Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 18:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0f50e630de00d8528ba9c7cabcf48ab4_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0f50e630de00d8528ba9c7cabcf48ab4_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
0f50e630de00d8528ba9c7cabcf48ab4_mafia_JC.exe
-
Size
486KB
-
MD5
0f50e630de00d8528ba9c7cabcf48ab4
-
SHA1
55881016800748248201bccac0c7a8903ebee3bf
-
SHA256
a416469adea32cb835a0dedaefa4809e0657d6a50455a4cffde262582e4c0f41
-
SHA512
857d0a64f80cee7363be813b89be7b6add215caa43466488f7be497ae4be1a39ce08ca981b8c504f9d619e703f7eb91f4b3d45ffbd09ced9d806fbc57684d33d
-
SSDEEP
12288:/U5rCOTeiDoF1403bnyJ/T9O6JqIu+65WNZ:/UQOJDSmALytT9OAqIu+EWN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4788 B759.tmp 1372 B834.tmp 3040 B91E.tmp 3448 BA47.tmp 2744 BB22.tmp 5020 BC3B.tmp 4276 BD16.tmp 3972 BDF1.tmp 4136 BE9D.tmp 4740 BF49.tmp 3416 C023.tmp 684 C0DF.tmp 4476 C19A.tmp 3644 C350.tmp 1568 C42B.tmp 2016 C515.tmp 3124 C5FF.tmp 3552 C6DA.tmp 2632 C776.tmp 928 C813.tmp 1424 C93B.tmp 2720 C9E7.tmp 1060 CB01.tmp 1784 CB9D.tmp 2968 CC78.tmp 2416 CD23.tmp 2288 CE2D.tmp 3436 CF27.tmp 3752 CFE3.tmp 852 D0AE.tmp 1936 D15A.tmp 2924 D2A2.tmp 4152 D3BB.tmp 2340 D457.tmp 1788 D513.tmp 1884 D590.tmp 4516 D63C.tmp 2568 D707.tmp 2572 D8DB.tmp 2576 D978.tmp 1580 DA04.tmp 2896 DACF.tmp 3920 DB6C.tmp 3176 DBE9.tmp 748 DC95.tmp 4160 DD12.tmp 4388 DDCD.tmp 2712 DE89.tmp 3496 DF63.tmp 1284 E00F.tmp 4396 E0EA.tmp 2432 E1A5.tmp 4924 E242.tmp 2044 E2EE.tmp 5068 E3A9.tmp 4328 E445.tmp 1388 E4D2.tmp 1412 E59D.tmp 1660 E678.tmp 3936 E704.tmp 4148 E791.tmp 4276 E83D.tmp 3972 E8CA.tmp 4796 E956.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3872 wrote to memory of 4788 3872 0f50e630de00d8528ba9c7cabcf48ab4_mafia_JC.exe 80 PID 3872 wrote to memory of 4788 3872 0f50e630de00d8528ba9c7cabcf48ab4_mafia_JC.exe 80 PID 3872 wrote to memory of 4788 3872 0f50e630de00d8528ba9c7cabcf48ab4_mafia_JC.exe 80 PID 4788 wrote to memory of 1372 4788 B759.tmp 81 PID 4788 wrote to memory of 1372 4788 B759.tmp 81 PID 4788 wrote to memory of 1372 4788 B759.tmp 81 PID 1372 wrote to memory of 3040 1372 B834.tmp 82 PID 1372 wrote to memory of 3040 1372 B834.tmp 82 PID 1372 wrote to memory of 3040 1372 B834.tmp 82 PID 3040 wrote to memory of 3448 3040 B91E.tmp 83 PID 3040 wrote to memory of 3448 3040 B91E.tmp 83 PID 3040 wrote to memory of 3448 3040 B91E.tmp 83 PID 3448 wrote to memory of 2744 3448 BA47.tmp 84 PID 3448 wrote to memory of 2744 3448 BA47.tmp 84 PID 3448 wrote to memory of 2744 3448 BA47.tmp 84 PID 2744 wrote to memory of 5020 2744 BB22.tmp 85 PID 2744 wrote to memory of 5020 2744 BB22.tmp 85 PID 2744 wrote to memory of 5020 2744 BB22.tmp 85 PID 5020 wrote to memory of 4276 5020 BC3B.tmp 86 PID 5020 wrote to memory of 4276 5020 BC3B.tmp 86 PID 5020 wrote to memory of 4276 5020 BC3B.tmp 86 PID 4276 wrote to memory of 3972 4276 BD16.tmp 87 PID 4276 wrote to memory of 3972 4276 BD16.tmp 87 PID 4276 wrote to memory of 3972 4276 BD16.tmp 87 PID 3972 wrote to memory of 4136 3972 BDF1.tmp 88 PID 3972 wrote to memory of 4136 3972 BDF1.tmp 88 PID 3972 wrote to memory of 4136 3972 BDF1.tmp 88 PID 4136 wrote to memory of 4740 4136 BE9D.tmp 89 PID 4136 wrote to memory of 4740 4136 BE9D.tmp 89 PID 4136 wrote to memory of 4740 4136 BE9D.tmp 89 PID 4740 wrote to memory of 3416 4740 BF49.tmp 91 PID 4740 wrote to memory of 3416 4740 BF49.tmp 91 PID 4740 wrote to memory of 3416 4740 BF49.tmp 91 PID 3416 wrote to memory of 684 3416 C023.tmp 92 PID 3416 wrote to memory of 684 3416 C023.tmp 92 PID 3416 wrote to memory of 684 3416 C023.tmp 92 PID 684 wrote to memory of 4476 684 C0DF.tmp 93 PID 684 wrote to memory of 4476 684 C0DF.tmp 93 PID 684 wrote to memory of 4476 684 C0DF.tmp 93 PID 4476 wrote to memory of 3644 4476 C19A.tmp 94 PID 4476 wrote to memory of 3644 4476 C19A.tmp 94 PID 4476 wrote to memory of 3644 4476 C19A.tmp 94 PID 3644 wrote to memory of 1568 3644 C350.tmp 95 PID 3644 wrote to memory of 1568 3644 C350.tmp 95 PID 3644 wrote to memory of 1568 3644 C350.tmp 95 PID 1568 wrote to memory of 2016 1568 C42B.tmp 96 PID 1568 wrote to memory of 2016 1568 C42B.tmp 96 PID 1568 wrote to memory of 2016 1568 C42B.tmp 96 PID 2016 wrote to memory of 3124 2016 C515.tmp 97 PID 2016 wrote to memory of 3124 2016 C515.tmp 97 PID 2016 wrote to memory of 3124 2016 C515.tmp 97 PID 3124 wrote to memory of 3552 3124 C5FF.tmp 98 PID 3124 wrote to memory of 3552 3124 C5FF.tmp 98 PID 3124 wrote to memory of 3552 3124 C5FF.tmp 98 PID 3552 wrote to memory of 2632 3552 C6DA.tmp 99 PID 3552 wrote to memory of 2632 3552 C6DA.tmp 99 PID 3552 wrote to memory of 2632 3552 C6DA.tmp 99 PID 2632 wrote to memory of 928 2632 C776.tmp 102 PID 2632 wrote to memory of 928 2632 C776.tmp 102 PID 2632 wrote to memory of 928 2632 C776.tmp 102 PID 928 wrote to memory of 1424 928 C813.tmp 103 PID 928 wrote to memory of 1424 928 C813.tmp 103 PID 928 wrote to memory of 1424 928 C813.tmp 103 PID 1424 wrote to memory of 2720 1424 C93B.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f50e630de00d8528ba9c7cabcf48ab4_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\0f50e630de00d8528ba9c7cabcf48ab4_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\B759.tmp"C:\Users\Admin\AppData\Local\Temp\B759.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\B834.tmp"C:\Users\Admin\AppData\Local\Temp\B834.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\B91E.tmp"C:\Users\Admin\AppData\Local\Temp\B91E.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\BA47.tmp"C:\Users\Admin\AppData\Local\Temp\BA47.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\BB22.tmp"C:\Users\Admin\AppData\Local\Temp\BB22.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\BD16.tmp"C:\Users\Admin\AppData\Local\Temp\BD16.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\BDF1.tmp"C:\Users\Admin\AppData\Local\Temp\BDF1.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\BF49.tmp"C:\Users\Admin\AppData\Local\Temp\BF49.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\C023.tmp"C:\Users\Admin\AppData\Local\Temp\C023.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\C19A.tmp"C:\Users\Admin\AppData\Local\Temp\C19A.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\C350.tmp"C:\Users\Admin\AppData\Local\Temp\C350.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\C42B.tmp"C:\Users\Admin\AppData\Local\Temp\C42B.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\C515.tmp"C:\Users\Admin\AppData\Local\Temp\C515.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\C6DA.tmp"C:\Users\Admin\AppData\Local\Temp\C6DA.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\C776.tmp"C:\Users\Admin\AppData\Local\Temp\C776.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\C813.tmp"C:\Users\Admin\AppData\Local\Temp\C813.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\C93B.tmp"C:\Users\Admin\AppData\Local\Temp\C93B.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"23⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\CB01.tmp"C:\Users\Admin\AppData\Local\Temp\CB01.tmp"24⤵
- Executes dropped EXE
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"25⤵
- Executes dropped EXE
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\CC78.tmp"C:\Users\Admin\AppData\Local\Temp\CC78.tmp"26⤵
- Executes dropped EXE
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\CD23.tmp"C:\Users\Admin\AppData\Local\Temp\CD23.tmp"27⤵
- Executes dropped EXE
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\CE2D.tmp"C:\Users\Admin\AppData\Local\Temp\CE2D.tmp"28⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\CF27.tmp"C:\Users\Admin\AppData\Local\Temp\CF27.tmp"29⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"C:\Users\Admin\AppData\Local\Temp\CFE3.tmp"30⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"31⤵
- Executes dropped EXE
PID:852 -
C:\Users\Admin\AppData\Local\Temp\D15A.tmp"C:\Users\Admin\AppData\Local\Temp\D15A.tmp"32⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\D2A2.tmp"C:\Users\Admin\AppData\Local\Temp\D2A2.tmp"33⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"34⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\D457.tmp"C:\Users\Admin\AppData\Local\Temp\D457.tmp"35⤵
- Executes dropped EXE
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\D513.tmp"C:\Users\Admin\AppData\Local\Temp\D513.tmp"36⤵
- Executes dropped EXE
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\D590.tmp"C:\Users\Admin\AppData\Local\Temp\D590.tmp"37⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\D63C.tmp"C:\Users\Admin\AppData\Local\Temp\D63C.tmp"38⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\D707.tmp"C:\Users\Admin\AppData\Local\Temp\D707.tmp"39⤵
- Executes dropped EXE
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"40⤵
- Executes dropped EXE
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\D978.tmp"C:\Users\Admin\AppData\Local\Temp\D978.tmp"41⤵
- Executes dropped EXE
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\DA04.tmp"C:\Users\Admin\AppData\Local\Temp\DA04.tmp"42⤵
- Executes dropped EXE
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\DACF.tmp"C:\Users\Admin\AppData\Local\Temp\DACF.tmp"43⤵
- Executes dropped EXE
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"44⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"C:\Users\Admin\AppData\Local\Temp\DBE9.tmp"45⤵
- Executes dropped EXE
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\DC95.tmp"C:\Users\Admin\AppData\Local\Temp\DC95.tmp"46⤵
- Executes dropped EXE
PID:748 -
C:\Users\Admin\AppData\Local\Temp\DD12.tmp"C:\Users\Admin\AppData\Local\Temp\DD12.tmp"47⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"C:\Users\Admin\AppData\Local\Temp\DDCD.tmp"48⤵
- Executes dropped EXE
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\DE89.tmp"C:\Users\Admin\AppData\Local\Temp\DE89.tmp"49⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\DF63.tmp"C:\Users\Admin\AppData\Local\Temp\DF63.tmp"50⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\E00F.tmp"C:\Users\Admin\AppData\Local\Temp\E00F.tmp"51⤵
- Executes dropped EXE
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"52⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\E1A5.tmp"C:\Users\Admin\AppData\Local\Temp\E1A5.tmp"53⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\E242.tmp"C:\Users\Admin\AppData\Local\Temp\E242.tmp"54⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"55⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\E3A9.tmp"C:\Users\Admin\AppData\Local\Temp\E3A9.tmp"56⤵
- Executes dropped EXE
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\E445.tmp"C:\Users\Admin\AppData\Local\Temp\E445.tmp"57⤵
- Executes dropped EXE
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"58⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\E59D.tmp"C:\Users\Admin\AppData\Local\Temp\E59D.tmp"59⤵
- Executes dropped EXE
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\E678.tmp"C:\Users\Admin\AppData\Local\Temp\E678.tmp"60⤵
- Executes dropped EXE
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\E704.tmp"C:\Users\Admin\AppData\Local\Temp\E704.tmp"61⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\E791.tmp"C:\Users\Admin\AppData\Local\Temp\E791.tmp"62⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\E83D.tmp"C:\Users\Admin\AppData\Local\Temp\E83D.tmp"63⤵
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"64⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\E956.tmp"C:\Users\Admin\AppData\Local\Temp\E956.tmp"65⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"66⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"67⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"C:\Users\Admin\AppData\Local\Temp\EB4A.tmp"68⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\EBE6.tmp"C:\Users\Admin\AppData\Local\Temp\EBE6.tmp"69⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\EC73.tmp"C:\Users\Admin\AppData\Local\Temp\EC73.tmp"70⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\ECE0.tmp"C:\Users\Admin\AppData\Local\Temp\ECE0.tmp"71⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"72⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\EE19.tmp"C:\Users\Admin\AppData\Local\Temp\EE19.tmp"73⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"74⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\EF32.tmp"C:\Users\Admin\AppData\Local\Temp\EF32.tmp"75⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"76⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"77⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\F126.tmp"C:\Users\Admin\AppData\Local\Temp\F126.tmp"78⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\F1A3.tmp"C:\Users\Admin\AppData\Local\Temp\F1A3.tmp"79⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\F25F.tmp"C:\Users\Admin\AppData\Local\Temp\F25F.tmp"80⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\F2DC.tmp"C:\Users\Admin\AppData\Local\Temp\F2DC.tmp"81⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\F349.tmp"C:\Users\Admin\AppData\Local\Temp\F349.tmp"82⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\F3B6.tmp"C:\Users\Admin\AppData\Local\Temp\F3B6.tmp"83⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\F453.tmp"C:\Users\Admin\AppData\Local\Temp\F453.tmp"84⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\F4DF.tmp"C:\Users\Admin\AppData\Local\Temp\F4DF.tmp"85⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\F58B.tmp"C:\Users\Admin\AppData\Local\Temp\F58B.tmp"86⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\F627.tmp"C:\Users\Admin\AppData\Local\Temp\F627.tmp"87⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"88⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\F760.tmp"C:\Users\Admin\AppData\Local\Temp\F760.tmp"89⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\F7ED.tmp"C:\Users\Admin\AppData\Local\Temp\F7ED.tmp"90⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\F889.tmp"C:\Users\Admin\AppData\Local\Temp\F889.tmp"91⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\F954.tmp"C:\Users\Admin\AppData\Local\Temp\F954.tmp"92⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\F9E1.tmp"C:\Users\Admin\AppData\Local\Temp\F9E1.tmp"93⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\FA9C.tmp"C:\Users\Admin\AppData\Local\Temp\FA9C.tmp"94⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\FB09.tmp"C:\Users\Admin\AppData\Local\Temp\FB09.tmp"95⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\FB86.tmp"C:\Users\Admin\AppData\Local\Temp\FB86.tmp"96⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"97⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\FD1D.tmp"C:\Users\Admin\AppData\Local\Temp\FD1D.tmp"98⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\FDE8.tmp"C:\Users\Admin\AppData\Local\Temp\FDE8.tmp"99⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\FE65.tmp"C:\Users\Admin\AppData\Local\Temp\FE65.tmp"100⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\FF11.tmp"C:\Users\Admin\AppData\Local\Temp\FF11.tmp"101⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\FF9D.tmp"C:\Users\Admin\AppData\Local\Temp\FF9D.tmp"102⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\1A.tmp"C:\Users\Admin\AppData\Local\Temp\1A.tmp"103⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\C6.tmp"C:\Users\Admin\AppData\Local\Temp\C6.tmp"104⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\153.tmp"C:\Users\Admin\AppData\Local\Temp\153.tmp"105⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\1DF.tmp"C:\Users\Admin\AppData\Local\Temp\1DF.tmp"106⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\29B.tmp"C:\Users\Admin\AppData\Local\Temp\29B.tmp"107⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\328.tmp"C:\Users\Admin\AppData\Local\Temp\328.tmp"108⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\3D3.tmp"C:\Users\Admin\AppData\Local\Temp\3D3.tmp"109⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\48F.tmp"C:\Users\Admin\AppData\Local\Temp\48F.tmp"110⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\52B.tmp"C:\Users\Admin\AppData\Local\Temp\52B.tmp"111⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\5B8.tmp"C:\Users\Admin\AppData\Local\Temp\5B8.tmp"112⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\644.tmp"C:\Users\Admin\AppData\Local\Temp\644.tmp"113⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\6D1.tmp"C:\Users\Admin\AppData\Local\Temp\6D1.tmp"114⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\74E.tmp"C:\Users\Admin\AppData\Local\Temp\74E.tmp"115⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\7FA.tmp"C:\Users\Admin\AppData\Local\Temp\7FA.tmp"116⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\8A6.tmp"C:\Users\Admin\AppData\Local\Temp\8A6.tmp"117⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\942.tmp"C:\Users\Admin\AppData\Local\Temp\942.tmp"118⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\9CF.tmp"C:\Users\Admin\AppData\Local\Temp\9CF.tmp"119⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\A7B.tmp"C:\Users\Admin\AppData\Local\Temp\A7B.tmp"120⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\AF8.tmp"C:\Users\Admin\AppData\Local\Temp\AF8.tmp"121⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\BC3.tmp"C:\Users\Admin\AppData\Local\Temp\BC3.tmp"122⤵PID:2876
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-