459F.tmp"96⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\462C.tmp"C:\Users\Admin\AppData\Local\Temp\462C.tmp"97⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\46B8.tmp"C:\Users\Admin\AppData\Local\Temp\46B8.tmp"98⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\4735.tmp"C:\Users\Admin\AppData\Local\Temp\4735.tmp"99⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"100⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\484F.tmp"C:\Users\Admin\AppData\Local\Temp\484F.tmp"101⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\4F05.tmp"C:\Users\Admin\AppData\Local\Temp\4F05.tmp"102⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\4FE0.tmp"C:\Users\Admin\AppData\Local\Temp\4FE0.tmp"103⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\5C83.tmp"C:\Users\Admin\AppData\Local\Temp\5C83.tmp"104⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\5CF0.tmp"C:\Users\Admin\AppData\Local\Temp\5CF0.tmp"105⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\6F11.tmp"C:\Users\Admin\AppData\Local\Temp\6F11.tmp"106⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\7470.tmp"C:\Users\Admin\AppData\Local\Temp\7470.tmp"107⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\776D.tmp"C:\Users\Admin\AppData\Local\Temp\776D.tmp"108⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\8289.tmp"C:\Users\Admin\AppData\Local\Temp\8289.tmp"109⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\84BB.tmp"C:\Users\Admin\AppData\Local\Temp\84BB.tmp"110⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\8529.tmp"C:\Users\Admin\AppData\Local\Temp\8529.tmp"111⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\85A6.tmp"C:\Users\Admin\AppData\Local\Temp\85A6.tmp"112⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\8604.tmp"C:\Users\Admin\AppData\Local\Temp\8604.tmp"113⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\86A0.tmp"C:\Users\Admin\AppData\Local\Temp\86A0.tmp"114⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\873C.tmp"C:\Users\Admin\AppData\Local\Temp\873C.tmp"115⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\87C9.tmp"C:\Users\Admin\AppData\Local\Temp\87C9.tmp"116⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\8836.tmp"C:\Users\Admin\AppData\Local\Temp\8836.tmp"117⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\88C3.tmp"C:\Users\Admin\AppData\Local\Temp\88C3.tmp"118⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\8940.tmp"C:\Users\Admin\AppData\Local\Temp\8940.tmp"119⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\89CC.tmp"C:\Users\Admin\AppData\Local\Temp\89CC.tmp"120⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\8A49.tmp"C:\Users\Admin\AppData\Local\Temp\8A49.tmp"121⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\8AE6.tmp"C:\Users\Admin\AppData\Local\Temp\8AE6.tmp"122⤵PID:4000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-