Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 15:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe
-
Size
488KB
-
MD5
31347044b7d1f529a58222eb9b17e9d1
-
SHA1
101b3c51df524ee75c5b21e80a3c8b6d02beebf2
-
SHA256
4ad2a7cb73cb4821753c745558250a5d54587fbfe35ef6a385f5dd9710a8e742
-
SHA512
0d5ee6f8394e605c4856f05672396afa45ce7dc68638d86e4479b296415903ec82ca0b615d820e63b9119d5c91f651d35be64e5a1be82017a7474ff117fc5ebc
-
SSDEEP
12288:/U5rCOTeiD9op6Rpw5xyy3an+hYPRUXT8NZ:/UQOJDGpepK++hYOXT8N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4920 D419.tmp 4380 D4C5.tmp 3116 D590.tmp 1916 DA72.tmp 4752 DC08.tmp 3996 DD6F.tmp 2360 DE5A.tmp 3028 DF06.tmp 1896 DF92.tmp 4108 E03E.tmp 4972 E0EA.tmp 1544 EC73.tmp 60 F145.tmp 4460 F6E3.tmp 3600 F983.tmp 3644 FA5E.tmp 4628 FB19.tmp 3868 FBB5.tmp 4320 FCA0.tmp 2468 654.tmp 4664 C9D.tmp 2664 D69.tmp 4632 15F4.tmp 4312 172D.tmp 2052 1D28.tmp 3420 2342.tmp 648 29F9.tmp 4200 2AC4.tmp 3972 32A4.tmp 1840 3F94.tmp 2896 44D4.tmp 4868 460D.tmp 3696 468A.tmp 1688 4735.tmp 3752 47C2.tmp 436 484F.tmp 4964 4BD9.tmp 4656 4EE6.tmp 3716 4F82.tmp 3368 51A5.tmp 1644 5232.tmp 5116 529F.tmp 1228 52FD.tmp 1812 537A.tmp 4540 53F7.tmp 776 5464.tmp 2072 54F1.tmp 1408 57C0.tmp 1452 585C.tmp 4412 58E9.tmp 4564 5975.tmp 4164 5A02.tmp 4820 5A9E.tmp 4660 5B0C.tmp 1968 5B89.tmp 3080 5C06.tmp 3440 5CB1.tmp 2348 5D3E.tmp 4680 5DCB.tmp 4364 5E28.tmp 2864 5E96.tmp 4476 7191.tmp 4108 7BA3.tmp 1984 7C4F.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3780 wrote to memory of 4920 3780 31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe 82 PID 3780 wrote to memory of 4920 3780 31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe 82 PID 3780 wrote to memory of 4920 3780 31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe 82 PID 4920 wrote to memory of 4380 4920 D419.tmp 83 PID 4920 wrote to memory of 4380 4920 D419.tmp 83 PID 4920 wrote to memory of 4380 4920 D419.tmp 83 PID 4380 wrote to memory of 3116 4380 D4C5.tmp 84 PID 4380 wrote to memory of 3116 4380 D4C5.tmp 84 PID 4380 wrote to memory of 3116 4380 D4C5.tmp 84 PID 3116 wrote to memory of 1916 3116 D590.tmp 85 PID 3116 wrote to memory of 1916 3116 D590.tmp 85 PID 3116 wrote to memory of 1916 3116 D590.tmp 85 PID 1916 wrote to memory of 4752 1916 DA72.tmp 86 PID 1916 wrote to memory of 4752 1916 DA72.tmp 86 PID 1916 wrote to memory of 4752 1916 DA72.tmp 86 PID 4752 wrote to memory of 3996 4752 DC08.tmp 87 PID 4752 wrote to memory of 3996 4752 DC08.tmp 87 PID 4752 wrote to memory of 3996 4752 DC08.tmp 87 PID 3996 wrote to memory of 2360 3996 DD6F.tmp 88 PID 3996 wrote to memory of 2360 3996 DD6F.tmp 88 PID 3996 wrote to memory of 2360 3996 DD6F.tmp 88 PID 2360 wrote to memory of 3028 2360 DE5A.tmp 89 PID 2360 wrote to memory of 3028 2360 DE5A.tmp 89 PID 2360 wrote to memory of 3028 2360 DE5A.tmp 89 PID 3028 wrote to memory of 1896 3028 DF06.tmp 90 PID 3028 wrote to memory of 1896 3028 DF06.tmp 90 PID 3028 wrote to memory of 1896 3028 DF06.tmp 90 PID 1896 wrote to memory of 4108 1896 DF92.tmp 91 PID 1896 wrote to memory of 4108 1896 DF92.tmp 91 PID 1896 wrote to memory of 4108 1896 DF92.tmp 91 PID 4108 wrote to memory of 4972 4108 E03E.tmp 92 PID 4108 wrote to memory of 4972 4108 E03E.tmp 92 PID 4108 wrote to memory of 4972 4108 E03E.tmp 92 PID 4972 wrote to memory of 1544 4972 E0EA.tmp 93 PID 4972 wrote to memory of 1544 4972 E0EA.tmp 93 PID 4972 wrote to memory of 1544 4972 E0EA.tmp 93 PID 1544 wrote to memory of 60 1544 EC73.tmp 94 PID 1544 wrote to memory of 60 1544 EC73.tmp 94 PID 1544 wrote to memory of 60 1544 EC73.tmp 94 PID 60 wrote to memory of 4460 60 F145.tmp 95 PID 60 wrote to memory of 4460 60 F145.tmp 95 PID 60 wrote to memory of 4460 60 F145.tmp 95 PID 4460 wrote to memory of 3600 4460 F6E3.tmp 96 PID 4460 wrote to memory of 3600 4460 F6E3.tmp 96 PID 4460 wrote to memory of 3600 4460 F6E3.tmp 96 PID 3600 wrote to memory of 3644 3600 F983.tmp 97 PID 3600 wrote to memory of 3644 3600 F983.tmp 97 PID 3600 wrote to memory of 3644 3600 F983.tmp 97 PID 3644 wrote to memory of 4628 3644 FA5E.tmp 98 PID 3644 wrote to memory of 4628 3644 FA5E.tmp 98 PID 3644 wrote to memory of 4628 3644 FA5E.tmp 98 PID 4628 wrote to memory of 3868 4628 FB19.tmp 99 PID 4628 wrote to memory of 3868 4628 FB19.tmp 99 PID 4628 wrote to memory of 3868 4628 FB19.tmp 99 PID 3868 wrote to memory of 4320 3868 FBB5.tmp 100 PID 3868 wrote to memory of 4320 3868 FBB5.tmp 100 PID 3868 wrote to memory of 4320 3868 FBB5.tmp 100 PID 4320 wrote to memory of 2468 4320 FCA0.tmp 101 PID 4320 wrote to memory of 2468 4320 FCA0.tmp 101 PID 4320 wrote to memory of 2468 4320 FCA0.tmp 101 PID 2468 wrote to memory of 4664 2468 654.tmp 104 PID 2468 wrote to memory of 4664 2468 654.tmp 104 PID 2468 wrote to memory of 4664 2468 654.tmp 104 PID 4664 wrote to memory of 2664 4664 C9D.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\D419.tmp"C:\Users\Admin\AppData\Local\Temp\D419.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\D590.tmp"C:\Users\Admin\AppData\Local\Temp\D590.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\DA72.tmp"C:\Users\Admin\AppData\Local\Temp\DA72.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\DC08.tmp"C:\Users\Admin\AppData\Local\Temp\DC08.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\DD6F.tmp"C:\Users\Admin\AppData\Local\Temp\DD6F.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"C:\Users\Admin\AppData\Local\Temp\DE5A.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\DF06.tmp"C:\Users\Admin\AppData\Local\Temp\DF06.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\DF92.tmp"C:\Users\Admin\AppData\Local\Temp\DF92.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\E03E.tmp"C:\Users\Admin\AppData\Local\Temp\E03E.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\EC73.tmp"C:\Users\Admin\AppData\Local\Temp\EC73.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\F145.tmp"C:\Users\Admin\AppData\Local\Temp\F145.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\F983.tmp"C:\Users\Admin\AppData\Local\Temp\F983.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\FA5E.tmp"C:\Users\Admin\AppData\Local\Temp\FA5E.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\FB19.tmp"C:\Users\Admin\AppData\Local\Temp\FB19.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\FCA0.tmp"C:\Users\Admin\AppData\Local\Temp\FCA0.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\654.tmp"C:\Users\Admin\AppData\Local\Temp\654.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\C9D.tmp"C:\Users\Admin\AppData\Local\Temp\C9D.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"23⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\15F4.tmp"C:\Users\Admin\AppData\Local\Temp\15F4.tmp"24⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\172D.tmp"C:\Users\Admin\AppData\Local\Temp\172D.tmp"25⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\1D28.tmp"C:\Users\Admin\AppData\Local\Temp\1D28.tmp"26⤵
- Executes dropped EXE
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\2342.tmp"C:\Users\Admin\AppData\Local\Temp\2342.tmp"27⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\29F9.tmp"C:\Users\Admin\AppData\Local\Temp\29F9.tmp"28⤵
- Executes dropped EXE
PID:648 -
C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"C:\Users\Admin\AppData\Local\Temp\2AC4.tmp"29⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\32A4.tmp"C:\Users\Admin\AppData\Local\Temp\32A4.tmp"30⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\3F94.tmp"C:\Users\Admin\AppData\Local\Temp\3F94.tmp"31⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\44D4.tmp"C:\Users\Admin\AppData\Local\Temp\44D4.tmp"32⤵
- Executes dropped EXE
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\460D.tmp"C:\Users\Admin\AppData\Local\Temp\460D.tmp"33⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\468A.tmp"C:\Users\Admin\AppData\Local\Temp\468A.tmp"34⤵
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\4735.tmp"C:\Users\Admin\AppData\Local\Temp\4735.tmp"35⤵
- Executes dropped EXE
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"36⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\484F.tmp"C:\Users\Admin\AppData\Local\Temp\484F.tmp"37⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"38⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"C:\Users\Admin\AppData\Local\Temp\4EE6.tmp"39⤵
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\4F82.tmp"C:\Users\Admin\AppData\Local\Temp\4F82.tmp"40⤵
- Executes dropped EXE
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\51A5.tmp"C:\Users\Admin\AppData\Local\Temp\51A5.tmp"41⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\5232.tmp"C:\Users\Admin\AppData\Local\Temp\5232.tmp"42⤵
- Executes dropped EXE
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\529F.tmp"C:\Users\Admin\AppData\Local\Temp\529F.tmp"43⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\52FD.tmp"C:\Users\Admin\AppData\Local\Temp\52FD.tmp"44⤵
- Executes dropped EXE
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\537A.tmp"C:\Users\Admin\AppData\Local\Temp\537A.tmp"45⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\53F7.tmp"C:\Users\Admin\AppData\Local\Temp\53F7.tmp"46⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\5464.tmp"C:\Users\Admin\AppData\Local\Temp\5464.tmp"47⤵
- Executes dropped EXE
PID:776 -
C:\Users\Admin\AppData\Local\Temp\54F1.tmp"C:\Users\Admin\AppData\Local\Temp\54F1.tmp"48⤵
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\57C0.tmp"C:\Users\Admin\AppData\Local\Temp\57C0.tmp"49⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\585C.tmp"C:\Users\Admin\AppData\Local\Temp\585C.tmp"50⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\58E9.tmp"C:\Users\Admin\AppData\Local\Temp\58E9.tmp"51⤵
- Executes dropped EXE
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\5975.tmp"C:\Users\Admin\AppData\Local\Temp\5975.tmp"52⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\5A02.tmp"C:\Users\Admin\AppData\Local\Temp\5A02.tmp"53⤵
- Executes dropped EXE
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\5A9E.tmp"C:\Users\Admin\AppData\Local\Temp\5A9E.tmp"54⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\5B0C.tmp"C:\Users\Admin\AppData\Local\Temp\5B0C.tmp"55⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\5B89.tmp"C:\Users\Admin\AppData\Local\Temp\5B89.tmp"56⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\5C06.tmp"C:\Users\Admin\AppData\Local\Temp\5C06.tmp"57⤵
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"58⤵
- Executes dropped EXE
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\5D3E.tmp"C:\Users\Admin\AppData\Local\Temp\5D3E.tmp"59⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"C:\Users\Admin\AppData\Local\Temp\5DCB.tmp"60⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\5E28.tmp"C:\Users\Admin\AppData\Local\Temp\5E28.tmp"61⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\5E96.tmp"C:\Users\Admin\AppData\Local\Temp\5E96.tmp"62⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\7191.tmp"C:\Users\Admin\AppData\Local\Temp\7191.tmp"63⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"C:\Users\Admin\AppData\Local\Temp\7BA3.tmp"64⤵
- Executes dropped EXE
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\7C4F.tmp"C:\Users\Admin\AppData\Local\Temp\7C4F.tmp"65⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\7EFF.tmp"C:\Users\Admin\AppData\Local\Temp\7EFF.tmp"66⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\8289.tmp"C:\Users\Admin\AppData\Local\Temp\8289.tmp"67⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\83F0.tmp"C:\Users\Admin\AppData\Local\Temp\83F0.tmp"68⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\847D.tmp"C:\Users\Admin\AppData\Local\Temp\847D.tmp"69⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\85B5.tmp"C:\Users\Admin\AppData\Local\Temp\85B5.tmp"70⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\8836.tmp"C:\Users\Admin\AppData\Local\Temp\8836.tmp"71⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\89FB.tmp"C:\Users\Admin\AppData\Local\Temp\89FB.tmp"72⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\8B05.tmp"C:\Users\Admin\AppData\Local\Temp\8B05.tmp"73⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\8BA1.tmp"C:\Users\Admin\AppData\Local\Temp\8BA1.tmp"74⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\8D95.tmp"C:\Users\Admin\AppData\Local\Temp\8D95.tmp"75⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\8E51.tmp"C:\Users\Admin\AppData\Local\Temp\8E51.tmp"76⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\91EA.tmp"C:\Users\Admin\AppData\Local\Temp\91EA.tmp"77⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\9769.tmp"C:\Users\Admin\AppData\Local\Temp\9769.tmp"78⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\9EFA.tmp"C:\Users\Admin\AppData\Local\Temp\9EFA.tmp"79⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\A284.tmp"C:\Users\Admin\AppData\Local\Temp\A284.tmp"80⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\A747.tmp"C:\Users\Admin\AppData\Local\Temp\A747.tmp"81⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\A7F3.tmp"C:\Users\Admin\AppData\Local\Temp\A7F3.tmp"82⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\AF75.tmp"C:\Users\Admin\AppData\Local\Temp\AF75.tmp"83⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\B06F.tmp"C:\Users\Admin\AppData\Local\Temp\B06F.tmp"84⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\B188.tmp"C:\Users\Admin\AppData\Local\Temp\B188.tmp"85⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\B89D.tmp"C:\Users\Admin\AppData\Local\Temp\B89D.tmp"86⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\BBF8.tmp"C:\Users\Admin\AppData\Local\Temp\BBF8.tmp"87⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\C03E.tmp"C:\Users\Admin\AppData\Local\Temp\C03E.tmp"88⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\C0EA.tmp"C:\Users\Admin\AppData\Local\Temp\C0EA.tmp"89⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\C36A.tmp"C:\Users\Admin\AppData\Local\Temp\C36A.tmp"90⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\C426.tmp"C:\Users\Admin\AppData\Local\Temp\C426.tmp"91⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\C4A3.tmp"C:\Users\Admin\AppData\Local\Temp\C4A3.tmp"92⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\CBC7.tmp"C:\Users\Admin\AppData\Local\Temp\CBC7.tmp"93⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\D03C.tmp"C:\Users\Admin\AppData\Local\Temp\D03C.tmp"94⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\DE16.tmp"C:\Users\Admin\AppData\Local\Temp\DE16.tmp"95⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\E450.tmp"C:\Users\Admin\AppData\Local\Temp\E450.tmp"96⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\E5F6.tmp"C:\Users\Admin\AppData\Local\Temp\E5F6.tmp"97⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\EC9D.tmp"C:\Users\Admin\AppData\Local\Temp\EC9D.tmp"98⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\EEA1.tmp"C:\Users\Admin\AppData\Local\Temp\EEA1.tmp"99⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\F306.tmp"C:\Users\Admin\AppData\Local\Temp\F306.tmp"100⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\F3D1.tmp"C:\Users\Admin\AppData\Local\Temp\F3D1.tmp"101⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\F855.tmp"C:\Users\Admin\AppData\Local\Temp\F855.tmp"102⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\FC8B.tmp"C:\Users\Admin\AppData\Local\Temp\FC8B.tmp"103⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\FD18.tmp"C:\Users\Admin\AppData\Local\Temp\FD18.tmp"104⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\FDC4.tmp"C:\Users\Admin\AppData\Local\Temp\FDC4.tmp"105⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\FE60.tmp"C:\Users\Admin\AppData\Local\Temp\FE60.tmp"106⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\FEDD.tmp"C:\Users\Admin\AppData\Local\Temp\FEDD.tmp"107⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\FF5A.tmp"C:\Users\Admin\AppData\Local\Temp\FF5A.tmp"108⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\FFD7.tmp"C:\Users\Admin\AppData\Local\Temp\FFD7.tmp"109⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\64.tmp"C:\Users\Admin\AppData\Local\Temp\64.tmp"110⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\E1.tmp"C:\Users\Admin\AppData\Local\Temp\E1.tmp"111⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\18D.tmp"C:\Users\Admin\AppData\Local\Temp\18D.tmp"112⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\66F.tmp"C:\Users\Admin\AppData\Local\Temp\66F.tmp"113⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\769.tmp"C:\Users\Admin\AppData\Local\Temp\769.tmp"114⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\E5E.tmp"C:\Users\Admin\AppData\Local\Temp\E5E.tmp"115⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\FD5.tmp"C:\Users\Admin\AppData\Local\Temp\FD5.tmp"116⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\10A0.tmp"C:\Users\Admin\AppData\Local\Temp\10A0.tmp"117⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\112D.tmp"C:\Users\Admin\AppData\Local\Temp\112D.tmp"118⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\11E8.tmp"C:\Users\Admin\AppData\Local\Temp\11E8.tmp"119⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\1246.tmp"C:\Users\Admin\AppData\Local\Temp\1246.tmp"120⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\12C3.tmp"C:\Users\Admin\AppData\Local\Temp\12C3.tmp"121⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\1340.tmp"C:\Users\Admin\AppData\Local\Temp\1340.tmp"122⤵PID:812
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-