Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 18:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
88408b95b68c25a7efb7347b793685b7_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
88408b95b68c25a7efb7347b793685b7_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
88408b95b68c25a7efb7347b793685b7_mafia_JC.exe
-
Size
486KB
-
MD5
88408b95b68c25a7efb7347b793685b7
-
SHA1
21f9bdd667059c78480dabede5aabe58e5b1e4a6
-
SHA256
94450e72f6d4dfa148e72053f9b64de0585f88a0cc424be5ccbf940f365e0598
-
SHA512
d5891ec126c654be09d35f48fd50aa90df7db4c3b6ba9c48b0ae18ffa0047664ea16579c4f0e2a5f42cb9434c2ba26e4180338ae7852513ddea972c7f77d3908
-
SSDEEP
12288:UU5rCOTeiDoBzrtZr8269hUv0+TiyLNZ:UUQOJD091ghNTgN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4072 B863.tmp 3824 B92E.tmp 3816 B9F9.tmp 1836 BAE4.tmp 4240 BF58.tmp 3380 D3CB.tmp 60 D486.tmp 1264 D522.tmp 3752 D5BF.tmp 3076 D67A.tmp 4052 D6F7.tmp 4180 D7B3.tmp 3232 D84F.tmp 4948 D90A.tmp 5036 DDDD.tmp 4192 E213.tmp 1760 E2CE.tmp 4560 E37A.tmp 2668 E416.tmp 3464 E4C2.tmp 2144 E58D.tmp 4568 E668.tmp 3448 E733.tmp 2672 E81E.tmp 244 E89B.tmp 4320 E995.tmp 3700 EA31.tmp 4736 EB2B.tmp 2588 EE38.tmp 4664 EF13.tmp 4480 EFFD.tmp 2704 F0E8.tmp 2220 F194.tmp 2992 F201.tmp 3328 F26E.tmp 1320 F2FB.tmp 1296 F397.tmp 4456 F405.tmp 3456 F491.tmp 2204 F51E.tmp 1652 F5CA.tmp 2596 F656.tmp 2008 F6E3.tmp 2712 F760.tmp 1968 F7DD.tmp 2652 F86A.tmp 2932 F8E7.tmp 3376 F983.tmp 3392 FA2F.tmp 1648 FAAC.tmp 932 FB58.tmp 2636 FBD5.tmp 3044 FC52.tmp 2352 4CD.tmp 2592 53B.tmp 1136 5B8.tmp 2120 981.tmp 4316 9EE.tmp 4512 A5B.tmp 3800 AE8.tmp 2688 F3D.tmp 4224 FDA.tmp 1696 1057.tmp 4636 11AE.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 4072 2064 88408b95b68c25a7efb7347b793685b7_mafia_JC.exe 82 PID 2064 wrote to memory of 4072 2064 88408b95b68c25a7efb7347b793685b7_mafia_JC.exe 82 PID 2064 wrote to memory of 4072 2064 88408b95b68c25a7efb7347b793685b7_mafia_JC.exe 82 PID 4072 wrote to memory of 3824 4072 B863.tmp 83 PID 4072 wrote to memory of 3824 4072 B863.tmp 83 PID 4072 wrote to memory of 3824 4072 B863.tmp 83 PID 3824 wrote to memory of 3816 3824 B92E.tmp 84 PID 3824 wrote to memory of 3816 3824 B92E.tmp 84 PID 3824 wrote to memory of 3816 3824 B92E.tmp 84 PID 3816 wrote to memory of 1836 3816 B9F9.tmp 85 PID 3816 wrote to memory of 1836 3816 B9F9.tmp 85 PID 3816 wrote to memory of 1836 3816 B9F9.tmp 85 PID 1836 wrote to memory of 4240 1836 BAE4.tmp 86 PID 1836 wrote to memory of 4240 1836 BAE4.tmp 86 PID 1836 wrote to memory of 4240 1836 BAE4.tmp 86 PID 4240 wrote to memory of 3380 4240 BF58.tmp 87 PID 4240 wrote to memory of 3380 4240 BF58.tmp 87 PID 4240 wrote to memory of 3380 4240 BF58.tmp 87 PID 3380 wrote to memory of 60 3380 D3CB.tmp 88 PID 3380 wrote to memory of 60 3380 D3CB.tmp 88 PID 3380 wrote to memory of 60 3380 D3CB.tmp 88 PID 60 wrote to memory of 1264 60 D486.tmp 89 PID 60 wrote to memory of 1264 60 D486.tmp 89 PID 60 wrote to memory of 1264 60 D486.tmp 89 PID 1264 wrote to memory of 3752 1264 D522.tmp 90 PID 1264 wrote to memory of 3752 1264 D522.tmp 90 PID 1264 wrote to memory of 3752 1264 D522.tmp 90 PID 3752 wrote to memory of 3076 3752 D5BF.tmp 91 PID 3752 wrote to memory of 3076 3752 D5BF.tmp 91 PID 3752 wrote to memory of 3076 3752 D5BF.tmp 91 PID 3076 wrote to memory of 4052 3076 D67A.tmp 92 PID 3076 wrote to memory of 4052 3076 D67A.tmp 92 PID 3076 wrote to memory of 4052 3076 D67A.tmp 92 PID 4052 wrote to memory of 4180 4052 D6F7.tmp 93 PID 4052 wrote to memory of 4180 4052 D6F7.tmp 93 PID 4052 wrote to memory of 4180 4052 D6F7.tmp 93 PID 4180 wrote to memory of 3232 4180 D7B3.tmp 94 PID 4180 wrote to memory of 3232 4180 D7B3.tmp 94 PID 4180 wrote to memory of 3232 4180 D7B3.tmp 94 PID 3232 wrote to memory of 4948 3232 D84F.tmp 95 PID 3232 wrote to memory of 4948 3232 D84F.tmp 95 PID 3232 wrote to memory of 4948 3232 D84F.tmp 95 PID 4948 wrote to memory of 5036 4948 D90A.tmp 96 PID 4948 wrote to memory of 5036 4948 D90A.tmp 96 PID 4948 wrote to memory of 5036 4948 D90A.tmp 96 PID 5036 wrote to memory of 4192 5036 DDDD.tmp 97 PID 5036 wrote to memory of 4192 5036 DDDD.tmp 97 PID 5036 wrote to memory of 4192 5036 DDDD.tmp 97 PID 4192 wrote to memory of 1760 4192 E213.tmp 98 PID 4192 wrote to memory of 1760 4192 E213.tmp 98 PID 4192 wrote to memory of 1760 4192 E213.tmp 98 PID 1760 wrote to memory of 4560 1760 E2CE.tmp 99 PID 1760 wrote to memory of 4560 1760 E2CE.tmp 99 PID 1760 wrote to memory of 4560 1760 E2CE.tmp 99 PID 4560 wrote to memory of 2668 4560 E37A.tmp 100 PID 4560 wrote to memory of 2668 4560 E37A.tmp 100 PID 4560 wrote to memory of 2668 4560 E37A.tmp 100 PID 2668 wrote to memory of 3464 2668 E416.tmp 101 PID 2668 wrote to memory of 3464 2668 E416.tmp 101 PID 2668 wrote to memory of 3464 2668 E416.tmp 101 PID 3464 wrote to memory of 2144 3464 E4C2.tmp 102 PID 3464 wrote to memory of 2144 3464 E4C2.tmp 102 PID 3464 wrote to memory of 2144 3464 E4C2.tmp 102 PID 2144 wrote to memory of 4568 2144 E58D.tmp 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\88408b95b68c25a7efb7347b793685b7_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\88408b95b68c25a7efb7347b793685b7_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\B863.tmp"C:\Users\Admin\AppData\Local\Temp\B863.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\B92E.tmp"C:\Users\Admin\AppData\Local\Temp\B92E.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\B9F9.tmp"C:\Users\Admin\AppData\Local\Temp\B9F9.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\BF58.tmp"C:\Users\Admin\AppData\Local\Temp\BF58.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\D486.tmp"C:\Users\Admin\AppData\Local\Temp\D486.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\D522.tmp"C:\Users\Admin\AppData\Local\Temp\D522.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\D67A.tmp"C:\Users\Admin\AppData\Local\Temp\D67A.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\D84F.tmp"C:\Users\Admin\AppData\Local\Temp\D84F.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\D90A.tmp"C:\Users\Admin\AppData\Local\Temp\D90A.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\DDDD.tmp"C:\Users\Admin\AppData\Local\Temp\DDDD.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\E213.tmp"C:\Users\Admin\AppData\Local\Temp\E213.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\E37A.tmp"C:\Users\Admin\AppData\Local\Temp\E37A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\E416.tmp"C:\Users\Admin\AppData\Local\Temp\E416.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"C:\Users\Admin\AppData\Local\Temp\E4C2.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\E58D.tmp"C:\Users\Admin\AppData\Local\Temp\E58D.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\E668.tmp"C:\Users\Admin\AppData\Local\Temp\E668.tmp"23⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\E733.tmp"C:\Users\Admin\AppData\Local\Temp\E733.tmp"24⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\E81E.tmp"C:\Users\Admin\AppData\Local\Temp\E81E.tmp"25⤵
- Executes dropped EXE
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\E89B.tmp"C:\Users\Admin\AppData\Local\Temp\E89B.tmp"26⤵
- Executes dropped EXE
PID:244 -
C:\Users\Admin\AppData\Local\Temp\E995.tmp"C:\Users\Admin\AppData\Local\Temp\E995.tmp"27⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\EA31.tmp"C:\Users\Admin\AppData\Local\Temp\EA31.tmp"28⤵
- Executes dropped EXE
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"29⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\EE38.tmp"C:\Users\Admin\AppData\Local\Temp\EE38.tmp"30⤵
- Executes dropped EXE
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\EF13.tmp"C:\Users\Admin\AppData\Local\Temp\EF13.tmp"31⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"32⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\F0E8.tmp"C:\Users\Admin\AppData\Local\Temp\F0E8.tmp"33⤵
- Executes dropped EXE
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\F194.tmp"C:\Users\Admin\AppData\Local\Temp\F194.tmp"34⤵
- Executes dropped EXE
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\F201.tmp"C:\Users\Admin\AppData\Local\Temp\F201.tmp"35⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\F26E.tmp"C:\Users\Admin\AppData\Local\Temp\F26E.tmp"36⤵
- Executes dropped EXE
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\F2FB.tmp"C:\Users\Admin\AppData\Local\Temp\F2FB.tmp"37⤵
- Executes dropped EXE
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\F397.tmp"C:\Users\Admin\AppData\Local\Temp\F397.tmp"38⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\F405.tmp"C:\Users\Admin\AppData\Local\Temp\F405.tmp"39⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\F491.tmp"C:\Users\Admin\AppData\Local\Temp\F491.tmp"40⤵
- Executes dropped EXE
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\F51E.tmp"C:\Users\Admin\AppData\Local\Temp\F51E.tmp"41⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\F5CA.tmp"C:\Users\Admin\AppData\Local\Temp\F5CA.tmp"42⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\F656.tmp"C:\Users\Admin\AppData\Local\Temp\F656.tmp"43⤵
- Executes dropped EXE
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"44⤵
- Executes dropped EXE
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\F760.tmp"C:\Users\Admin\AppData\Local\Temp\F760.tmp"45⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"C:\Users\Admin\AppData\Local\Temp\F7DD.tmp"46⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\F86A.tmp"C:\Users\Admin\AppData\Local\Temp\F86A.tmp"47⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\F8E7.tmp"C:\Users\Admin\AppData\Local\Temp\F8E7.tmp"48⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\F983.tmp"C:\Users\Admin\AppData\Local\Temp\F983.tmp"49⤵
- Executes dropped EXE
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"C:\Users\Admin\AppData\Local\Temp\FA2F.tmp"50⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"51⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\FB58.tmp"C:\Users\Admin\AppData\Local\Temp\FB58.tmp"52⤵
- Executes dropped EXE
PID:932 -
C:\Users\Admin\AppData\Local\Temp\FBD5.tmp"C:\Users\Admin\AppData\Local\Temp\FBD5.tmp"53⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"54⤵
- Executes dropped EXE
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\4CD.tmp"C:\Users\Admin\AppData\Local\Temp\4CD.tmp"55⤵
- Executes dropped EXE
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\53B.tmp"C:\Users\Admin\AppData\Local\Temp\53B.tmp"56⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\5B8.tmp"C:\Users\Admin\AppData\Local\Temp\5B8.tmp"57⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\981.tmp"C:\Users\Admin\AppData\Local\Temp\981.tmp"58⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\9EE.tmp"C:\Users\Admin\AppData\Local\Temp\9EE.tmp"59⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\A5B.tmp"C:\Users\Admin\AppData\Local\Temp\A5B.tmp"60⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\AE8.tmp"C:\Users\Admin\AppData\Local\Temp\AE8.tmp"61⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\F3D.tmp"C:\Users\Admin\AppData\Local\Temp\F3D.tmp"62⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\FDA.tmp"C:\Users\Admin\AppData\Local\Temp\FDA.tmp"63⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\1057.tmp"C:\Users\Admin\AppData\Local\Temp\1057.tmp"64⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\11AE.tmp"C:\Users\Admin\AppData\Local\Temp\11AE.tmp"65⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\121C.tmp"C:\Users\Admin\AppData\Local\Temp\121C.tmp"66⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\1299.tmp"C:\Users\Admin\AppData\Local\Temp\1299.tmp"67⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\12F6.tmp"C:\Users\Admin\AppData\Local\Temp\12F6.tmp"68⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\1364.tmp"C:\Users\Admin\AppData\Local\Temp\1364.tmp"69⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\13D1.tmp"C:\Users\Admin\AppData\Local\Temp\13D1.tmp"70⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\14CB.tmp"C:\Users\Admin\AppData\Local\Temp\14CB.tmp"71⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\1548.tmp"C:\Users\Admin\AppData\Local\Temp\1548.tmp"72⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\15F4.tmp"C:\Users\Admin\AppData\Local\Temp\15F4.tmp"73⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\19FB.tmp"C:\Users\Admin\AppData\Local\Temp\19FB.tmp"74⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"75⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"C:\Users\Admin\AppData\Local\Temp\1C5D.tmp"76⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\1CF9.tmp"C:\Users\Admin\AppData\Local\Temp\1CF9.tmp"77⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\1D76.tmp"C:\Users\Admin\AppData\Local\Temp\1D76.tmp"78⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"79⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\1E60.tmp"C:\Users\Admin\AppData\Local\Temp\1E60.tmp"80⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\1EBE.tmp"C:\Users\Admin\AppData\Local\Temp\1EBE.tmp"81⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"C:\Users\Admin\AppData\Local\Temp\1F1C.tmp"82⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\1FE7.tmp"C:\Users\Admin\AppData\Local\Temp\1FE7.tmp"83⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\2064.tmp"C:\Users\Admin\AppData\Local\Temp\2064.tmp"84⤵PID:244
-
C:\Users\Admin\AppData\Local\Temp\2546.tmp"C:\Users\Admin\AppData\Local\Temp\2546.tmp"85⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\25C3.tmp"C:\Users\Admin\AppData\Local\Temp\25C3.tmp"86⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\28E0.tmp"C:\Users\Admin\AppData\Local\Temp\28E0.tmp"87⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\295D.tmp"C:\Users\Admin\AppData\Local\Temp\295D.tmp"88⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\29F9.tmp"C:\Users\Admin\AppData\Local\Temp\29F9.tmp"89⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\2F77.tmp"C:\Users\Admin\AppData\Local\Temp\2F77.tmp"90⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\3081.tmp"C:\Users\Admin\AppData\Local\Temp\3081.tmp"91⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\3747.tmp"C:\Users\Admin\AppData\Local\Temp\3747.tmp"92⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\37B5.tmp"C:\Users\Admin\AppData\Local\Temp\37B5.tmp"93⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\3841.tmp"C:\Users\Admin\AppData\Local\Temp\3841.tmp"94⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\394B.tmp"C:\Users\Admin\AppData\Local\Temp\394B.tmp"95⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\39B8.tmp"C:\Users\Admin\AppData\Local\Temp\39B8.tmp"96⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\3A45.tmp"C:\Users\Admin\AppData\Local\Temp\3A45.tmp"97⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\3AC2.tmp"C:\Users\Admin\AppData\Local\Temp\3AC2.tmp"98⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"99⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"100⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\3C58.tmp"C:\Users\Admin\AppData\Local\Temp\3C58.tmp"101⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\40EC.tmp"C:\Users\Admin\AppData\Local\Temp\40EC.tmp"102⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\4169.tmp"C:\Users\Admin\AppData\Local\Temp\4169.tmp"103⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\41C7.tmp"C:\Users\Admin\AppData\Local\Temp\41C7.tmp"104⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"105⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"C:\Users\Admin\AppData\Local\Temp\4BE9.tmp"106⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\4F63.tmp"C:\Users\Admin\AppData\Local\Temp\4F63.tmp"107⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\504E.tmp"C:\Users\Admin\AppData\Local\Temp\504E.tmp"108⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\555E.tmp"C:\Users\Admin\AppData\Local\Temp\555E.tmp"109⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\59B4.tmp"C:\Users\Admin\AppData\Local\Temp\59B4.tmp"110⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\5C54.tmp"C:\Users\Admin\AppData\Local\Temp\5C54.tmp"111⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\5FBF.tmp"C:\Users\Admin\AppData\Local\Temp\5FBF.tmp"112⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\6491.tmp"C:\Users\Admin\AppData\Local\Temp\6491.tmp"113⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\6637.tmp"C:\Users\Admin\AppData\Local\Temp\6637.tmp"114⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\6AFA.tmp"C:\Users\Admin\AppData\Local\Temp\6AFA.tmp"115⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"116⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\721E.tmp"C:\Users\Admin\AppData\Local\Temp\721E.tmp"117⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\73B4.tmp"C:\Users\Admin\AppData\Local\Temp\73B4.tmp"118⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\78A6.tmp"C:\Users\Admin\AppData\Local\Temp\78A6.tmp"119⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"120⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\895F.tmp"C:\Users\Admin\AppData\Local\Temp\895F.tmp"121⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\8D66.tmp"C:\Users\Admin\AppData\Local\Temp\8D66.tmp"122⤵PID:1664
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-