Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 16:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
05f2af09cf08553f8216dde5f3b7f5dd_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
05f2af09cf08553f8216dde5f3b7f5dd_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
05f2af09cf08553f8216dde5f3b7f5dd_mafia_JC.exe
-
Size
488KB
-
MD5
05f2af09cf08553f8216dde5f3b7f5dd
-
SHA1
e3cf38dc22d39d8ab64dd133a556ee6621b43301
-
SHA256
aeaff22a73545801124c4fba3cf5c247809be5689ac507167ed0d9f81778925c
-
SHA512
ef9ee971df8dba527f6a87878aec17b1f2f9963302b92c3bb9eceb29662a3183b635f5eb301de9c8211fd9a2d652a1f3f3b3324144df4bcc70a60d7623d0b12d
-
SSDEEP
12288:/U5rCOTeiDOG0E+IZKZT/7TFO6oTH2pNZ:/UQOJDOA9ZKfBoTHKN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2424 F8F6.tmp 1884 F9B2.tmp 3292 FAAC.tmp 3008 FBB5.tmp 4468 FCA0.tmp 2716 FD3C.tmp 4560 FDE8.tmp 244 FED2.tmp 1608 FFCC.tmp 3976 97.tmp 3696 143.tmp 4860 21E.tmp 2044 450.tmp 3048 51C.tmp 2208 606.tmp 64 6F0.tmp 4776 7EA.tmp 4696 8E4.tmp 404 990.tmp 4580 A9A.tmp 2648 B75.tmp 4592 C4F.tmp 556 D59.tmp 3256 E53.tmp 4420 F0E.tmp 772 1018.tmp 3844 1102.tmp 5060 11CE.tmp 4044 1279.tmp 1912 1354.tmp 1320 141F.tmp 1220 14DB.tmp 1712 1604.tmp 2000 16EE.tmp 3236 17AA.tmp 2272 18D2.tmp 2616 196F.tmp 884 1A2A.tmp 1488 1AE6.tmp 4260 1B63.tmp 2020 1BE0.tmp 4072 1C5D.tmp 1492 1D37.tmp 708 1DF3.tmp 4908 1E8F.tmp 3592 1F3B.tmp 3000 1FE7.tmp 4400 20C2.tmp 3876 217D.tmp 3128 2229.tmp 2500 2304.tmp 1108 23CF.tmp 4188 247B.tmp 4172 24E8.tmp 2708 25C3.tmp 528 265F.tmp 4644 274A.tmp 3732 27E6.tmp 4364 2863.tmp 3952 291E.tmp 2088 29BB.tmp 4536 2A38.tmp 1608 2AD4.tmp 4900 2B51.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2424 2708 05f2af09cf08553f8216dde5f3b7f5dd_mafia_JC.exe 81 PID 2708 wrote to memory of 2424 2708 05f2af09cf08553f8216dde5f3b7f5dd_mafia_JC.exe 81 PID 2708 wrote to memory of 2424 2708 05f2af09cf08553f8216dde5f3b7f5dd_mafia_JC.exe 81 PID 2424 wrote to memory of 1884 2424 F8F6.tmp 82 PID 2424 wrote to memory of 1884 2424 F8F6.tmp 82 PID 2424 wrote to memory of 1884 2424 F8F6.tmp 82 PID 1884 wrote to memory of 3292 1884 F9B2.tmp 83 PID 1884 wrote to memory of 3292 1884 F9B2.tmp 83 PID 1884 wrote to memory of 3292 1884 F9B2.tmp 83 PID 3292 wrote to memory of 3008 3292 FAAC.tmp 84 PID 3292 wrote to memory of 3008 3292 FAAC.tmp 84 PID 3292 wrote to memory of 3008 3292 FAAC.tmp 84 PID 3008 wrote to memory of 4468 3008 FBB5.tmp 85 PID 3008 wrote to memory of 4468 3008 FBB5.tmp 85 PID 3008 wrote to memory of 4468 3008 FBB5.tmp 85 PID 4468 wrote to memory of 2716 4468 FCA0.tmp 86 PID 4468 wrote to memory of 2716 4468 FCA0.tmp 86 PID 4468 wrote to memory of 2716 4468 FCA0.tmp 86 PID 2716 wrote to memory of 4560 2716 FD3C.tmp 87 PID 2716 wrote to memory of 4560 2716 FD3C.tmp 87 PID 2716 wrote to memory of 4560 2716 FD3C.tmp 87 PID 4560 wrote to memory of 244 4560 FDE8.tmp 88 PID 4560 wrote to memory of 244 4560 FDE8.tmp 88 PID 4560 wrote to memory of 244 4560 FDE8.tmp 88 PID 244 wrote to memory of 1608 244 FED2.tmp 89 PID 244 wrote to memory of 1608 244 FED2.tmp 89 PID 244 wrote to memory of 1608 244 FED2.tmp 89 PID 1608 wrote to memory of 3976 1608 FFCC.tmp 91 PID 1608 wrote to memory of 3976 1608 FFCC.tmp 91 PID 1608 wrote to memory of 3976 1608 FFCC.tmp 91 PID 3976 wrote to memory of 3696 3976 97.tmp 92 PID 3976 wrote to memory of 3696 3976 97.tmp 92 PID 3976 wrote to memory of 3696 3976 97.tmp 92 PID 3696 wrote to memory of 4860 3696 143.tmp 93 PID 3696 wrote to memory of 4860 3696 143.tmp 93 PID 3696 wrote to memory of 4860 3696 143.tmp 93 PID 4860 wrote to memory of 2044 4860 21E.tmp 94 PID 4860 wrote to memory of 2044 4860 21E.tmp 94 PID 4860 wrote to memory of 2044 4860 21E.tmp 94 PID 2044 wrote to memory of 3048 2044 450.tmp 95 PID 2044 wrote to memory of 3048 2044 450.tmp 95 PID 2044 wrote to memory of 3048 2044 450.tmp 95 PID 3048 wrote to memory of 2208 3048 51C.tmp 96 PID 3048 wrote to memory of 2208 3048 51C.tmp 96 PID 3048 wrote to memory of 2208 3048 51C.tmp 96 PID 2208 wrote to memory of 64 2208 606.tmp 97 PID 2208 wrote to memory of 64 2208 606.tmp 97 PID 2208 wrote to memory of 64 2208 606.tmp 97 PID 64 wrote to memory of 4776 64 6F0.tmp 98 PID 64 wrote to memory of 4776 64 6F0.tmp 98 PID 64 wrote to memory of 4776 64 6F0.tmp 98 PID 4776 wrote to memory of 4696 4776 7EA.tmp 99 PID 4776 wrote to memory of 4696 4776 7EA.tmp 99 PID 4776 wrote to memory of 4696 4776 7EA.tmp 99 PID 4696 wrote to memory of 404 4696 8E4.tmp 102 PID 4696 wrote to memory of 404 4696 8E4.tmp 102 PID 4696 wrote to memory of 404 4696 8E4.tmp 102 PID 404 wrote to memory of 4580 404 990.tmp 103 PID 404 wrote to memory of 4580 404 990.tmp 103 PID 404 wrote to memory of 4580 404 990.tmp 103 PID 4580 wrote to memory of 2648 4580 A9A.tmp 104 PID 4580 wrote to memory of 2648 4580 A9A.tmp 104 PID 4580 wrote to memory of 2648 4580 A9A.tmp 104 PID 2648 wrote to memory of 4592 2648 B75.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\05f2af09cf08553f8216dde5f3b7f5dd_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\05f2af09cf08553f8216dde5f3b7f5dd_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"C:\Users\Admin\AppData\Local\Temp\F8F6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\F9B2.tmp"C:\Users\Admin\AppData\Local\Temp\F9B2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\FCA0.tmp"C:\Users\Admin\AppData\Local\Temp\FCA0.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\FDE8.tmp"C:\Users\Admin\AppData\Local\Temp\FDE8.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\FED2.tmp"C:\Users\Admin\AppData\Local\Temp\FED2.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\97.tmp"C:\Users\Admin\AppData\Local\Temp\97.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\143.tmp"C:\Users\Admin\AppData\Local\Temp\143.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\21E.tmp"C:\Users\Admin\AppData\Local\Temp\21E.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\450.tmp"C:\Users\Admin\AppData\Local\Temp\450.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\51C.tmp"C:\Users\Admin\AppData\Local\Temp\51C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\606.tmp"C:\Users\Admin\AppData\Local\Temp\606.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\6F0.tmp"C:\Users\Admin\AppData\Local\Temp\6F0.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\7EA.tmp"C:\Users\Admin\AppData\Local\Temp\7EA.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\8E4.tmp"C:\Users\Admin\AppData\Local\Temp\8E4.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\990.tmp"C:\Users\Admin\AppData\Local\Temp\990.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\A9A.tmp"C:\Users\Admin\AppData\Local\Temp\A9A.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\B75.tmp"C:\Users\Admin\AppData\Local\Temp\B75.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\C4F.tmp"C:\Users\Admin\AppData\Local\Temp\C4F.tmp"23⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"24⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\E53.tmp"C:\Users\Admin\AppData\Local\Temp\E53.tmp"25⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\F0E.tmp"C:\Users\Admin\AppData\Local\Temp\F0E.tmp"26⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\1018.tmp"C:\Users\Admin\AppData\Local\Temp\1018.tmp"27⤵
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\1102.tmp"C:\Users\Admin\AppData\Local\Temp\1102.tmp"28⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\11CE.tmp"C:\Users\Admin\AppData\Local\Temp\11CE.tmp"29⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\1279.tmp"C:\Users\Admin\AppData\Local\Temp\1279.tmp"30⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\1354.tmp"C:\Users\Admin\AppData\Local\Temp\1354.tmp"31⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\141F.tmp"C:\Users\Admin\AppData\Local\Temp\141F.tmp"32⤵
- Executes dropped EXE
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\14DB.tmp"C:\Users\Admin\AppData\Local\Temp\14DB.tmp"33⤵
- Executes dropped EXE
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\1604.tmp"C:\Users\Admin\AppData\Local\Temp\1604.tmp"34⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\16EE.tmp"C:\Users\Admin\AppData\Local\Temp\16EE.tmp"35⤵
- Executes dropped EXE
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\17AA.tmp"C:\Users\Admin\AppData\Local\Temp\17AA.tmp"36⤵
- Executes dropped EXE
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\18D2.tmp"C:\Users\Admin\AppData\Local\Temp\18D2.tmp"37⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\196F.tmp"C:\Users\Admin\AppData\Local\Temp\196F.tmp"38⤵
- Executes dropped EXE
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\1A2A.tmp"C:\Users\Admin\AppData\Local\Temp\1A2A.tmp"39⤵
- Executes dropped EXE
PID:884 -
C:\Users\Admin\AppData\Local\Temp\1AE6.tmp"C:\Users\Admin\AppData\Local\Temp\1AE6.tmp"40⤵
- Executes dropped EXE
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\1B63.tmp"C:\Users\Admin\AppData\Local\Temp\1B63.tmp"41⤵
- Executes dropped EXE
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"C:\Users\Admin\AppData\Local\Temp\1BE0.tmp"42⤵
- Executes dropped EXE
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"43⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\1D37.tmp"C:\Users\Admin\AppData\Local\Temp\1D37.tmp"44⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"45⤵
- Executes dropped EXE
PID:708 -
C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"46⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\1F3B.tmp"C:\Users\Admin\AppData\Local\Temp\1F3B.tmp"47⤵
- Executes dropped EXE
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\1FE7.tmp"C:\Users\Admin\AppData\Local\Temp\1FE7.tmp"48⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\20C2.tmp"C:\Users\Admin\AppData\Local\Temp\20C2.tmp"49⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\217D.tmp"C:\Users\Admin\AppData\Local\Temp\217D.tmp"50⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\2229.tmp"C:\Users\Admin\AppData\Local\Temp\2229.tmp"51⤵
- Executes dropped EXE
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\2304.tmp"C:\Users\Admin\AppData\Local\Temp\2304.tmp"52⤵
- Executes dropped EXE
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\23CF.tmp"C:\Users\Admin\AppData\Local\Temp\23CF.tmp"53⤵
- Executes dropped EXE
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\247B.tmp"C:\Users\Admin\AppData\Local\Temp\247B.tmp"54⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\24E8.tmp"C:\Users\Admin\AppData\Local\Temp\24E8.tmp"55⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\25C3.tmp"C:\Users\Admin\AppData\Local\Temp\25C3.tmp"56⤵
- Executes dropped EXE
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\265F.tmp"C:\Users\Admin\AppData\Local\Temp\265F.tmp"57⤵
- Executes dropped EXE
PID:528 -
C:\Users\Admin\AppData\Local\Temp\274A.tmp"C:\Users\Admin\AppData\Local\Temp\274A.tmp"58⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\27E6.tmp"C:\Users\Admin\AppData\Local\Temp\27E6.tmp"59⤵
- Executes dropped EXE
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\2863.tmp"C:\Users\Admin\AppData\Local\Temp\2863.tmp"60⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\291E.tmp"C:\Users\Admin\AppData\Local\Temp\291E.tmp"61⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\29BB.tmp"C:\Users\Admin\AppData\Local\Temp\29BB.tmp"62⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\2A38.tmp"C:\Users\Admin\AppData\Local\Temp\2A38.tmp"63⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"64⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\2B51.tmp"C:\Users\Admin\AppData\Local\Temp\2B51.tmp"65⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\2BCE.tmp"C:\Users\Admin\AppData\Local\Temp\2BCE.tmp"66⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"67⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\2D06.tmp"C:\Users\Admin\AppData\Local\Temp\2D06.tmp"68⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"69⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\2E3F.tmp"C:\Users\Admin\AppData\Local\Temp\2E3F.tmp"70⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"C:\Users\Admin\AppData\Local\Temp\2EEB.tmp"71⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"72⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3062.tmp"C:\Users\Admin\AppData\Local\Temp\3062.tmp"73⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\310E.tmp"C:\Users\Admin\AppData\Local\Temp\310E.tmp"74⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\31B9.tmp"C:\Users\Admin\AppData\Local\Temp\31B9.tmp"75⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\3246.tmp"C:\Users\Admin\AppData\Local\Temp\3246.tmp"76⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\32E2.tmp"C:\Users\Admin\AppData\Local\Temp\32E2.tmp"77⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\336F.tmp"C:\Users\Admin\AppData\Local\Temp\336F.tmp"78⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"79⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\3469.tmp"C:\Users\Admin\AppData\Local\Temp\3469.tmp"80⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\3515.tmp"C:\Users\Admin\AppData\Local\Temp\3515.tmp"81⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"82⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\369B.tmp"C:\Users\Admin\AppData\Local\Temp\369B.tmp"83⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\3728.tmp"C:\Users\Admin\AppData\Local\Temp\3728.tmp"84⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\37D4.tmp"C:\Users\Admin\AppData\Local\Temp\37D4.tmp"85⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\3870.tmp"C:\Users\Admin\AppData\Local\Temp\3870.tmp"86⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\38FD.tmp"C:\Users\Admin\AppData\Local\Temp\38FD.tmp"87⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\397A.tmp"C:\Users\Admin\AppData\Local\Temp\397A.tmp"88⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\3A45.tmp"C:\Users\Admin\AppData\Local\Temp\3A45.tmp"89⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\3AE1.tmp"C:\Users\Admin\AppData\Local\Temp\3AE1.tmp"90⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\3BAC.tmp"C:\Users\Admin\AppData\Local\Temp\3BAC.tmp"91⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\3C29.tmp"C:\Users\Admin\AppData\Local\Temp\3C29.tmp"92⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"C:\Users\Admin\AppData\Local\Temp\3CA6.tmp"93⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\3D43.tmp"C:\Users\Admin\AppData\Local\Temp\3D43.tmp"94⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\3DCF.tmp"C:\Users\Admin\AppData\Local\Temp\3DCF.tmp"95⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\3E8B.tmp"C:\Users\Admin\AppData\Local\Temp\3E8B.tmp"96⤵PID:496
-
C:\Users\Admin\AppData\Local\Temp\3F17.tmp"C:\Users\Admin\AppData\Local\Temp\3F17.tmp"97⤵PID:500
-
C:\Users\Admin\AppData\Local\Temp\3FD3.tmp"C:\Users\Admin\AppData\Local\Temp\3FD3.tmp"98⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\40AE.tmp"C:\Users\Admin\AppData\Local\Temp\40AE.tmp"99⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\414A.tmp"C:\Users\Admin\AppData\Local\Temp\414A.tmp"100⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\41F6.tmp"C:\Users\Admin\AppData\Local\Temp\41F6.tmp"101⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\42B1.tmp"C:\Users\Admin\AppData\Local\Temp\42B1.tmp"102⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\439C.tmp"C:\Users\Admin\AppData\Local\Temp\439C.tmp"103⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\4428.tmp"C:\Users\Admin\AppData\Local\Temp\4428.tmp"104⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\44A5.tmp"C:\Users\Admin\AppData\Local\Temp\44A5.tmp"105⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\4532.tmp"C:\Users\Admin\AppData\Local\Temp\4532.tmp"106⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\45DE.tmp"C:\Users\Admin\AppData\Local\Temp\45DE.tmp"107⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\4699.tmp"C:\Users\Admin\AppData\Local\Temp\4699.tmp"108⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\4735.tmp"C:\Users\Admin\AppData\Local\Temp\4735.tmp"109⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"110⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\486E.tmp"C:\Users\Admin\AppData\Local\Temp\486E.tmp"111⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\491A.tmp"C:\Users\Admin\AppData\Local\Temp\491A.tmp"112⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\4997.tmp"C:\Users\Admin\AppData\Local\Temp\4997.tmp"113⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\4A33.tmp"C:\Users\Admin\AppData\Local\Temp\4A33.tmp"114⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\4AB0.tmp"C:\Users\Admin\AppData\Local\Temp\4AB0.tmp"115⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\4B5C.tmp"C:\Users\Admin\AppData\Local\Temp\4B5C.tmp"116⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"117⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\4C46.tmp"C:\Users\Admin\AppData\Local\Temp\4C46.tmp"118⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"119⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\4D31.tmp"C:\Users\Admin\AppData\Local\Temp\4D31.tmp"120⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"C:\Users\Admin\AppData\Local\Temp\4DAE.tmp"121⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"C:\Users\Admin\AppData\Local\Temp\4E2B.tmp"122⤵PID:2800
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-