Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 18:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
55db6a7d24503a21d09df63992a790a0_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
55db6a7d24503a21d09df63992a790a0_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
55db6a7d24503a21d09df63992a790a0_mafia_JC.exe
-
Size
486KB
-
MD5
55db6a7d24503a21d09df63992a790a0
-
SHA1
ca9ed8667235069c9a5c9e109f5988ec2a1a76fe
-
SHA256
3c94cd51ac0ef3fdd909605707635fc1be48021409b3699118b501cffbdf6d37
-
SHA512
1919cce84a8175758417bfd4c63fcb60e5ba928eb9fc020f3229aec5c8493c6046964b2a2cda5cdeac85f275d7949a0b50842a24892a067779d3d098ee83522f
-
SSDEEP
12288:/U5rCOTeiDTPj0LTc/G2JKulJrfH0aalONZ:/UQOJDTPj0LTchCON
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1624 7BF6.tmp 4168 7CE1.tmp 1880 7DBB.tmp 1308 7E77.tmp 1252 7F52.tmp 2756 800D.tmp 3232 80B9.tmp 4600 8155.tmp 2712 81E2.tmp 2720 826E.tmp 1928 8349.tmp 4460 83C6.tmp 1116 84C0.tmp 4720 856C.tmp 3548 86E3.tmp 3920 877F.tmp 5036 880C.tmp 2256 88D7.tmp 1268 8973.tmp 436 8A9C.tmp 2632 8B58.tmp 2788 8C42.tmp 4272 8CFE.tmp 2020 8DA9.tmp 4788 8E36.tmp 4920 8EC3.tmp 4292 8F5F.tmp 1136 8FEC.tmp 4300 9078.tmp 2172 9134.tmp 2044 91D0.tmp 4804 925D.tmp 716 9347.tmp 1236 93C4.tmp 1604 9441.tmp 2884 94AE.tmp 1700 954B.tmp 3812 95B8.tmp 4848 9654.tmp 2084 96D1.tmp 4452 977D.tmp 3260 97EA.tmp 3344 9887.tmp 2620 9923.tmp 888 99A0.tmp 576 9A1D.tmp 4792 9AB9.tmp 900 9B55.tmp 1624 9BD2.tmp 4212 9C5F.tmp 2404 9D0B.tmp 2508 9D88.tmp 3864 9E24.tmp 1524 9EC0.tmp 1508 9F4D.tmp 1760 9FCA.tmp 1252 A057.tmp 2036 A0D4.tmp 1876 A160.tmp 2464 A1DD.tmp 1996 A26A.tmp 3016 A306.tmp 4144 A3A2.tmp 1776 A43F.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 492 wrote to memory of 1624 492 55db6a7d24503a21d09df63992a790a0_mafia_JC.exe 81 PID 492 wrote to memory of 1624 492 55db6a7d24503a21d09df63992a790a0_mafia_JC.exe 81 PID 492 wrote to memory of 1624 492 55db6a7d24503a21d09df63992a790a0_mafia_JC.exe 81 PID 1624 wrote to memory of 4168 1624 7BF6.tmp 82 PID 1624 wrote to memory of 4168 1624 7BF6.tmp 82 PID 1624 wrote to memory of 4168 1624 7BF6.tmp 82 PID 4168 wrote to memory of 1880 4168 7CE1.tmp 83 PID 4168 wrote to memory of 1880 4168 7CE1.tmp 83 PID 4168 wrote to memory of 1880 4168 7CE1.tmp 83 PID 1880 wrote to memory of 1308 1880 7DBB.tmp 84 PID 1880 wrote to memory of 1308 1880 7DBB.tmp 84 PID 1880 wrote to memory of 1308 1880 7DBB.tmp 84 PID 1308 wrote to memory of 1252 1308 7E77.tmp 85 PID 1308 wrote to memory of 1252 1308 7E77.tmp 85 PID 1308 wrote to memory of 1252 1308 7E77.tmp 85 PID 1252 wrote to memory of 2756 1252 7F52.tmp 86 PID 1252 wrote to memory of 2756 1252 7F52.tmp 86 PID 1252 wrote to memory of 2756 1252 7F52.tmp 86 PID 2756 wrote to memory of 3232 2756 800D.tmp 87 PID 2756 wrote to memory of 3232 2756 800D.tmp 87 PID 2756 wrote to memory of 3232 2756 800D.tmp 87 PID 3232 wrote to memory of 4600 3232 80B9.tmp 89 PID 3232 wrote to memory of 4600 3232 80B9.tmp 89 PID 3232 wrote to memory of 4600 3232 80B9.tmp 89 PID 4600 wrote to memory of 2712 4600 8155.tmp 90 PID 4600 wrote to memory of 2712 4600 8155.tmp 90 PID 4600 wrote to memory of 2712 4600 8155.tmp 90 PID 2712 wrote to memory of 2720 2712 81E2.tmp 91 PID 2712 wrote to memory of 2720 2712 81E2.tmp 91 PID 2712 wrote to memory of 2720 2712 81E2.tmp 91 PID 2720 wrote to memory of 1928 2720 826E.tmp 92 PID 2720 wrote to memory of 1928 2720 826E.tmp 92 PID 2720 wrote to memory of 1928 2720 826E.tmp 92 PID 1928 wrote to memory of 4460 1928 8349.tmp 93 PID 1928 wrote to memory of 4460 1928 8349.tmp 93 PID 1928 wrote to memory of 4460 1928 8349.tmp 93 PID 4460 wrote to memory of 1116 4460 83C6.tmp 94 PID 4460 wrote to memory of 1116 4460 83C6.tmp 94 PID 4460 wrote to memory of 1116 4460 83C6.tmp 94 PID 1116 wrote to memory of 4720 1116 84C0.tmp 95 PID 1116 wrote to memory of 4720 1116 84C0.tmp 95 PID 1116 wrote to memory of 4720 1116 84C0.tmp 95 PID 4720 wrote to memory of 3548 4720 856C.tmp 96 PID 4720 wrote to memory of 3548 4720 856C.tmp 96 PID 4720 wrote to memory of 3548 4720 856C.tmp 96 PID 3548 wrote to memory of 3920 3548 86E3.tmp 97 PID 3548 wrote to memory of 3920 3548 86E3.tmp 97 PID 3548 wrote to memory of 3920 3548 86E3.tmp 97 PID 3920 wrote to memory of 5036 3920 877F.tmp 98 PID 3920 wrote to memory of 5036 3920 877F.tmp 98 PID 3920 wrote to memory of 5036 3920 877F.tmp 98 PID 5036 wrote to memory of 2256 5036 880C.tmp 101 PID 5036 wrote to memory of 2256 5036 880C.tmp 101 PID 5036 wrote to memory of 2256 5036 880C.tmp 101 PID 2256 wrote to memory of 1268 2256 88D7.tmp 102 PID 2256 wrote to memory of 1268 2256 88D7.tmp 102 PID 2256 wrote to memory of 1268 2256 88D7.tmp 102 PID 1268 wrote to memory of 436 1268 8973.tmp 103 PID 1268 wrote to memory of 436 1268 8973.tmp 103 PID 1268 wrote to memory of 436 1268 8973.tmp 103 PID 436 wrote to memory of 2632 436 8A9C.tmp 104 PID 436 wrote to memory of 2632 436 8A9C.tmp 104 PID 436 wrote to memory of 2632 436 8A9C.tmp 104 PID 2632 wrote to memory of 2788 2632 8B58.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\55db6a7d24503a21d09df63992a790a0_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\55db6a7d24503a21d09df63992a790a0_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\7DBB.tmp"C:\Users\Admin\AppData\Local\Temp\7DBB.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\7E77.tmp"C:\Users\Admin\AppData\Local\Temp\7E77.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\7F52.tmp"C:\Users\Admin\AppData\Local\Temp\7F52.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\800D.tmp"C:\Users\Admin\AppData\Local\Temp\800D.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\80B9.tmp"C:\Users\Admin\AppData\Local\Temp\80B9.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\8155.tmp"C:\Users\Admin\AppData\Local\Temp\8155.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\81E2.tmp"C:\Users\Admin\AppData\Local\Temp\81E2.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\826E.tmp"C:\Users\Admin\AppData\Local\Temp\826E.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\8349.tmp"C:\Users\Admin\AppData\Local\Temp\8349.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\83C6.tmp"C:\Users\Admin\AppData\Local\Temp\83C6.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\84C0.tmp"C:\Users\Admin\AppData\Local\Temp\84C0.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\856C.tmp"C:\Users\Admin\AppData\Local\Temp\856C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\86E3.tmp"C:\Users\Admin\AppData\Local\Temp\86E3.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\877F.tmp"C:\Users\Admin\AppData\Local\Temp\877F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\880C.tmp"C:\Users\Admin\AppData\Local\Temp\880C.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\88D7.tmp"C:\Users\Admin\AppData\Local\Temp\88D7.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\8973.tmp"C:\Users\Admin\AppData\Local\Temp\8973.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\8A9C.tmp"C:\Users\Admin\AppData\Local\Temp\8A9C.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\8B58.tmp"C:\Users\Admin\AppData\Local\Temp\8B58.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\8C42.tmp"C:\Users\Admin\AppData\Local\Temp\8C42.tmp"23⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\8CFE.tmp"C:\Users\Admin\AppData\Local\Temp\8CFE.tmp"24⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\8DA9.tmp"C:\Users\Admin\AppData\Local\Temp\8DA9.tmp"25⤵
- Executes dropped EXE
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\8E36.tmp"C:\Users\Admin\AppData\Local\Temp\8E36.tmp"26⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\8EC3.tmp"C:\Users\Admin\AppData\Local\Temp\8EC3.tmp"27⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"28⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\8FEC.tmp"C:\Users\Admin\AppData\Local\Temp\8FEC.tmp"29⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\9078.tmp"C:\Users\Admin\AppData\Local\Temp\9078.tmp"30⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\9134.tmp"C:\Users\Admin\AppData\Local\Temp\9134.tmp"31⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\91D0.tmp"C:\Users\Admin\AppData\Local\Temp\91D0.tmp"32⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\925D.tmp"C:\Users\Admin\AppData\Local\Temp\925D.tmp"33⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\9347.tmp"C:\Users\Admin\AppData\Local\Temp\9347.tmp"34⤵
- Executes dropped EXE
PID:716 -
C:\Users\Admin\AppData\Local\Temp\93C4.tmp"C:\Users\Admin\AppData\Local\Temp\93C4.tmp"35⤵
- Executes dropped EXE
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\9441.tmp"C:\Users\Admin\AppData\Local\Temp\9441.tmp"36⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\94AE.tmp"C:\Users\Admin\AppData\Local\Temp\94AE.tmp"37⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\954B.tmp"C:\Users\Admin\AppData\Local\Temp\954B.tmp"38⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\95B8.tmp"C:\Users\Admin\AppData\Local\Temp\95B8.tmp"39⤵
- Executes dropped EXE
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\9654.tmp"C:\Users\Admin\AppData\Local\Temp\9654.tmp"40⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\96D1.tmp"C:\Users\Admin\AppData\Local\Temp\96D1.tmp"41⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\977D.tmp"C:\Users\Admin\AppData\Local\Temp\977D.tmp"42⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\97EA.tmp"C:\Users\Admin\AppData\Local\Temp\97EA.tmp"43⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\9887.tmp"C:\Users\Admin\AppData\Local\Temp\9887.tmp"44⤵
- Executes dropped EXE
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\9923.tmp"C:\Users\Admin\AppData\Local\Temp\9923.tmp"45⤵
- Executes dropped EXE
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\99A0.tmp"C:\Users\Admin\AppData\Local\Temp\99A0.tmp"46⤵
- Executes dropped EXE
PID:888 -
C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"47⤵
- Executes dropped EXE
PID:576 -
C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"48⤵
- Executes dropped EXE
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\9B55.tmp"C:\Users\Admin\AppData\Local\Temp\9B55.tmp"49⤵
- Executes dropped EXE
PID:900 -
C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"50⤵
- Executes dropped EXE
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\9C5F.tmp"C:\Users\Admin\AppData\Local\Temp\9C5F.tmp"51⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\9D0B.tmp"C:\Users\Admin\AppData\Local\Temp\9D0B.tmp"52⤵
- Executes dropped EXE
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\9D88.tmp"C:\Users\Admin\AppData\Local\Temp\9D88.tmp"53⤵
- Executes dropped EXE
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\9E24.tmp"C:\Users\Admin\AppData\Local\Temp\9E24.tmp"54⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"55⤵
- Executes dropped EXE
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\9F4D.tmp"C:\Users\Admin\AppData\Local\Temp\9F4D.tmp"56⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\9FCA.tmp"C:\Users\Admin\AppData\Local\Temp\9FCA.tmp"57⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\A057.tmp"C:\Users\Admin\AppData\Local\Temp\A057.tmp"58⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\A0D4.tmp"C:\Users\Admin\AppData\Local\Temp\A0D4.tmp"59⤵
- Executes dropped EXE
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\A160.tmp"C:\Users\Admin\AppData\Local\Temp\A160.tmp"60⤵
- Executes dropped EXE
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\A1DD.tmp"C:\Users\Admin\AppData\Local\Temp\A1DD.tmp"61⤵
- Executes dropped EXE
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\A26A.tmp"C:\Users\Admin\AppData\Local\Temp\A26A.tmp"62⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\A306.tmp"C:\Users\Admin\AppData\Local\Temp\A306.tmp"63⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\A3A2.tmp"C:\Users\Admin\AppData\Local\Temp\A3A2.tmp"64⤵
- Executes dropped EXE
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\A43F.tmp"C:\Users\Admin\AppData\Local\Temp\A43F.tmp"65⤵
- Executes dropped EXE
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\A4AC.tmp"C:\Users\Admin\AppData\Local\Temp\A4AC.tmp"66⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\A548.tmp"C:\Users\Admin\AppData\Local\Temp\A548.tmp"67⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\A5C5.tmp"C:\Users\Admin\AppData\Local\Temp\A5C5.tmp"68⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\A642.tmp"C:\Users\Admin\AppData\Local\Temp\A642.tmp"69⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"70⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\A71D.tmp"C:\Users\Admin\AppData\Local\Temp\A71D.tmp"71⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\A78A.tmp"C:\Users\Admin\AppData\Local\Temp\A78A.tmp"72⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"73⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\A875.tmp"C:\Users\Admin\AppData\Local\Temp\A875.tmp"74⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\A8F2.tmp"C:\Users\Admin\AppData\Local\Temp\A8F2.tmp"75⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\A96F.tmp"C:\Users\Admin\AppData\Local\Temp\A96F.tmp"76⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\A9DC.tmp"C:\Users\Admin\AppData\Local\Temp\A9DC.tmp"77⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\AA59.tmp"C:\Users\Admin\AppData\Local\Temp\AA59.tmp"78⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\AAE6.tmp"C:\Users\Admin\AppData\Local\Temp\AAE6.tmp"79⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\AB44.tmp"C:\Users\Admin\AppData\Local\Temp\AB44.tmp"80⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\ABA1.tmp"C:\Users\Admin\AppData\Local\Temp\ABA1.tmp"81⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"82⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\AC7C.tmp"C:\Users\Admin\AppData\Local\Temp\AC7C.tmp"83⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\ACE9.tmp"C:\Users\Admin\AppData\Local\Temp\ACE9.tmp"84⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\AD66.tmp"C:\Users\Admin\AppData\Local\Temp\AD66.tmp"85⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\AE03.tmp"C:\Users\Admin\AppData\Local\Temp\AE03.tmp"86⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\AE80.tmp"C:\Users\Admin\AppData\Local\Temp\AE80.tmp"87⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\AEED.tmp"C:\Users\Admin\AppData\Local\Temp\AEED.tmp"88⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\AF7A.tmp"C:\Users\Admin\AppData\Local\Temp\AF7A.tmp"89⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\AFE7.tmp"C:\Users\Admin\AppData\Local\Temp\AFE7.tmp"90⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\B054.tmp"C:\Users\Admin\AppData\Local\Temp\B054.tmp"91⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\B0B2.tmp"C:\Users\Admin\AppData\Local\Temp\B0B2.tmp"92⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\B120.tmp"C:\Users\Admin\AppData\Local\Temp\B120.tmp"93⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\B19D.tmp"C:\Users\Admin\AppData\Local\Temp\B19D.tmp"94⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\B1FA.tmp"C:\Users\Admin\AppData\Local\Temp\B1FA.tmp"95⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\B258.tmp"C:\Users\Admin\AppData\Local\Temp\B258.tmp"96⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\B2B6.tmp"C:\Users\Admin\AppData\Local\Temp\B2B6.tmp"97⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\B342.tmp"C:\Users\Admin\AppData\Local\Temp\B342.tmp"98⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"99⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\B45C.tmp"C:\Users\Admin\AppData\Local\Temp\B45C.tmp"100⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"101⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\B585.tmp"C:\Users\Admin\AppData\Local\Temp\B585.tmp"102⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\B602.tmp"C:\Users\Admin\AppData\Local\Temp\B602.tmp"103⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\B67F.tmp"C:\Users\Admin\AppData\Local\Temp\B67F.tmp"104⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\B71B.tmp"C:\Users\Admin\AppData\Local\Temp\B71B.tmp"105⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\B7B7.tmp"C:\Users\Admin\AppData\Local\Temp\B7B7.tmp"106⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\B834.tmp"C:\Users\Admin\AppData\Local\Temp\B834.tmp"107⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"108⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\B90F.tmp"C:\Users\Admin\AppData\Local\Temp\B90F.tmp"109⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\B99B.tmp"C:\Users\Admin\AppData\Local\Temp\B99B.tmp"110⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\BA28.tmp"C:\Users\Admin\AppData\Local\Temp\BA28.tmp"111⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"112⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\BB41.tmp"C:\Users\Admin\AppData\Local\Temp\BB41.tmp"113⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"114⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"115⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\BCF7.tmp"C:\Users\Admin\AppData\Local\Temp\BCF7.tmp"116⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\BD93.tmp"C:\Users\Admin\AppData\Local\Temp\BD93.tmp"117⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\BE20.tmp"C:\Users\Admin\AppData\Local\Temp\BE20.tmp"118⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\BEAC.tmp"C:\Users\Admin\AppData\Local\Temp\BEAC.tmp"119⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\BF29.tmp"C:\Users\Admin\AppData\Local\Temp\BF29.tmp"120⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\BFA6.tmp"C:\Users\Admin\AppData\Local\Temp\BFA6.tmp"121⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\C043.tmp"C:\Users\Admin\AppData\Local\Temp\C043.tmp"122⤵PID:4104
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-