Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_12ce80af23da937733fd106a3f2fff46_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_12ce80af23da937733fd106a3f2fff46_mafia_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-05_12ce80af23da937733fd106a3f2fff46_mafia_JC.exe
-
Size
488KB
-
MD5
12ce80af23da937733fd106a3f2fff46
-
SHA1
06e0ea46d2d1954cc4233e42ef4767d1e9618f98
-
SHA256
a2f2295d17ca6c9555bc64afee1ed489fd7517eb1bdbcbf916499a2a539e44e8
-
SHA512
52390f346c8a61cf50272eeef37c98d12947107824f6083b38be09c6db9ad118b61e77f5c44eb96fd91c4ae4d0a5f3e30537c672a3e36d145b0692465748cce5
-
SSDEEP
12288:/U5rCOTeiDwXtQVBMMu4+G/iMNAHP5+NZ:/UQOJDutQp8iiMNAv0N
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4816 830B.tmp 4896 83D6.tmp 1180 8472.tmp 1512 855C.tmp 4524 85D9.tmp 2656 8676.tmp 5028 86F3.tmp 224 87AE.tmp 3148 8889.tmp 648 8935.tmp 5080 89A2.tmp 3848 8A2F.tmp 5040 8ABB.tmp 3288 8B38.tmp 4980 8C04.tmp 3000 8D5B.tmp 2508 8DC9.tmp 3456 8E65.tmp 4352 8EF2.tmp 4348 8FBD.tmp 2624 9059.tmp 3992 9105.tmp 4516 922E.tmp 3912 92CA.tmp 5060 9376.tmp 4540 9422.tmp 2656 94AE.tmp 4392 954B.tmp 1884 9625.tmp 4164 96E1.tmp 2988 978D.tmp 4952 9829.tmp 2776 9923.tmp 1292 99B0.tmp 448 9A3C.tmp 1032 9AC9.tmp 1588 9B65.tmp 3288 9BE2.tmp 2680 9C7E.tmp 4588 9D2A.tmp 1332 9DC6.tmp 208 9E63.tmp 3988 9EEF.tmp 4716 9F7C.tmp 4996 A018.tmp 5076 A0A5.tmp 4916 A141.tmp 3456 A1CE.tmp 4344 A25A.tmp 3216 A2D7.tmp 1684 A364.tmp 4904 A3F1.tmp 664 A49C.tmp 1048 A529.tmp 4276 A5B6.tmp 3412 A623.tmp 1564 A690.tmp 2476 A71D.tmp 3356 A7B9.tmp 984 A827.tmp 3912 A8B3.tmp 1108 A940.tmp 3320 A9CD.tmp 4540 AA59.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3356 wrote to memory of 4816 3356 NEAS.2023-09-05_12ce80af23da937733fd106a3f2fff46_mafia_JC.exe 87 PID 3356 wrote to memory of 4816 3356 NEAS.2023-09-05_12ce80af23da937733fd106a3f2fff46_mafia_JC.exe 87 PID 3356 wrote to memory of 4816 3356 NEAS.2023-09-05_12ce80af23da937733fd106a3f2fff46_mafia_JC.exe 87 PID 4816 wrote to memory of 4896 4816 830B.tmp 89 PID 4816 wrote to memory of 4896 4816 830B.tmp 89 PID 4816 wrote to memory of 4896 4816 830B.tmp 89 PID 4896 wrote to memory of 1180 4896 83D6.tmp 90 PID 4896 wrote to memory of 1180 4896 83D6.tmp 90 PID 4896 wrote to memory of 1180 4896 83D6.tmp 90 PID 1180 wrote to memory of 1512 1180 8472.tmp 92 PID 1180 wrote to memory of 1512 1180 8472.tmp 92 PID 1180 wrote to memory of 1512 1180 8472.tmp 92 PID 1512 wrote to memory of 4524 1512 855C.tmp 93 PID 1512 wrote to memory of 4524 1512 855C.tmp 93 PID 1512 wrote to memory of 4524 1512 855C.tmp 93 PID 4524 wrote to memory of 2656 4524 85D9.tmp 94 PID 4524 wrote to memory of 2656 4524 85D9.tmp 94 PID 4524 wrote to memory of 2656 4524 85D9.tmp 94 PID 2656 wrote to memory of 5028 2656 8676.tmp 95 PID 2656 wrote to memory of 5028 2656 8676.tmp 95 PID 2656 wrote to memory of 5028 2656 8676.tmp 95 PID 5028 wrote to memory of 224 5028 86F3.tmp 96 PID 5028 wrote to memory of 224 5028 86F3.tmp 96 PID 5028 wrote to memory of 224 5028 86F3.tmp 96 PID 224 wrote to memory of 3148 224 87AE.tmp 97 PID 224 wrote to memory of 3148 224 87AE.tmp 97 PID 224 wrote to memory of 3148 224 87AE.tmp 97 PID 3148 wrote to memory of 648 3148 8889.tmp 98 PID 3148 wrote to memory of 648 3148 8889.tmp 98 PID 3148 wrote to memory of 648 3148 8889.tmp 98 PID 648 wrote to memory of 5080 648 8935.tmp 99 PID 648 wrote to memory of 5080 648 8935.tmp 99 PID 648 wrote to memory of 5080 648 8935.tmp 99 PID 5080 wrote to memory of 3848 5080 89A2.tmp 100 PID 5080 wrote to memory of 3848 5080 89A2.tmp 100 PID 5080 wrote to memory of 3848 5080 89A2.tmp 100 PID 3848 wrote to memory of 5040 3848 8A2F.tmp 101 PID 3848 wrote to memory of 5040 3848 8A2F.tmp 101 PID 3848 wrote to memory of 5040 3848 8A2F.tmp 101 PID 5040 wrote to memory of 3288 5040 8ABB.tmp 102 PID 5040 wrote to memory of 3288 5040 8ABB.tmp 102 PID 5040 wrote to memory of 3288 5040 8ABB.tmp 102 PID 3288 wrote to memory of 4980 3288 8B38.tmp 104 PID 3288 wrote to memory of 4980 3288 8B38.tmp 104 PID 3288 wrote to memory of 4980 3288 8B38.tmp 104 PID 4980 wrote to memory of 3000 4980 8C04.tmp 105 PID 4980 wrote to memory of 3000 4980 8C04.tmp 105 PID 4980 wrote to memory of 3000 4980 8C04.tmp 105 PID 3000 wrote to memory of 2508 3000 8D5B.tmp 106 PID 3000 wrote to memory of 2508 3000 8D5B.tmp 106 PID 3000 wrote to memory of 2508 3000 8D5B.tmp 106 PID 2508 wrote to memory of 3456 2508 8DC9.tmp 108 PID 2508 wrote to memory of 3456 2508 8DC9.tmp 108 PID 2508 wrote to memory of 3456 2508 8DC9.tmp 108 PID 3456 wrote to memory of 4352 3456 8E65.tmp 111 PID 3456 wrote to memory of 4352 3456 8E65.tmp 111 PID 3456 wrote to memory of 4352 3456 8E65.tmp 111 PID 4352 wrote to memory of 4348 4352 8EF2.tmp 112 PID 4352 wrote to memory of 4348 4352 8EF2.tmp 112 PID 4352 wrote to memory of 4348 4352 8EF2.tmp 112 PID 4348 wrote to memory of 2624 4348 8FBD.tmp 113 PID 4348 wrote to memory of 2624 4348 8FBD.tmp 113 PID 4348 wrote to memory of 2624 4348 8FBD.tmp 113 PID 2624 wrote to memory of 3992 2624 9059.tmp 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_12ce80af23da937733fd106a3f2fff46_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_12ce80af23da937733fd106a3f2fff46_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\830B.tmp"C:\Users\Admin\AppData\Local\Temp\830B.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\83D6.tmp"C:\Users\Admin\AppData\Local\Temp\83D6.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\8472.tmp"C:\Users\Admin\AppData\Local\Temp\8472.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\855C.tmp"C:\Users\Admin\AppData\Local\Temp\855C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\85D9.tmp"C:\Users\Admin\AppData\Local\Temp\85D9.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\8676.tmp"C:\Users\Admin\AppData\Local\Temp\8676.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\86F3.tmp"C:\Users\Admin\AppData\Local\Temp\86F3.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\87AE.tmp"C:\Users\Admin\AppData\Local\Temp\87AE.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\8889.tmp"C:\Users\Admin\AppData\Local\Temp\8889.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\8935.tmp"C:\Users\Admin\AppData\Local\Temp\8935.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\89A2.tmp"C:\Users\Admin\AppData\Local\Temp\89A2.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\8A2F.tmp"C:\Users\Admin\AppData\Local\Temp\8A2F.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\8ABB.tmp"C:\Users\Admin\AppData\Local\Temp\8ABB.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\8B38.tmp"C:\Users\Admin\AppData\Local\Temp\8B38.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\8C04.tmp"C:\Users\Admin\AppData\Local\Temp\8C04.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\8D5B.tmp"C:\Users\Admin\AppData\Local\Temp\8D5B.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\8DC9.tmp"C:\Users\Admin\AppData\Local\Temp\8DC9.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\8E65.tmp"C:\Users\Admin\AppData\Local\Temp\8E65.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\8FBD.tmp"C:\Users\Admin\AppData\Local\Temp\8FBD.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\9059.tmp"C:\Users\Admin\AppData\Local\Temp\9059.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\9105.tmp"C:\Users\Admin\AppData\Local\Temp\9105.tmp"23⤵
- Executes dropped EXE
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\922E.tmp"C:\Users\Admin\AppData\Local\Temp\922E.tmp"24⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\92CA.tmp"C:\Users\Admin\AppData\Local\Temp\92CA.tmp"25⤵
- Executes dropped EXE
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\9376.tmp"C:\Users\Admin\AppData\Local\Temp\9376.tmp"26⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\9422.tmp"C:\Users\Admin\AppData\Local\Temp\9422.tmp"27⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\94AE.tmp"C:\Users\Admin\AppData\Local\Temp\94AE.tmp"28⤵
- Executes dropped EXE
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\954B.tmp"C:\Users\Admin\AppData\Local\Temp\954B.tmp"29⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\9625.tmp"C:\Users\Admin\AppData\Local\Temp\9625.tmp"30⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\96E1.tmp"C:\Users\Admin\AppData\Local\Temp\96E1.tmp"31⤵
- Executes dropped EXE
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\978D.tmp"C:\Users\Admin\AppData\Local\Temp\978D.tmp"32⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\9829.tmp"C:\Users\Admin\AppData\Local\Temp\9829.tmp"33⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\9923.tmp"C:\Users\Admin\AppData\Local\Temp\9923.tmp"34⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\99B0.tmp"C:\Users\Admin\AppData\Local\Temp\99B0.tmp"35⤵
- Executes dropped EXE
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\9A3C.tmp"C:\Users\Admin\AppData\Local\Temp\9A3C.tmp"36⤵
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\9AC9.tmp"C:\Users\Admin\AppData\Local\Temp\9AC9.tmp"37⤵
- Executes dropped EXE
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\9B65.tmp"C:\Users\Admin\AppData\Local\Temp\9B65.tmp"38⤵
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"39⤵
- Executes dropped EXE
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"40⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\9D2A.tmp"C:\Users\Admin\AppData\Local\Temp\9D2A.tmp"41⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\9DC6.tmp"C:\Users\Admin\AppData\Local\Temp\9DC6.tmp"42⤵
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\9E63.tmp"C:\Users\Admin\AppData\Local\Temp\9E63.tmp"43⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"44⤵
- Executes dropped EXE
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"45⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\A018.tmp"C:\Users\Admin\AppData\Local\Temp\A018.tmp"46⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"C:\Users\Admin\AppData\Local\Temp\A0A5.tmp"47⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\A141.tmp"C:\Users\Admin\AppData\Local\Temp\A141.tmp"48⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\A1CE.tmp"C:\Users\Admin\AppData\Local\Temp\A1CE.tmp"49⤵
- Executes dropped EXE
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\A25A.tmp"C:\Users\Admin\AppData\Local\Temp\A25A.tmp"50⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\A2D7.tmp"C:\Users\Admin\AppData\Local\Temp\A2D7.tmp"51⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\A364.tmp"C:\Users\Admin\AppData\Local\Temp\A364.tmp"52⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\A3F1.tmp"C:\Users\Admin\AppData\Local\Temp\A3F1.tmp"53⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\A49C.tmp"C:\Users\Admin\AppData\Local\Temp\A49C.tmp"54⤵
- Executes dropped EXE
PID:664 -
C:\Users\Admin\AppData\Local\Temp\A529.tmp"C:\Users\Admin\AppData\Local\Temp\A529.tmp"55⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\A5B6.tmp"C:\Users\Admin\AppData\Local\Temp\A5B6.tmp"56⤵
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\A623.tmp"C:\Users\Admin\AppData\Local\Temp\A623.tmp"57⤵
- Executes dropped EXE
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\A690.tmp"C:\Users\Admin\AppData\Local\Temp\A690.tmp"58⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\A71D.tmp"C:\Users\Admin\AppData\Local\Temp\A71D.tmp"59⤵
- Executes dropped EXE
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"60⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\A827.tmp"C:\Users\Admin\AppData\Local\Temp\A827.tmp"61⤵
- Executes dropped EXE
PID:984 -
C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"62⤵
- Executes dropped EXE
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\A940.tmp"C:\Users\Admin\AppData\Local\Temp\A940.tmp"63⤵
- Executes dropped EXE
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\A9CD.tmp"C:\Users\Admin\AppData\Local\Temp\A9CD.tmp"64⤵
- Executes dropped EXE
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\AA59.tmp"C:\Users\Admin\AppData\Local\Temp\AA59.tmp"65⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"C:\Users\Admin\AppData\Local\Temp\AAD6.tmp"66⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\AB53.tmp"C:\Users\Admin\AppData\Local\Temp\AB53.tmp"67⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\ABC1.tmp"C:\Users\Admin\AppData\Local\Temp\ABC1.tmp"68⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\AC3E.tmp"C:\Users\Admin\AppData\Local\Temp\AC3E.tmp"69⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\ACCA.tmp"C:\Users\Admin\AppData\Local\Temp\ACCA.tmp"70⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\AD57.tmp"C:\Users\Admin\AppData\Local\Temp\AD57.tmp"71⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"72⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\AE51.tmp"C:\Users\Admin\AppData\Local\Temp\AE51.tmp"73⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\AECE.tmp"C:\Users\Admin\AppData\Local\Temp\AECE.tmp"74⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"75⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"76⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\B026.tmp"C:\Users\Admin\AppData\Local\Temp\B026.tmp"77⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"78⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\B13F.tmp"C:\Users\Admin\AppData\Local\Temp\B13F.tmp"79⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"80⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\B239.tmp"C:\Users\Admin\AppData\Local\Temp\B239.tmp"81⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"82⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\B352.tmp"C:\Users\Admin\AppData\Local\Temp\B352.tmp"83⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"84⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\B44C.tmp"C:\Users\Admin\AppData\Local\Temp\B44C.tmp"85⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"86⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\B575.tmp"C:\Users\Admin\AppData\Local\Temp\B575.tmp"87⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\B602.tmp"C:\Users\Admin\AppData\Local\Temp\B602.tmp"88⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\B69E.tmp"C:\Users\Admin\AppData\Local\Temp\B69E.tmp"89⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\B73A.tmp"C:\Users\Admin\AppData\Local\Temp\B73A.tmp"90⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\B798.tmp"C:\Users\Admin\AppData\Local\Temp\B798.tmp"91⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\B7F6.tmp"C:\Users\Admin\AppData\Local\Temp\B7F6.tmp"92⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\B853.tmp"C:\Users\Admin\AppData\Local\Temp\B853.tmp"93⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"94⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\B90F.tmp"C:\Users\Admin\AppData\Local\Temp\B90F.tmp"95⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\B97C.tmp"C:\Users\Admin\AppData\Local\Temp\B97C.tmp"96⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\B9EA.tmp"C:\Users\Admin\AppData\Local\Temp\B9EA.tmp"97⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\BA47.tmp"C:\Users\Admin\AppData\Local\Temp\BA47.tmp"98⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"C:\Users\Admin\AppData\Local\Temp\BAD4.tmp"99⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\BB61.tmp"C:\Users\Admin\AppData\Local\Temp\BB61.tmp"100⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\BBED.tmp"C:\Users\Admin\AppData\Local\Temp\BBED.tmp"101⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"102⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\BFC6.tmp"C:\Users\Admin\AppData\Local\Temp\BFC6.tmp"103⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"104⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\C237.tmp"C:\Users\Admin\AppData\Local\Temp\C237.tmp"105⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\C35F.tmp"C:\Users\Admin\AppData\Local\Temp\C35F.tmp"106⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\C40B.tmp"C:\Users\Admin\AppData\Local\Temp\C40B.tmp"107⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\C67C.tmp"C:\Users\Admin\AppData\Local\Temp\C67C.tmp"108⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\C728.tmp"C:\Users\Admin\AppData\Local\Temp\C728.tmp"109⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"C:\Users\Admin\AppData\Local\Temp\C7B5.tmp"110⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\C890.tmp"C:\Users\Admin\AppData\Local\Temp\C890.tmp"111⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\C98A.tmp"C:\Users\Admin\AppData\Local\Temp\C98A.tmp"112⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\CAF1.tmp"C:\Users\Admin\AppData\Local\Temp\CAF1.tmp"113⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"114⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\CCD5.tmp"C:\Users\Admin\AppData\Local\Temp\CCD5.tmp"115⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"116⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\CFB4.tmp"C:\Users\Admin\AppData\Local\Temp\CFB4.tmp"117⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\D040.tmp"C:\Users\Admin\AppData\Local\Temp\D040.tmp"118⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"119⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\D244.tmp"C:\Users\Admin\AppData\Local\Temp\D244.tmp"120⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\D3DA.tmp"C:\Users\Admin\AppData\Local\Temp\D3DA.tmp"121⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"122⤵PID:4740
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-