Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2023, 13:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3fb0cc6ca8109f0f519cbf636ebfa233_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3fb0cc6ca8109f0f519cbf636ebfa233_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
3fb0cc6ca8109f0f519cbf636ebfa233_mafia_JC.exe
-
Size
486KB
-
MD5
3fb0cc6ca8109f0f519cbf636ebfa233
-
SHA1
995ec442999efe1ab0409a7e1f5650a43846239f
-
SHA256
9a5062156e291dc9f750a9a94df369788ced44e81095913803544d69b5799250
-
SHA512
d8ecba9a92ca2b421cebac94bf91592d32a898856f4513a2238ad0d4a8176e5870d5e9b2f66f858fbf97cccc0eb162d704eb751f28ec3089d48c00860fa65723
-
SSDEEP
12288:oU5rCOTeiDshssgwTMuUZhB6oXaEKMqNZ:oUQOJDossJMucTXnqN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1492 8FEC.tmp 504 90D6.tmp 2928 9191.tmp 2956 923D.tmp 4404 92F9.tmp 2104 93B4.tmp 2404 947F.tmp 4132 951C.tmp 4908 95D7.tmp 2200 9673.tmp 1892 972F.tmp 4100 97CB.tmp 5008 9877.tmp 2520 9A8A.tmp 1496 9B84.tmp 3836 9C6F.tmp 2468 9D3A.tmp 3872 9EB1.tmp 4496 9F6C.tmp 4000 A028.tmp 4116 A0F3.tmp 4016 A180.tmp 2944 A20C.tmp 4460 A2A8.tmp 4164 A3C2.tmp 4924 A4DB.tmp 3804 A5E5.tmp 492 A6BF.tmp 5004 A7AA.tmp 3408 A875.tmp 1732 A950.tmp 4312 A9FB.tmp 1772 AAC7.tmp 1288 AB72.tmp 4804 ABEF.tmp 4968 AC7C.tmp 4444 AD28.tmp 4892 ADD4.tmp 3384 AE80.tmp 1000 AF2C.tmp 2344 AFF7.tmp 4932 B0A3.tmp 3044 B14E.tmp 836 B1DB.tmp 1264 B287.tmp 3688 B323.tmp 4296 B3A0.tmp 2092 B42D.tmp 2736 B4AA.tmp 1396 B527.tmp 372 B5D3.tmp 4396 B65F.tmp 2136 B6FC.tmp 1492 B769.tmp 1484 B7E6.tmp 4620 B882.tmp 2688 B8FF.tmp 2836 B98C.tmp 4412 BA18.tmp 3092 BAA5.tmp 720 BB22.tmp 1392 BBAF.tmp 2436 BC4B.tmp 2204 BCD8.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4880 wrote to memory of 1492 4880 3fb0cc6ca8109f0f519cbf636ebfa233_mafia_JC.exe 81 PID 4880 wrote to memory of 1492 4880 3fb0cc6ca8109f0f519cbf636ebfa233_mafia_JC.exe 81 PID 4880 wrote to memory of 1492 4880 3fb0cc6ca8109f0f519cbf636ebfa233_mafia_JC.exe 81 PID 1492 wrote to memory of 504 1492 8FEC.tmp 82 PID 1492 wrote to memory of 504 1492 8FEC.tmp 82 PID 1492 wrote to memory of 504 1492 8FEC.tmp 82 PID 504 wrote to memory of 2928 504 90D6.tmp 83 PID 504 wrote to memory of 2928 504 90D6.tmp 83 PID 504 wrote to memory of 2928 504 90D6.tmp 83 PID 2928 wrote to memory of 2956 2928 9191.tmp 84 PID 2928 wrote to memory of 2956 2928 9191.tmp 84 PID 2928 wrote to memory of 2956 2928 9191.tmp 84 PID 2956 wrote to memory of 4404 2956 923D.tmp 85 PID 2956 wrote to memory of 4404 2956 923D.tmp 85 PID 2956 wrote to memory of 4404 2956 923D.tmp 85 PID 4404 wrote to memory of 2104 4404 92F9.tmp 86 PID 4404 wrote to memory of 2104 4404 92F9.tmp 86 PID 4404 wrote to memory of 2104 4404 92F9.tmp 86 PID 2104 wrote to memory of 2404 2104 93B4.tmp 87 PID 2104 wrote to memory of 2404 2104 93B4.tmp 87 PID 2104 wrote to memory of 2404 2104 93B4.tmp 87 PID 2404 wrote to memory of 4132 2404 947F.tmp 88 PID 2404 wrote to memory of 4132 2404 947F.tmp 88 PID 2404 wrote to memory of 4132 2404 947F.tmp 88 PID 4132 wrote to memory of 4908 4132 951C.tmp 89 PID 4132 wrote to memory of 4908 4132 951C.tmp 89 PID 4132 wrote to memory of 4908 4132 951C.tmp 89 PID 4908 wrote to memory of 2200 4908 95D7.tmp 90 PID 4908 wrote to memory of 2200 4908 95D7.tmp 90 PID 4908 wrote to memory of 2200 4908 95D7.tmp 90 PID 2200 wrote to memory of 1892 2200 9673.tmp 91 PID 2200 wrote to memory of 1892 2200 9673.tmp 91 PID 2200 wrote to memory of 1892 2200 9673.tmp 91 PID 1892 wrote to memory of 4100 1892 972F.tmp 92 PID 1892 wrote to memory of 4100 1892 972F.tmp 92 PID 1892 wrote to memory of 4100 1892 972F.tmp 92 PID 4100 wrote to memory of 5008 4100 97CB.tmp 93 PID 4100 wrote to memory of 5008 4100 97CB.tmp 93 PID 4100 wrote to memory of 5008 4100 97CB.tmp 93 PID 5008 wrote to memory of 2520 5008 9877.tmp 96 PID 5008 wrote to memory of 2520 5008 9877.tmp 96 PID 5008 wrote to memory of 2520 5008 9877.tmp 96 PID 2520 wrote to memory of 1496 2520 9A8A.tmp 97 PID 2520 wrote to memory of 1496 2520 9A8A.tmp 97 PID 2520 wrote to memory of 1496 2520 9A8A.tmp 97 PID 1496 wrote to memory of 3836 1496 9B84.tmp 98 PID 1496 wrote to memory of 3836 1496 9B84.tmp 98 PID 1496 wrote to memory of 3836 1496 9B84.tmp 98 PID 3836 wrote to memory of 2468 3836 9C6F.tmp 99 PID 3836 wrote to memory of 2468 3836 9C6F.tmp 99 PID 3836 wrote to memory of 2468 3836 9C6F.tmp 99 PID 2468 wrote to memory of 3872 2468 9D3A.tmp 100 PID 2468 wrote to memory of 3872 2468 9D3A.tmp 100 PID 2468 wrote to memory of 3872 2468 9D3A.tmp 100 PID 3872 wrote to memory of 4496 3872 9EB1.tmp 102 PID 3872 wrote to memory of 4496 3872 9EB1.tmp 102 PID 3872 wrote to memory of 4496 3872 9EB1.tmp 102 PID 4496 wrote to memory of 4000 4496 9F6C.tmp 103 PID 4496 wrote to memory of 4000 4496 9F6C.tmp 103 PID 4496 wrote to memory of 4000 4496 9F6C.tmp 103 PID 4000 wrote to memory of 4116 4000 A028.tmp 105 PID 4000 wrote to memory of 4116 4000 A028.tmp 105 PID 4000 wrote to memory of 4116 4000 A028.tmp 105 PID 4116 wrote to memory of 4016 4116 A0F3.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fb0cc6ca8109f0f519cbf636ebfa233_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\3fb0cc6ca8109f0f519cbf636ebfa233_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\8FEC.tmp"C:\Users\Admin\AppData\Local\Temp\8FEC.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\90D6.tmp"C:\Users\Admin\AppData\Local\Temp\90D6.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Users\Admin\AppData\Local\Temp\9191.tmp"C:\Users\Admin\AppData\Local\Temp\9191.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\923D.tmp"C:\Users\Admin\AppData\Local\Temp\923D.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\92F9.tmp"C:\Users\Admin\AppData\Local\Temp\92F9.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\93B4.tmp"C:\Users\Admin\AppData\Local\Temp\93B4.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\947F.tmp"C:\Users\Admin\AppData\Local\Temp\947F.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\951C.tmp"C:\Users\Admin\AppData\Local\Temp\951C.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\95D7.tmp"C:\Users\Admin\AppData\Local\Temp\95D7.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\9673.tmp"C:\Users\Admin\AppData\Local\Temp\9673.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\972F.tmp"C:\Users\Admin\AppData\Local\Temp\972F.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\97CB.tmp"C:\Users\Admin\AppData\Local\Temp\97CB.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\9877.tmp"C:\Users\Admin\AppData\Local\Temp\9877.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\9B84.tmp"C:\Users\Admin\AppData\Local\Temp\9B84.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\9D3A.tmp"C:\Users\Admin\AppData\Local\Temp\9D3A.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\9EB1.tmp"C:\Users\Admin\AppData\Local\Temp\9EB1.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\9F6C.tmp"C:\Users\Admin\AppData\Local\Temp\9F6C.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\A028.tmp"C:\Users\Admin\AppData\Local\Temp\A028.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\A0F3.tmp"C:\Users\Admin\AppData\Local\Temp\A0F3.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\A180.tmp"C:\Users\Admin\AppData\Local\Temp\A180.tmp"23⤵
- Executes dropped EXE
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\A20C.tmp"C:\Users\Admin\AppData\Local\Temp\A20C.tmp"24⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\A2A8.tmp"C:\Users\Admin\AppData\Local\Temp\A2A8.tmp"25⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\A3C2.tmp"C:\Users\Admin\AppData\Local\Temp\A3C2.tmp"26⤵
- Executes dropped EXE
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"27⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\A5E5.tmp"C:\Users\Admin\AppData\Local\Temp\A5E5.tmp"28⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"29⤵
- Executes dropped EXE
PID:492 -
C:\Users\Admin\AppData\Local\Temp\A7AA.tmp"C:\Users\Admin\AppData\Local\Temp\A7AA.tmp"30⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\A875.tmp"C:\Users\Admin\AppData\Local\Temp\A875.tmp"31⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\A950.tmp"C:\Users\Admin\AppData\Local\Temp\A950.tmp"32⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\A9FB.tmp"C:\Users\Admin\AppData\Local\Temp\A9FB.tmp"33⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\AAC7.tmp"C:\Users\Admin\AppData\Local\Temp\AAC7.tmp"34⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\AB72.tmp"C:\Users\Admin\AppData\Local\Temp\AB72.tmp"35⤵
- Executes dropped EXE
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\ABEF.tmp"C:\Users\Admin\AppData\Local\Temp\ABEF.tmp"36⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\AC7C.tmp"C:\Users\Admin\AppData\Local\Temp\AC7C.tmp"37⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\AD28.tmp"C:\Users\Admin\AppData\Local\Temp\AD28.tmp"38⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"C:\Users\Admin\AppData\Local\Temp\ADD4.tmp"39⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\AE80.tmp"C:\Users\Admin\AppData\Local\Temp\AE80.tmp"40⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\AF2C.tmp"C:\Users\Admin\AppData\Local\Temp\AF2C.tmp"41⤵
- Executes dropped EXE
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\AFF7.tmp"C:\Users\Admin\AppData\Local\Temp\AFF7.tmp"42⤵
- Executes dropped EXE
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"43⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\B14E.tmp"C:\Users\Admin\AppData\Local\Temp\B14E.tmp"44⤵
- Executes dropped EXE
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"45⤵
- Executes dropped EXE
PID:836 -
C:\Users\Admin\AppData\Local\Temp\B287.tmp"C:\Users\Admin\AppData\Local\Temp\B287.tmp"46⤵
- Executes dropped EXE
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\B323.tmp"C:\Users\Admin\AppData\Local\Temp\B323.tmp"47⤵
- Executes dropped EXE
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\B3A0.tmp"C:\Users\Admin\AppData\Local\Temp\B3A0.tmp"48⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\B42D.tmp"C:\Users\Admin\AppData\Local\Temp\B42D.tmp"49⤵
- Executes dropped EXE
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\B4AA.tmp"C:\Users\Admin\AppData\Local\Temp\B4AA.tmp"50⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\B527.tmp"C:\Users\Admin\AppData\Local\Temp\B527.tmp"51⤵
- Executes dropped EXE
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"52⤵
- Executes dropped EXE
PID:372 -
C:\Users\Admin\AppData\Local\Temp\B65F.tmp"C:\Users\Admin\AppData\Local\Temp\B65F.tmp"53⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\B6FC.tmp"C:\Users\Admin\AppData\Local\Temp\B6FC.tmp"54⤵
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\B769.tmp"C:\Users\Admin\AppData\Local\Temp\B769.tmp"55⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"56⤵
- Executes dropped EXE
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\B882.tmp"C:\Users\Admin\AppData\Local\Temp\B882.tmp"57⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\B8FF.tmp"C:\Users\Admin\AppData\Local\Temp\B8FF.tmp"58⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\B98C.tmp"C:\Users\Admin\AppData\Local\Temp\B98C.tmp"59⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\BA18.tmp"C:\Users\Admin\AppData\Local\Temp\BA18.tmp"60⤵
- Executes dropped EXE
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\BAA5.tmp"C:\Users\Admin\AppData\Local\Temp\BAA5.tmp"61⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\BB22.tmp"C:\Users\Admin\AppData\Local\Temp\BB22.tmp"62⤵
- Executes dropped EXE
PID:720 -
C:\Users\Admin\AppData\Local\Temp\BBAF.tmp"C:\Users\Admin\AppData\Local\Temp\BBAF.tmp"63⤵
- Executes dropped EXE
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"64⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"65⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\BD74.tmp"C:\Users\Admin\AppData\Local\Temp\BD74.tmp"66⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\BE10.tmp"C:\Users\Admin\AppData\Local\Temp\BE10.tmp"67⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"68⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\BF29.tmp"C:\Users\Admin\AppData\Local\Temp\BF29.tmp"69⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\BF87.tmp"C:\Users\Admin\AppData\Local\Temp\BF87.tmp"70⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\C004.tmp"C:\Users\Admin\AppData\Local\Temp\C004.tmp"71⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\C062.tmp"C:\Users\Admin\AppData\Local\Temp\C062.tmp"72⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\C0FE.tmp"C:\Users\Admin\AppData\Local\Temp\C0FE.tmp"73⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\C17B.tmp"C:\Users\Admin\AppData\Local\Temp\C17B.tmp"74⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\C208.tmp"C:\Users\Admin\AppData\Local\Temp\C208.tmp"75⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"76⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\C321.tmp"C:\Users\Admin\AppData\Local\Temp\C321.tmp"77⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\C41B.tmp"C:\Users\Admin\AppData\Local\Temp\C41B.tmp"78⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\C498.tmp"C:\Users\Admin\AppData\Local\Temp\C498.tmp"79⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\C515.tmp"C:\Users\Admin\AppData\Local\Temp\C515.tmp"80⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\C592.tmp"C:\Users\Admin\AppData\Local\Temp\C592.tmp"81⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\C5F0.tmp"C:\Users\Admin\AppData\Local\Temp\C5F0.tmp"82⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\C65D.tmp"C:\Users\Admin\AppData\Local\Temp\C65D.tmp"83⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\C6CA.tmp"C:\Users\Admin\AppData\Local\Temp\C6CA.tmp"84⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\C728.tmp"C:\Users\Admin\AppData\Local\Temp\C728.tmp"85⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\C803.tmp"C:\Users\Admin\AppData\Local\Temp\C803.tmp"86⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\C8AF.tmp"C:\Users\Admin\AppData\Local\Temp\C8AF.tmp"87⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\C93B.tmp"C:\Users\Admin\AppData\Local\Temp\C93B.tmp"88⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"89⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\CA84.tmp"C:\Users\Admin\AppData\Local\Temp\CA84.tmp"90⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\CB20.tmp"C:\Users\Admin\AppData\Local\Temp\CB20.tmp"91⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"92⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"93⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\CC87.tmp"C:\Users\Admin\AppData\Local\Temp\CC87.tmp"94⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\CD14.tmp"C:\Users\Admin\AppData\Local\Temp\CD14.tmp"95⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"96⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"C:\Users\Admin\AppData\Local\Temp\CE1D.tmp"97⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\CEC9.tmp"C:\Users\Admin\AppData\Local\Temp\CEC9.tmp"98⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\CF56.tmp"C:\Users\Admin\AppData\Local\Temp\CF56.tmp"99⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\D002.tmp"C:\Users\Admin\AppData\Local\Temp\D002.tmp"100⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\D08E.tmp"C:\Users\Admin\AppData\Local\Temp\D08E.tmp"101⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\D13A.tmp"C:\Users\Admin\AppData\Local\Temp\D13A.tmp"102⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\D1C7.tmp"C:\Users\Admin\AppData\Local\Temp\D1C7.tmp"103⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\D273.tmp"C:\Users\Admin\AppData\Local\Temp\D273.tmp"104⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\D31F.tmp"C:\Users\Admin\AppData\Local\Temp\D31F.tmp"105⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"106⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\D438.tmp"C:\Users\Admin\AppData\Local\Temp\D438.tmp"107⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"C:\Users\Admin\AppData\Local\Temp\D4C5.tmp"108⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\D542.tmp"C:\Users\Admin\AppData\Local\Temp\D542.tmp"109⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"110⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\D68A.tmp"C:\Users\Admin\AppData\Local\Temp\D68A.tmp"111⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\D736.tmp"C:\Users\Admin\AppData\Local\Temp\D736.tmp"112⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\D7C2.tmp"C:\Users\Admin\AppData\Local\Temp\D7C2.tmp"113⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\D83F.tmp"C:\Users\Admin\AppData\Local\Temp\D83F.tmp"114⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"115⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\DA62.tmp"C:\Users\Admin\AppData\Local\Temp\DA62.tmp"116⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\DAFE.tmp"C:\Users\Admin\AppData\Local\Temp\DAFE.tmp"117⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"118⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\DC46.tmp"C:\Users\Admin\AppData\Local\Temp\DC46.tmp"119⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\DCD3.tmp"C:\Users\Admin\AppData\Local\Temp\DCD3.tmp"120⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\DD6F.tmp"C:\Users\Admin\AppData\Local\Temp\DD6F.tmp"121⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\DDFC.tmp"C:\Users\Admin\AppData\Local\Temp\DDFC.tmp"122⤵PID:1392
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-