Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_263762b3bee2ee434f8724feefc37d31_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_263762b3bee2ee434f8724feefc37d31_mafia_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-06_263762b3bee2ee434f8724feefc37d31_mafia_JC.exe
-
Size
527KB
-
MD5
263762b3bee2ee434f8724feefc37d31
-
SHA1
14c87847d2cb3ba8410ec9d2174886b92cb80b6b
-
SHA256
9f7b65783ab0765dad7bd571d87c92f91b038490b6125eb4005006119c62fb65
-
SHA512
f881c3ccf81d8a2392e84e6cc1f40bd3740dfde6146b6b4cdbe4a53bf6733694480658acacd32a91368325ee1ea26d98de90832f32336b5c6d949f3008520113
-
SSDEEP
12288:fU5rCOTeidSDeayjSAiL36tkCVPZhQpFDZu:fUQOJdCu7iLckkPcvDo
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4068 9C21.tmp 3540 9CDC.tmp 4192 9D59.tmp 3464 9DF5.tmp 3336 9E92.tmp 2720 A0D4.tmp 4860 A18F.tmp 868 A25A.tmp 2248 A2E7.tmp 3812 A4EB.tmp 2416 A5A6.tmp 2960 A623.tmp 1864 A6CF.tmp 2756 AB72.tmp 3952 AC2E.tmp 4532 ACBB.tmp 4624 AD86.tmp 2268 B035.tmp 4724 B18D.tmp 4240 B21A.tmp 1968 B297.tmp 4412 B362.tmp 4644 B42D.tmp 4132 B4D9.tmp 1872 B5A4.tmp 3000 B650.tmp 3080 B6CD.tmp 4712 B7A7.tmp 4560 B9F9.tmp 2160 BE9D.tmp 2928 C2A4.tmp 3420 C41B.tmp 5084 C4D6.tmp 2548 C60F.tmp 3644 C68C.tmp 1576 C6F9.tmp 3548 C776.tmp 872 C7F3.tmp 3628 CE1D.tmp 2612 D234.tmp 2056 D2A2.tmp 4752 D31F.tmp 3040 D5AF.tmp 1592 D61C.tmp 3812 D67A.tmp 4808 D716.tmp 4540 D7B3.tmp 2416 D84F.tmp 3008 D8DB.tmp 1352 DEB7.tmp 3272 E8D9.tmp 1360 E947.tmp 4592 E9C4.tmp 1152 EA50.tmp 2312 EAAE.tmp 4212 EB0C.tmp 1140 EB69.tmp 3604 EC63.tmp 1736 ED00.tmp 3984 ED8C.tmp 4132 EE57.tmp 4484 FC42.tmp 4568 FCFD.tmp 3424 FF01.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3920 wrote to memory of 4068 3920 NEAS.2023-09-06_263762b3bee2ee434f8724feefc37d31_mafia_JC.exe 86 PID 3920 wrote to memory of 4068 3920 NEAS.2023-09-06_263762b3bee2ee434f8724feefc37d31_mafia_JC.exe 86 PID 3920 wrote to memory of 4068 3920 NEAS.2023-09-06_263762b3bee2ee434f8724feefc37d31_mafia_JC.exe 86 PID 4068 wrote to memory of 3540 4068 9C21.tmp 87 PID 4068 wrote to memory of 3540 4068 9C21.tmp 87 PID 4068 wrote to memory of 3540 4068 9C21.tmp 87 PID 3540 wrote to memory of 4192 3540 9CDC.tmp 88 PID 3540 wrote to memory of 4192 3540 9CDC.tmp 88 PID 3540 wrote to memory of 4192 3540 9CDC.tmp 88 PID 4192 wrote to memory of 3464 4192 9D59.tmp 90 PID 4192 wrote to memory of 3464 4192 9D59.tmp 90 PID 4192 wrote to memory of 3464 4192 9D59.tmp 90 PID 3464 wrote to memory of 3336 3464 9DF5.tmp 91 PID 3464 wrote to memory of 3336 3464 9DF5.tmp 91 PID 3464 wrote to memory of 3336 3464 9DF5.tmp 91 PID 3336 wrote to memory of 2720 3336 9E92.tmp 93 PID 3336 wrote to memory of 2720 3336 9E92.tmp 93 PID 3336 wrote to memory of 2720 3336 9E92.tmp 93 PID 2720 wrote to memory of 4860 2720 A0D4.tmp 94 PID 2720 wrote to memory of 4860 2720 A0D4.tmp 94 PID 2720 wrote to memory of 4860 2720 A0D4.tmp 94 PID 4860 wrote to memory of 868 4860 A18F.tmp 95 PID 4860 wrote to memory of 868 4860 A18F.tmp 95 PID 4860 wrote to memory of 868 4860 A18F.tmp 95 PID 868 wrote to memory of 2248 868 A25A.tmp 96 PID 868 wrote to memory of 2248 868 A25A.tmp 96 PID 868 wrote to memory of 2248 868 A25A.tmp 96 PID 2248 wrote to memory of 3812 2248 A2E7.tmp 97 PID 2248 wrote to memory of 3812 2248 A2E7.tmp 97 PID 2248 wrote to memory of 3812 2248 A2E7.tmp 97 PID 3812 wrote to memory of 2416 3812 A4EB.tmp 99 PID 3812 wrote to memory of 2416 3812 A4EB.tmp 99 PID 3812 wrote to memory of 2416 3812 A4EB.tmp 99 PID 2416 wrote to memory of 2960 2416 A5A6.tmp 100 PID 2416 wrote to memory of 2960 2416 A5A6.tmp 100 PID 2416 wrote to memory of 2960 2416 A5A6.tmp 100 PID 2960 wrote to memory of 1864 2960 A623.tmp 101 PID 2960 wrote to memory of 1864 2960 A623.tmp 101 PID 2960 wrote to memory of 1864 2960 A623.tmp 101 PID 1864 wrote to memory of 2756 1864 A6CF.tmp 102 PID 1864 wrote to memory of 2756 1864 A6CF.tmp 102 PID 1864 wrote to memory of 2756 1864 A6CF.tmp 102 PID 2756 wrote to memory of 3952 2756 AB72.tmp 103 PID 2756 wrote to memory of 3952 2756 AB72.tmp 103 PID 2756 wrote to memory of 3952 2756 AB72.tmp 103 PID 3952 wrote to memory of 4532 3952 AC2E.tmp 107 PID 3952 wrote to memory of 4532 3952 AC2E.tmp 107 PID 3952 wrote to memory of 4532 3952 AC2E.tmp 107 PID 4532 wrote to memory of 4624 4532 ACBB.tmp 108 PID 4532 wrote to memory of 4624 4532 ACBB.tmp 108 PID 4532 wrote to memory of 4624 4532 ACBB.tmp 108 PID 4624 wrote to memory of 2268 4624 AD86.tmp 109 PID 4624 wrote to memory of 2268 4624 AD86.tmp 109 PID 4624 wrote to memory of 2268 4624 AD86.tmp 109 PID 2268 wrote to memory of 4724 2268 B035.tmp 112 PID 2268 wrote to memory of 4724 2268 B035.tmp 112 PID 2268 wrote to memory of 4724 2268 B035.tmp 112 PID 4724 wrote to memory of 4240 4724 B18D.tmp 113 PID 4724 wrote to memory of 4240 4724 B18D.tmp 113 PID 4724 wrote to memory of 4240 4724 B18D.tmp 113 PID 4240 wrote to memory of 1968 4240 B21A.tmp 115 PID 4240 wrote to memory of 1968 4240 B21A.tmp 115 PID 4240 wrote to memory of 1968 4240 B21A.tmp 115 PID 1968 wrote to memory of 4412 1968 B297.tmp 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_263762b3bee2ee434f8724feefc37d31_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_263762b3bee2ee434f8724feefc37d31_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\9C21.tmp"C:\Users\Admin\AppData\Local\Temp\9C21.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\9CDC.tmp"C:\Users\Admin\AppData\Local\Temp\9CDC.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\9D59.tmp"C:\Users\Admin\AppData\Local\Temp\9D59.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\9DF5.tmp"C:\Users\Admin\AppData\Local\Temp\9DF5.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\9E92.tmp"C:\Users\Admin\AppData\Local\Temp\9E92.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\A0D4.tmp"C:\Users\Admin\AppData\Local\Temp\A0D4.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\A18F.tmp"C:\Users\Admin\AppData\Local\Temp\A18F.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\A25A.tmp"C:\Users\Admin\AppData\Local\Temp\A25A.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\A2E7.tmp"C:\Users\Admin\AppData\Local\Temp\A2E7.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"C:\Users\Admin\AppData\Local\Temp\A4EB.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\A623.tmp"C:\Users\Admin\AppData\Local\Temp\A623.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\A6CF.tmp"C:\Users\Admin\AppData\Local\Temp\A6CF.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\AB72.tmp"C:\Users\Admin\AppData\Local\Temp\AB72.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\AD86.tmp"C:\Users\Admin\AppData\Local\Temp\AD86.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\B035.tmp"C:\Users\Admin\AppData\Local\Temp\B035.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\B18D.tmp"C:\Users\Admin\AppData\Local\Temp\B18D.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\B21A.tmp"C:\Users\Admin\AppData\Local\Temp\B21A.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\B297.tmp"C:\Users\Admin\AppData\Local\Temp\B297.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\B362.tmp"C:\Users\Admin\AppData\Local\Temp\B362.tmp"23⤵
- Executes dropped EXE
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\B42D.tmp"C:\Users\Admin\AppData\Local\Temp\B42D.tmp"24⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"25⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"26⤵
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\B650.tmp"C:\Users\Admin\AppData\Local\Temp\B650.tmp"27⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\B6CD.tmp"C:\Users\Admin\AppData\Local\Temp\B6CD.tmp"28⤵
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\B7A7.tmp"C:\Users\Admin\AppData\Local\Temp\B7A7.tmp"29⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\B9F9.tmp"C:\Users\Admin\AppData\Local\Temp\B9F9.tmp"30⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"31⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"32⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"33⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\C41B.tmp"C:\Users\Admin\AppData\Local\Temp\C41B.tmp"34⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"35⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\C60F.tmp"C:\Users\Admin\AppData\Local\Temp\C60F.tmp"36⤵
- Executes dropped EXE
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\C68C.tmp"C:\Users\Admin\AppData\Local\Temp\C68C.tmp"37⤵
- Executes dropped EXE
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"38⤵
- Executes dropped EXE
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\C776.tmp"C:\Users\Admin\AppData\Local\Temp\C776.tmp"39⤵
- Executes dropped EXE
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"40⤵
- Executes dropped EXE
PID:872 -
C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"41⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\D234.tmp"C:\Users\Admin\AppData\Local\Temp\D234.tmp"42⤵
- Executes dropped EXE
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\D2A2.tmp"C:\Users\Admin\AppData\Local\Temp\D2A2.tmp"43⤵
- Executes dropped EXE
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\D31F.tmp"C:\Users\Admin\AppData\Local\Temp\D31F.tmp"44⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"45⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\D61C.tmp"C:\Users\Admin\AppData\Local\Temp\D61C.tmp"46⤵
- Executes dropped EXE
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\D67A.tmp"C:\Users\Admin\AppData\Local\Temp\D67A.tmp"47⤵
- Executes dropped EXE
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\D716.tmp"C:\Users\Admin\AppData\Local\Temp\D716.tmp"48⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"49⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\D84F.tmp"C:\Users\Admin\AppData\Local\Temp\D84F.tmp"50⤵
- Executes dropped EXE
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"51⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"52⤵
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\E8D9.tmp"C:\Users\Admin\AppData\Local\Temp\E8D9.tmp"53⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\E947.tmp"C:\Users\Admin\AppData\Local\Temp\E947.tmp"54⤵
- Executes dropped EXE
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"55⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\EA50.tmp"C:\Users\Admin\AppData\Local\Temp\EA50.tmp"56⤵
- Executes dropped EXE
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"57⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"58⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\EB69.tmp"C:\Users\Admin\AppData\Local\Temp\EB69.tmp"59⤵
- Executes dropped EXE
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\EC63.tmp"C:\Users\Admin\AppData\Local\Temp\EC63.tmp"60⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\ED00.tmp"C:\Users\Admin\AppData\Local\Temp\ED00.tmp"61⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\ED8C.tmp"C:\Users\Admin\AppData\Local\Temp\ED8C.tmp"62⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\EE57.tmp"C:\Users\Admin\AppData\Local\Temp\EE57.tmp"63⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\FC42.tmp"C:\Users\Admin\AppData\Local\Temp\FC42.tmp"64⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"65⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\FF01.tmp"C:\Users\Admin\AppData\Local\Temp\FF01.tmp"66⤵
- Executes dropped EXE
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\1D0.tmp"C:\Users\Admin\AppData\Local\Temp\1D0.tmp"67⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\356.tmp"C:\Users\Admin\AppData\Local\Temp\356.tmp"68⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\4FC.tmp"C:\Users\Admin\AppData\Local\Temp\4FC.tmp"69⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\606.tmp"C:\Users\Admin\AppData\Local\Temp\606.tmp"70⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\76D.tmp"C:\Users\Admin\AppData\Local\Temp\76D.tmp"71⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\80A.tmp"C:\Users\Admin\AppData\Local\Temp\80A.tmp"72⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\932.tmp"C:\Users\Admin\AppData\Local\Temp\932.tmp"73⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\9EE.tmp"C:\Users\Admin\AppData\Local\Temp\9EE.tmp"74⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\B36.tmp"C:\Users\Admin\AppData\Local\Temp\B36.tmp"75⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\C01.tmp"C:\Users\Admin\AppData\Local\Temp\C01.tmp"76⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\C6F.tmp"C:\Users\Admin\AppData\Local\Temp\C6F.tmp"77⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\DB7.tmp"C:\Users\Admin\AppData\Local\Temp\DB7.tmp"78⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\EB1.tmp"C:\Users\Admin\AppData\Local\Temp\EB1.tmp"79⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\FBA.tmp"C:\Users\Admin\AppData\Local\Temp\FBA.tmp"80⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\1141.tmp"C:\Users\Admin\AppData\Local\Temp\1141.tmp"81⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\11DD.tmp"C:\Users\Admin\AppData\Local\Temp\11DD.tmp"82⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\1299.tmp"C:\Users\Admin\AppData\Local\Temp\1299.tmp"83⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\1364.tmp"C:\Users\Admin\AppData\Local\Temp\1364.tmp"84⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\14FA.tmp"C:\Users\Admin\AppData\Local\Temp\14FA.tmp"85⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\1807.tmp"C:\Users\Admin\AppData\Local\Temp\1807.tmp"86⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\1E31.tmp"C:\Users\Admin\AppData\Local\Temp\1E31.tmp"87⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\1F89.tmp"C:\Users\Admin\AppData\Local\Temp\1F89.tmp"88⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\23CF.tmp"C:\Users\Admin\AppData\Local\Temp\23CF.tmp"89⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\272A.tmp"C:\Users\Admin\AppData\Local\Temp\272A.tmp"90⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\2B22.tmp"C:\Users\Admin\AppData\Local\Temp\2B22.tmp"91⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"92⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"93⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\3052.tmp"C:\Users\Admin\AppData\Local\Temp\3052.tmp"94⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\315C.tmp"C:\Users\Admin\AppData\Local\Temp\315C.tmp"95⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\31D9.tmp"C:\Users\Admin\AppData\Local\Temp\31D9.tmp"96⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"97⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\368C.tmp"C:\Users\Admin\AppData\Local\Temp\368C.tmp"98⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\392C.tmp"C:\Users\Admin\AppData\Local\Temp\392C.tmp"99⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\3B00.tmp"C:\Users\Admin\AppData\Local\Temp\3B00.tmp"100⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"C:\Users\Admin\AppData\Local\Temp\3CD5.tmp"101⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"102⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\3F17.tmp"C:\Users\Admin\AppData\Local\Temp\3F17.tmp"103⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\4050.tmp"C:\Users\Admin\AppData\Local\Temp\4050.tmp"104⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\439C.tmp"C:\Users\Admin\AppData\Local\Temp\439C.tmp"105⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\4457.tmp"C:\Users\Admin\AppData\Local\Temp\4457.tmp"106⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\44D4.tmp"C:\Users\Admin\AppData\Local\Temp\44D4.tmp"107⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\4590.tmp"C:\Users\Admin\AppData\Local\Temp\4590.tmp"108⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\461C.tmp"C:\Users\Admin\AppData\Local\Temp\461C.tmp"109⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\467A.tmp"C:\Users\Admin\AppData\Local\Temp\467A.tmp"110⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\46D8.tmp"C:\Users\Admin\AppData\Local\Temp\46D8.tmp"111⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\4745.tmp"C:\Users\Admin\AppData\Local\Temp\4745.tmp"112⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\47A3.tmp"C:\Users\Admin\AppData\Local\Temp\47A3.tmp"113⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\4801.tmp"C:\Users\Admin\AppData\Local\Temp\4801.tmp"114⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\4C66.tmp"C:\Users\Admin\AppData\Local\Temp\4C66.tmp"115⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\4CE3.tmp"C:\Users\Admin\AppData\Local\Temp\4CE3.tmp"116⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\535B.tmp"C:\Users\Admin\AppData\Local\Temp\535B.tmp"117⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\582D.tmp"C:\Users\Admin\AppData\Local\Temp\582D.tmp"118⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\5EE4.tmp"C:\Users\Admin\AppData\Local\Temp\5EE4.tmp"119⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\5F42.tmp"C:\Users\Admin\AppData\Local\Temp\5F42.tmp"120⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"121⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\600D.tmp"C:\Users\Admin\AppData\Local\Temp\600D.tmp"122⤵PID:1864
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-