Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_aa2f4c375c69eb38cf178ac9131fc347_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_aa2f4c375c69eb38cf178ac9131fc347_mafia_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-07_aa2f4c375c69eb38cf178ac9131fc347_mafia_JC.exe
-
Size
520KB
-
MD5
aa2f4c375c69eb38cf178ac9131fc347
-
SHA1
f39e4495c1d261fea6f3623594d046b63931cb74
-
SHA256
52cc0a7f614850509d796e6eb244d50f8393efeacc2685542bf3696d5d5ccf20
-
SHA512
629986b964c87370b03e91d7b55bc501e6db1631b2b612c0f161d10bf19f12fe4b90e880c31ec054cb241be9d7cf00662c50219437dfca2938d56463619ef1fb
-
SSDEEP
6144:lLvd/XzCjUIF1UuXLyQjmOH+JjL3Fw2/d1iq7Q+FOfZFSvhTcfaaPDuqcD1r8WD+:roRXOQjmOy/V1XFCSpeaaCLD1bDLsNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1032 A558.tmp 936 A5F4.tmp 2088 A690.tmp 3540 A72D.tmp 1616 A9FB.tmp 4516 CC78.tmp 3040 CDDF.tmp 3588 CE5C.tmp 3728 CEC9.tmp 4420 CF27.tmp 992 CFF2.tmp 2104 D11B.tmp 1948 D34E.tmp 5100 D3DA.tmp 1712 D4A5.tmp 1360 D532.tmp 4972 D5DE.tmp 2128 D820.tmp 2712 D978.tmp 4592 DA04.tmp 3328 DAA1.tmp 2256 DB3D.tmp 1628 DDAE.tmp 1232 DE3A.tmp 2696 DEA8.tmp 1116 DF54.tmp 4252 E000.tmp 436 E0BB.tmp 4440 E407.tmp 3304 E4D2.tmp 2736 E56E.tmp 2524 E5EB.tmp 3540 E753.tmp 4528 E81E.tmp 1616 E985.tmp 1148 EA7F.tmp 3368 EB2B.tmp 1728 EBA8.tmp 4488 EC15.tmp 2756 ECA2.tmp 3584 ED3E.tmp 372 EDDA.tmp 684 EE67.tmp 2220 EF03.tmp 544 EFA0.tmp 1424 F02C.tmp 1132 F0B9.tmp 5112 F155.tmp 4812 F1E2.tmp 2932 F25F.tmp 3208 F2EB.tmp 2032 F388.tmp 1128 F3F5.tmp 1220 F472.tmp 2520 F4EF.tmp 2364 F58B.tmp 3968 F608.tmp 4860 F741.tmp 4796 F7BE.tmp 2720 F85A.tmp 1120 F8E7.tmp 3264 F964.tmp 4128 FA0F.tmp 436 FAAC.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4316 wrote to memory of 1032 4316 NEAS.2023-09-07_aa2f4c375c69eb38cf178ac9131fc347_mafia_JC.exe 86 PID 4316 wrote to memory of 1032 4316 NEAS.2023-09-07_aa2f4c375c69eb38cf178ac9131fc347_mafia_JC.exe 86 PID 4316 wrote to memory of 1032 4316 NEAS.2023-09-07_aa2f4c375c69eb38cf178ac9131fc347_mafia_JC.exe 86 PID 1032 wrote to memory of 936 1032 A558.tmp 88 PID 1032 wrote to memory of 936 1032 A558.tmp 88 PID 1032 wrote to memory of 936 1032 A558.tmp 88 PID 936 wrote to memory of 2088 936 A5F4.tmp 89 PID 936 wrote to memory of 2088 936 A5F4.tmp 89 PID 936 wrote to memory of 2088 936 A5F4.tmp 89 PID 2088 wrote to memory of 3540 2088 A690.tmp 91 PID 2088 wrote to memory of 3540 2088 A690.tmp 91 PID 2088 wrote to memory of 3540 2088 A690.tmp 91 PID 3540 wrote to memory of 1616 3540 A72D.tmp 92 PID 3540 wrote to memory of 1616 3540 A72D.tmp 92 PID 3540 wrote to memory of 1616 3540 A72D.tmp 92 PID 1616 wrote to memory of 4516 1616 A9FB.tmp 93 PID 1616 wrote to memory of 4516 1616 A9FB.tmp 93 PID 1616 wrote to memory of 4516 1616 A9FB.tmp 93 PID 4516 wrote to memory of 3040 4516 CC78.tmp 95 PID 4516 wrote to memory of 3040 4516 CC78.tmp 95 PID 4516 wrote to memory of 3040 4516 CC78.tmp 95 PID 3040 wrote to memory of 3588 3040 CDDF.tmp 96 PID 3040 wrote to memory of 3588 3040 CDDF.tmp 96 PID 3040 wrote to memory of 3588 3040 CDDF.tmp 96 PID 3588 wrote to memory of 3728 3588 CE5C.tmp 97 PID 3588 wrote to memory of 3728 3588 CE5C.tmp 97 PID 3588 wrote to memory of 3728 3588 CE5C.tmp 97 PID 3728 wrote to memory of 4420 3728 CEC9.tmp 98 PID 3728 wrote to memory of 4420 3728 CEC9.tmp 98 PID 3728 wrote to memory of 4420 3728 CEC9.tmp 98 PID 4420 wrote to memory of 992 4420 CF27.tmp 99 PID 4420 wrote to memory of 992 4420 CF27.tmp 99 PID 4420 wrote to memory of 992 4420 CF27.tmp 99 PID 992 wrote to memory of 2104 992 CFF2.tmp 100 PID 992 wrote to memory of 2104 992 CFF2.tmp 100 PID 992 wrote to memory of 2104 992 CFF2.tmp 100 PID 2104 wrote to memory of 1948 2104 D11B.tmp 101 PID 2104 wrote to memory of 1948 2104 D11B.tmp 101 PID 2104 wrote to memory of 1948 2104 D11B.tmp 101 PID 1948 wrote to memory of 5100 1948 D34E.tmp 102 PID 1948 wrote to memory of 5100 1948 D34E.tmp 102 PID 1948 wrote to memory of 5100 1948 D34E.tmp 102 PID 5100 wrote to memory of 1712 5100 D3DA.tmp 104 PID 5100 wrote to memory of 1712 5100 D3DA.tmp 104 PID 5100 wrote to memory of 1712 5100 D3DA.tmp 104 PID 1712 wrote to memory of 1360 1712 D4A5.tmp 105 PID 1712 wrote to memory of 1360 1712 D4A5.tmp 105 PID 1712 wrote to memory of 1360 1712 D4A5.tmp 105 PID 1360 wrote to memory of 4972 1360 D532.tmp 106 PID 1360 wrote to memory of 4972 1360 D532.tmp 106 PID 1360 wrote to memory of 4972 1360 D532.tmp 106 PID 4972 wrote to memory of 2128 4972 D5DE.tmp 107 PID 4972 wrote to memory of 2128 4972 D5DE.tmp 107 PID 4972 wrote to memory of 2128 4972 D5DE.tmp 107 PID 2128 wrote to memory of 2712 2128 D820.tmp 111 PID 2128 wrote to memory of 2712 2128 D820.tmp 111 PID 2128 wrote to memory of 2712 2128 D820.tmp 111 PID 2712 wrote to memory of 4592 2712 D978.tmp 112 PID 2712 wrote to memory of 4592 2712 D978.tmp 112 PID 2712 wrote to memory of 4592 2712 D978.tmp 112 PID 4592 wrote to memory of 3328 4592 DA04.tmp 113 PID 4592 wrote to memory of 3328 4592 DA04.tmp 113 PID 4592 wrote to memory of 3328 4592 DA04.tmp 113 PID 3328 wrote to memory of 2256 3328 DAA1.tmp 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_aa2f4c375c69eb38cf178ac9131fc347_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_aa2f4c375c69eb38cf178ac9131fc347_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\A558.tmp"C:\Users\Admin\AppData\Local\Temp\A558.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\A690.tmp"C:\Users\Admin\AppData\Local\Temp\A690.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\A72D.tmp"C:\Users\Admin\AppData\Local\Temp\A72D.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\A9FB.tmp"C:\Users\Admin\AppData\Local\Temp\A9FB.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\CC78.tmp"C:\Users\Admin\AppData\Local\Temp\CC78.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\CDDF.tmp"C:\Users\Admin\AppData\Local\Temp\CDDF.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"C:\Users\Admin\AppData\Local\Temp\CE5C.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\CEC9.tmp"C:\Users\Admin\AppData\Local\Temp\CEC9.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\CF27.tmp"C:\Users\Admin\AppData\Local\Temp\CF27.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\D11B.tmp"C:\Users\Admin\AppData\Local\Temp\D11B.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\D34E.tmp"C:\Users\Admin\AppData\Local\Temp\D34E.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\D3DA.tmp"C:\Users\Admin\AppData\Local\Temp\D3DA.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\D4A5.tmp"C:\Users\Admin\AppData\Local\Temp\D4A5.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\D532.tmp"C:\Users\Admin\AppData\Local\Temp\D532.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\D820.tmp"C:\Users\Admin\AppData\Local\Temp\D820.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\D978.tmp"C:\Users\Admin\AppData\Local\Temp\D978.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\DA04.tmp"C:\Users\Admin\AppData\Local\Temp\DA04.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\DAA1.tmp"C:\Users\Admin\AppData\Local\Temp\DAA1.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"23⤵
- Executes dropped EXE
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"24⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\DE3A.tmp"C:\Users\Admin\AppData\Local\Temp\DE3A.tmp"25⤵
- Executes dropped EXE
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\DEA8.tmp"C:\Users\Admin\AppData\Local\Temp\DEA8.tmp"26⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\DF54.tmp"C:\Users\Admin\AppData\Local\Temp\DF54.tmp"27⤵
- Executes dropped EXE
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\E000.tmp"C:\Users\Admin\AppData\Local\Temp\E000.tmp"28⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"29⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\E407.tmp"C:\Users\Admin\AppData\Local\Temp\E407.tmp"30⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"31⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\E56E.tmp"C:\Users\Admin\AppData\Local\Temp\E56E.tmp"32⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"33⤵
- Executes dropped EXE
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\E753.tmp"C:\Users\Admin\AppData\Local\Temp\E753.tmp"34⤵
- Executes dropped EXE
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\E81E.tmp"C:\Users\Admin\AppData\Local\Temp\E81E.tmp"35⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\E985.tmp"C:\Users\Admin\AppData\Local\Temp\E985.tmp"36⤵
- Executes dropped EXE
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\EA7F.tmp"C:\Users\Admin\AppData\Local\Temp\EA7F.tmp"37⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"38⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"39⤵
- Executes dropped EXE
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\EC15.tmp"C:\Users\Admin\AppData\Local\Temp\EC15.tmp"40⤵
- Executes dropped EXE
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"41⤵
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\ED3E.tmp"C:\Users\Admin\AppData\Local\Temp\ED3E.tmp"42⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"43⤵
- Executes dropped EXE
PID:372 -
C:\Users\Admin\AppData\Local\Temp\EE67.tmp"C:\Users\Admin\AppData\Local\Temp\EE67.tmp"44⤵
- Executes dropped EXE
PID:684 -
C:\Users\Admin\AppData\Local\Temp\EF03.tmp"C:\Users\Admin\AppData\Local\Temp\EF03.tmp"45⤵
- Executes dropped EXE
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\EFA0.tmp"C:\Users\Admin\AppData\Local\Temp\EFA0.tmp"46⤵
- Executes dropped EXE
PID:544 -
C:\Users\Admin\AppData\Local\Temp\F02C.tmp"C:\Users\Admin\AppData\Local\Temp\F02C.tmp"47⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\F0B9.tmp"C:\Users\Admin\AppData\Local\Temp\F0B9.tmp"48⤵
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\F155.tmp"C:\Users\Admin\AppData\Local\Temp\F155.tmp"49⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"50⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\F25F.tmp"C:\Users\Admin\AppData\Local\Temp\F25F.tmp"51⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\F2EB.tmp"C:\Users\Admin\AppData\Local\Temp\F2EB.tmp"52⤵
- Executes dropped EXE
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\F388.tmp"C:\Users\Admin\AppData\Local\Temp\F388.tmp"53⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"54⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\F472.tmp"C:\Users\Admin\AppData\Local\Temp\F472.tmp"55⤵
- Executes dropped EXE
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"56⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\F58B.tmp"C:\Users\Admin\AppData\Local\Temp\F58B.tmp"57⤵
- Executes dropped EXE
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\F608.tmp"C:\Users\Admin\AppData\Local\Temp\F608.tmp"58⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\F741.tmp"C:\Users\Admin\AppData\Local\Temp\F741.tmp"59⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"60⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\F85A.tmp"C:\Users\Admin\AppData\Local\Temp\F85A.tmp"61⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\F8E7.tmp"C:\Users\Admin\AppData\Local\Temp\F8E7.tmp"62⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\F964.tmp"C:\Users\Admin\AppData\Local\Temp\F964.tmp"63⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"64⤵
- Executes dropped EXE
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"65⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\FB29.tmp"C:\Users\Admin\AppData\Local\Temp\FB29.tmp"66⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\FDD8.tmp"C:\Users\Admin\AppData\Local\Temp\FDD8.tmp"67⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\FE55.tmp"C:\Users\Admin\AppData\Local\Temp\FE55.tmp"68⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\FED2.tmp"C:\Users\Admin\AppData\Local\Temp\FED2.tmp"69⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"70⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\2A.tmp"C:\Users\Admin\AppData\Local\Temp\2A.tmp"71⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\97.tmp"C:\Users\Admin\AppData\Local\Temp\97.tmp"72⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\347.tmp"C:\Users\Admin\AppData\Local\Temp\347.tmp"73⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\3B4.tmp"C:\Users\Admin\AppData\Local\Temp\3B4.tmp"74⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\422.tmp"C:\Users\Admin\AppData\Local\Temp\422.tmp"75⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\48F.tmp"C:\Users\Admin\AppData\Local\Temp\48F.tmp"76⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\8D5.tmp"C:\Users\Admin\AppData\Local\Temp\8D5.tmp"77⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\952.tmp"C:\Users\Admin\AppData\Local\Temp\952.tmp"78⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\9CF.tmp"C:\Users\Admin\AppData\Local\Temp\9CF.tmp"79⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\A6B.tmp"C:\Users\Admin\AppData\Local\Temp\A6B.tmp"80⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\AE8.tmp"C:\Users\Admin\AppData\Local\Temp\AE8.tmp"81⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\B75.tmp"C:\Users\Admin\AppData\Local\Temp\B75.tmp"82⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\C01.tmp"C:\Users\Admin\AppData\Local\Temp\C01.tmp"83⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\C8E.tmp"C:\Users\Admin\AppData\Local\Temp\C8E.tmp"84⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\D0B.tmp"C:\Users\Admin\AppData\Local\Temp\D0B.tmp"85⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\D97.tmp"C:\Users\Admin\AppData\Local\Temp\D97.tmp"86⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\E24.tmp"C:\Users\Admin\AppData\Local\Temp\E24.tmp"87⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\EA1.tmp"C:\Users\Admin\AppData\Local\Temp\EA1.tmp"88⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\F0E.tmp"C:\Users\Admin\AppData\Local\Temp\F0E.tmp"89⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\F7C.tmp"C:\Users\Admin\AppData\Local\Temp\F7C.tmp"90⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\FE9.tmp"C:\Users\Admin\AppData\Local\Temp\FE9.tmp"91⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\1047.tmp"C:\Users\Admin\AppData\Local\Temp\1047.tmp"92⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\10C4.tmp"C:\Users\Admin\AppData\Local\Temp\10C4.tmp"93⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\1807.tmp"C:\Users\Admin\AppData\Local\Temp\1807.tmp"94⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\1AE6.tmp"C:\Users\Admin\AppData\Local\Temp\1AE6.tmp"95⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\1B72.tmp"C:\Users\Admin\AppData\Local\Temp\1B72.tmp"96⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"97⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\1C8C.tmp"C:\Users\Admin\AppData\Local\Temp\1C8C.tmp"98⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\1D18.tmp"C:\Users\Admin\AppData\Local\Temp\1D18.tmp"99⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\1D95.tmp"C:\Users\Admin\AppData\Local\Temp\1D95.tmp"100⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\22D5.tmp"C:\Users\Admin\AppData\Local\Temp\22D5.tmp"101⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\2371.tmp"C:\Users\Admin\AppData\Local\Temp\2371.tmp"102⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\23FE.tmp"C:\Users\Admin\AppData\Local\Temp\23FE.tmp"103⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\246B.tmp"C:\Users\Admin\AppData\Local\Temp\246B.tmp"104⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\24C9.tmp"C:\Users\Admin\AppData\Local\Temp\24C9.tmp"105⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\2536.tmp"C:\Users\Admin\AppData\Local\Temp\2536.tmp"106⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\25C3.tmp"C:\Users\Admin\AppData\Local\Temp\25C3.tmp"107⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\2650.tmp"C:\Users\Admin\AppData\Local\Temp\2650.tmp"108⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\26CD.tmp"C:\Users\Admin\AppData\Local\Temp\26CD.tmp"109⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\273A.tmp"C:\Users\Admin\AppData\Local\Temp\273A.tmp"110⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\27B7.tmp"C:\Users\Admin\AppData\Local\Temp\27B7.tmp"111⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\2834.tmp"C:\Users\Admin\AppData\Local\Temp\2834.tmp"112⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"113⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\2C2C.tmp"C:\Users\Admin\AppData\Local\Temp\2C2C.tmp"114⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\2CF7.tmp"C:\Users\Admin\AppData\Local\Temp\2CF7.tmp"115⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"116⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\2E10.tmp"C:\Users\Admin\AppData\Local\Temp\2E10.tmp"117⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\2E9D.tmp"C:\Users\Admin\AppData\Local\Temp\2E9D.tmp"118⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\2F58.tmp"C:\Users\Admin\AppData\Local\Temp\2F58.tmp"119⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3004.tmp"C:\Users\Admin\AppData\Local\Temp\3004.tmp"120⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\314C.tmp"C:\Users\Admin\AppData\Local\Temp\314C.tmp"121⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\31C9.tmp"C:\Users\Admin\AppData\Local\Temp\31C9.tmp"122⤵PID:112
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-