Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
8cb45d92aa35e57e097083f340c83121_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8cb45d92aa35e57e097083f340c83121_mafia_JC.exe
Resource
win10v2004-20230824-en
General
-
Target
8cb45d92aa35e57e097083f340c83121_mafia_JC.exe
-
Size
486KB
-
MD5
8cb45d92aa35e57e097083f340c83121
-
SHA1
711ac264277ddf4320a6bf2165db6538133bc568
-
SHA256
38ef67a8b3ac2dacfbb7839d2b6c52f002f1bfbd3aed69e131096dca625b89a6
-
SHA512
9f55fc82aa02e55a9a1ab2250d6635e366c8580fd08761a59d656571187e09fcb201e39c15b08d7299ee01369a80b7d509ca96006fb3b3919e5664befe992c19
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD785/7GBU7XFUTW4NYux/gPpCXH9iyQtHaNH5G:/U5rCOTeiDBBUpeNYJyJ6Ha0NZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1492 11DD.tmp 1948 197E.tmp 984 1C6C.tmp 2932 1FD7.tmp 1836 20B2.tmp 1812 218D.tmp 3484 22B6.tmp 1120 240D.tmp 1944 2517.tmp 4804 2640.tmp 4808 272A.tmp 3904 2834.tmp 4556 294D.tmp 2224 2A18.tmp 4656 2B32.tmp 3852 2BAF.tmp 2432 2C99.tmp 2916 2DA3.tmp 2236 2E7D.tmp 3024 2FA6.tmp 4100 3071.tmp 3888 312D.tmp 1068 31F8.tmp 2884 32E2.tmp 3868 33DC.tmp 1228 34A7.tmp 1720 3563.tmp 4984 363E.tmp 2688 3738.tmp 1840 37F3.tmp 2496 38DE.tmp 2828 3989.tmp 1604 3A35.tmp 4108 3AC2.tmp 2444 3B2F.tmp 1572 3B9D.tmp 924 3C49.tmp 3404 3D14.tmp 1752 3DB0.tmp 4856 3E4C.tmp 3864 3EE8.tmp 2168 3F75.tmp 3480 4021.tmp 4528 40BD.tmp 4168 412B.tmp 4116 41B7.tmp 2692 4234.tmp 2748 42D0.tmp 3436 437C.tmp 3552 43F9.tmp 4028 4496.tmp 4280 4541.tmp 3532 45BE.tmp 3920 465B.tmp 2968 4716.tmp 2492 47C2.tmp 984 484F.tmp 2032 48CC.tmp 1508 4958.tmp 2300 4A04.tmp 4524 4A91.tmp 3076 4B2D.tmp 4200 4BD9.tmp 3900 4C75.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4452 wrote to memory of 1492 4452 8cb45d92aa35e57e097083f340c83121_mafia_JC.exe 85 PID 4452 wrote to memory of 1492 4452 8cb45d92aa35e57e097083f340c83121_mafia_JC.exe 85 PID 4452 wrote to memory of 1492 4452 8cb45d92aa35e57e097083f340c83121_mafia_JC.exe 85 PID 1492 wrote to memory of 1948 1492 11DD.tmp 86 PID 1492 wrote to memory of 1948 1492 11DD.tmp 86 PID 1492 wrote to memory of 1948 1492 11DD.tmp 86 PID 1948 wrote to memory of 984 1948 197E.tmp 88 PID 1948 wrote to memory of 984 1948 197E.tmp 88 PID 1948 wrote to memory of 984 1948 197E.tmp 88 PID 984 wrote to memory of 2932 984 1C6C.tmp 89 PID 984 wrote to memory of 2932 984 1C6C.tmp 89 PID 984 wrote to memory of 2932 984 1C6C.tmp 89 PID 2932 wrote to memory of 1836 2932 1FD7.tmp 90 PID 2932 wrote to memory of 1836 2932 1FD7.tmp 90 PID 2932 wrote to memory of 1836 2932 1FD7.tmp 90 PID 1836 wrote to memory of 1812 1836 20B2.tmp 91 PID 1836 wrote to memory of 1812 1836 20B2.tmp 91 PID 1836 wrote to memory of 1812 1836 20B2.tmp 91 PID 1812 wrote to memory of 3484 1812 218D.tmp 92 PID 1812 wrote to memory of 3484 1812 218D.tmp 92 PID 1812 wrote to memory of 3484 1812 218D.tmp 92 PID 3484 wrote to memory of 1120 3484 22B6.tmp 93 PID 3484 wrote to memory of 1120 3484 22B6.tmp 93 PID 3484 wrote to memory of 1120 3484 22B6.tmp 93 PID 1120 wrote to memory of 1944 1120 240D.tmp 94 PID 1120 wrote to memory of 1944 1120 240D.tmp 94 PID 1120 wrote to memory of 1944 1120 240D.tmp 94 PID 1944 wrote to memory of 4804 1944 2517.tmp 95 PID 1944 wrote to memory of 4804 1944 2517.tmp 95 PID 1944 wrote to memory of 4804 1944 2517.tmp 95 PID 4804 wrote to memory of 4808 4804 2640.tmp 96 PID 4804 wrote to memory of 4808 4804 2640.tmp 96 PID 4804 wrote to memory of 4808 4804 2640.tmp 96 PID 4808 wrote to memory of 3904 4808 272A.tmp 97 PID 4808 wrote to memory of 3904 4808 272A.tmp 97 PID 4808 wrote to memory of 3904 4808 272A.tmp 97 PID 3904 wrote to memory of 4556 3904 2834.tmp 98 PID 3904 wrote to memory of 4556 3904 2834.tmp 98 PID 3904 wrote to memory of 4556 3904 2834.tmp 98 PID 4556 wrote to memory of 2224 4556 294D.tmp 99 PID 4556 wrote to memory of 2224 4556 294D.tmp 99 PID 4556 wrote to memory of 2224 4556 294D.tmp 99 PID 2224 wrote to memory of 4656 2224 2A18.tmp 100 PID 2224 wrote to memory of 4656 2224 2A18.tmp 100 PID 2224 wrote to memory of 4656 2224 2A18.tmp 100 PID 4656 wrote to memory of 3852 4656 2B32.tmp 101 PID 4656 wrote to memory of 3852 4656 2B32.tmp 101 PID 4656 wrote to memory of 3852 4656 2B32.tmp 101 PID 3852 wrote to memory of 2432 3852 2BAF.tmp 102 PID 3852 wrote to memory of 2432 3852 2BAF.tmp 102 PID 3852 wrote to memory of 2432 3852 2BAF.tmp 102 PID 2432 wrote to memory of 2916 2432 2C99.tmp 103 PID 2432 wrote to memory of 2916 2432 2C99.tmp 103 PID 2432 wrote to memory of 2916 2432 2C99.tmp 103 PID 2916 wrote to memory of 2236 2916 2DA3.tmp 104 PID 2916 wrote to memory of 2236 2916 2DA3.tmp 104 PID 2916 wrote to memory of 2236 2916 2DA3.tmp 104 PID 2236 wrote to memory of 3024 2236 2E7D.tmp 105 PID 2236 wrote to memory of 3024 2236 2E7D.tmp 105 PID 2236 wrote to memory of 3024 2236 2E7D.tmp 105 PID 3024 wrote to memory of 4100 3024 2FA6.tmp 106 PID 3024 wrote to memory of 4100 3024 2FA6.tmp 106 PID 3024 wrote to memory of 4100 3024 2FA6.tmp 106 PID 4100 wrote to memory of 3888 4100 3071.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cb45d92aa35e57e097083f340c83121_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\8cb45d92aa35e57e097083f340c83121_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\11DD.tmp"C:\Users\Admin\AppData\Local\Temp\11DD.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\197E.tmp"C:\Users\Admin\AppData\Local\Temp\197E.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\20B2.tmp"C:\Users\Admin\AppData\Local\Temp\20B2.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\218D.tmp"C:\Users\Admin\AppData\Local\Temp\218D.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\22B6.tmp"C:\Users\Admin\AppData\Local\Temp\22B6.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\240D.tmp"C:\Users\Admin\AppData\Local\Temp\240D.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\2517.tmp"C:\Users\Admin\AppData\Local\Temp\2517.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\2640.tmp"C:\Users\Admin\AppData\Local\Temp\2640.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\272A.tmp"C:\Users\Admin\AppData\Local\Temp\272A.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\2834.tmp"C:\Users\Admin\AppData\Local\Temp\2834.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\2A18.tmp"C:\Users\Admin\AppData\Local\Temp\2A18.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\2B32.tmp"C:\Users\Admin\AppData\Local\Temp\2B32.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"C:\Users\Admin\AppData\Local\Temp\2BAF.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\2C99.tmp"C:\Users\Admin\AppData\Local\Temp\2C99.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\2E7D.tmp"C:\Users\Admin\AppData\Local\Temp\2E7D.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\3071.tmp"C:\Users\Admin\AppData\Local\Temp\3071.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\312D.tmp"C:\Users\Admin\AppData\Local\Temp\312D.tmp"23⤵
- Executes dropped EXE
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\31F8.tmp"C:\Users\Admin\AppData\Local\Temp\31F8.tmp"24⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\32E2.tmp"C:\Users\Admin\AppData\Local\Temp\32E2.tmp"25⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"26⤵
- Executes dropped EXE
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\34A7.tmp"C:\Users\Admin\AppData\Local\Temp\34A7.tmp"27⤵
- Executes dropped EXE
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\3563.tmp"C:\Users\Admin\AppData\Local\Temp\3563.tmp"28⤵
- Executes dropped EXE
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\363E.tmp"C:\Users\Admin\AppData\Local\Temp\363E.tmp"29⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\3738.tmp"C:\Users\Admin\AppData\Local\Temp\3738.tmp"30⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\37F3.tmp"C:\Users\Admin\AppData\Local\Temp\37F3.tmp"31⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\38DE.tmp"C:\Users\Admin\AppData\Local\Temp\38DE.tmp"32⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\3989.tmp"C:\Users\Admin\AppData\Local\Temp\3989.tmp"33⤵
- Executes dropped EXE
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\3A35.tmp"C:\Users\Admin\AppData\Local\Temp\3A35.tmp"34⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\3AC2.tmp"C:\Users\Admin\AppData\Local\Temp\3AC2.tmp"35⤵
- Executes dropped EXE
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"C:\Users\Admin\AppData\Local\Temp\3B2F.tmp"36⤵
- Executes dropped EXE
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\3B9D.tmp"C:\Users\Admin\AppData\Local\Temp\3B9D.tmp"37⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3C49.tmp"C:\Users\Admin\AppData\Local\Temp\3C49.tmp"38⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\3D14.tmp"C:\Users\Admin\AppData\Local\Temp\3D14.tmp"39⤵
- Executes dropped EXE
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"40⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"41⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\3EE8.tmp"C:\Users\Admin\AppData\Local\Temp\3EE8.tmp"42⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\3F75.tmp"C:\Users\Admin\AppData\Local\Temp\3F75.tmp"43⤵
- Executes dropped EXE
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\4021.tmp"C:\Users\Admin\AppData\Local\Temp\4021.tmp"44⤵
- Executes dropped EXE
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\40BD.tmp"C:\Users\Admin\AppData\Local\Temp\40BD.tmp"45⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\412B.tmp"C:\Users\Admin\AppData\Local\Temp\412B.tmp"46⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\41B7.tmp"C:\Users\Admin\AppData\Local\Temp\41B7.tmp"47⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\4234.tmp"C:\Users\Admin\AppData\Local\Temp\4234.tmp"48⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\42D0.tmp"C:\Users\Admin\AppData\Local\Temp\42D0.tmp"49⤵
- Executes dropped EXE
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\437C.tmp"C:\Users\Admin\AppData\Local\Temp\437C.tmp"50⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\43F9.tmp"C:\Users\Admin\AppData\Local\Temp\43F9.tmp"51⤵
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\4496.tmp"C:\Users\Admin\AppData\Local\Temp\4496.tmp"52⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\4541.tmp"C:\Users\Admin\AppData\Local\Temp\4541.tmp"53⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\45BE.tmp"C:\Users\Admin\AppData\Local\Temp\45BE.tmp"54⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\465B.tmp"C:\Users\Admin\AppData\Local\Temp\465B.tmp"55⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\4716.tmp"C:\Users\Admin\AppData\Local\Temp\4716.tmp"56⤵
- Executes dropped EXE
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"57⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\484F.tmp"C:\Users\Admin\AppData\Local\Temp\484F.tmp"58⤵
- Executes dropped EXE
PID:984 -
C:\Users\Admin\AppData\Local\Temp\48CC.tmp"C:\Users\Admin\AppData\Local\Temp\48CC.tmp"59⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\4958.tmp"C:\Users\Admin\AppData\Local\Temp\4958.tmp"60⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\4A04.tmp"C:\Users\Admin\AppData\Local\Temp\4A04.tmp"61⤵
- Executes dropped EXE
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\4A91.tmp"C:\Users\Admin\AppData\Local\Temp\4A91.tmp"62⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\4B2D.tmp"C:\Users\Admin\AppData\Local\Temp\4B2D.tmp"63⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"64⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\4C75.tmp"C:\Users\Admin\AppData\Local\Temp\4C75.tmp"65⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\4D21.tmp"C:\Users\Admin\AppData\Local\Temp\4D21.tmp"66⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"67⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\4E1B.tmp"C:\Users\Admin\AppData\Local\Temp\4E1B.tmp"68⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\4EB7.tmp"C:\Users\Admin\AppData\Local\Temp\4EB7.tmp"69⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\500F.tmp"C:\Users\Admin\AppData\Local\Temp\500F.tmp"70⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\50CB.tmp"C:\Users\Admin\AppData\Local\Temp\50CB.tmp"71⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\5167.tmp"C:\Users\Admin\AppData\Local\Temp\5167.tmp"72⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\51F3.tmp"C:\Users\Admin\AppData\Local\Temp\51F3.tmp"73⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\5290.tmp"C:\Users\Admin\AppData\Local\Temp\5290.tmp"74⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\532C.tmp"C:\Users\Admin\AppData\Local\Temp\532C.tmp"75⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\53A9.tmp"C:\Users\Admin\AppData\Local\Temp\53A9.tmp"76⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\5445.tmp"C:\Users\Admin\AppData\Local\Temp\5445.tmp"77⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\54C2.tmp"C:\Users\Admin\AppData\Local\Temp\54C2.tmp"78⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\554F.tmp"C:\Users\Admin\AppData\Local\Temp\554F.tmp"79⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\55DB.tmp"C:\Users\Admin\AppData\Local\Temp\55DB.tmp"80⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\5649.tmp"C:\Users\Admin\AppData\Local\Temp\5649.tmp"81⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\56E5.tmp"C:\Users\Admin\AppData\Local\Temp\56E5.tmp"82⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\5772.tmp"C:\Users\Admin\AppData\Local\Temp\5772.tmp"83⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\57FE.tmp"C:\Users\Admin\AppData\Local\Temp\57FE.tmp"84⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\58AA.tmp"C:\Users\Admin\AppData\Local\Temp\58AA.tmp"85⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\5918.tmp"C:\Users\Admin\AppData\Local\Temp\5918.tmp"86⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\5985.tmp"C:\Users\Admin\AppData\Local\Temp\5985.tmp"87⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\5A02.tmp"C:\Users\Admin\AppData\Local\Temp\5A02.tmp"88⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\5A8F.tmp"C:\Users\Admin\AppData\Local\Temp\5A8F.tmp"89⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\5B2B.tmp"C:\Users\Admin\AppData\Local\Temp\5B2B.tmp"90⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\5B98.tmp"C:\Users\Admin\AppData\Local\Temp\5B98.tmp"91⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\5C15.tmp"C:\Users\Admin\AppData\Local\Temp\5C15.tmp"92⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\5C92.tmp"C:\Users\Admin\AppData\Local\Temp\5C92.tmp"93⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\5D3E.tmp"C:\Users\Admin\AppData\Local\Temp\5D3E.tmp"94⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\5DBB.tmp"C:\Users\Admin\AppData\Local\Temp\5DBB.tmp"95⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\5E28.tmp"C:\Users\Admin\AppData\Local\Temp\5E28.tmp"96⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\5EA5.tmp"C:\Users\Admin\AppData\Local\Temp\5EA5.tmp"97⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\5F22.tmp"C:\Users\Admin\AppData\Local\Temp\5F22.tmp"98⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"99⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\602C.tmp"C:\Users\Admin\AppData\Local\Temp\602C.tmp"100⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\60A9.tmp"C:\Users\Admin\AppData\Local\Temp\60A9.tmp"101⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\6155.tmp"C:\Users\Admin\AppData\Local\Temp\6155.tmp"102⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\61C2.tmp"C:\Users\Admin\AppData\Local\Temp\61C2.tmp"103⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\623F.tmp"C:\Users\Admin\AppData\Local\Temp\623F.tmp"104⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\62BC.tmp"C:\Users\Admin\AppData\Local\Temp\62BC.tmp"105⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\6359.tmp"C:\Users\Admin\AppData\Local\Temp\6359.tmp"106⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\63C6.tmp"C:\Users\Admin\AppData\Local\Temp\63C6.tmp"107⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\6433.tmp"C:\Users\Admin\AppData\Local\Temp\6433.tmp"108⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\64C0.tmp"C:\Users\Admin\AppData\Local\Temp\64C0.tmp"109⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\654D.tmp"C:\Users\Admin\AppData\Local\Temp\654D.tmp"110⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\65BA.tmp"C:\Users\Admin\AppData\Local\Temp\65BA.tmp"111⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\6637.tmp"C:\Users\Admin\AppData\Local\Temp\6637.tmp"112⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\66D3.tmp"C:\Users\Admin\AppData\Local\Temp\66D3.tmp"113⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\6760.tmp"C:\Users\Admin\AppData\Local\Temp\6760.tmp"114⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\67FC.tmp"C:\Users\Admin\AppData\Local\Temp\67FC.tmp"115⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\6889.tmp"C:\Users\Admin\AppData\Local\Temp\6889.tmp"116⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\6935.tmp"C:\Users\Admin\AppData\Local\Temp\6935.tmp"117⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\69C1.tmp"C:\Users\Admin\AppData\Local\Temp\69C1.tmp"118⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\6A6D.tmp"C:\Users\Admin\AppData\Local\Temp\6A6D.tmp"119⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\6AEA.tmp"C:\Users\Admin\AppData\Local\Temp\6AEA.tmp"120⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\6B86.tmp"C:\Users\Admin\AppData\Local\Temp\6B86.tmp"121⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\6C23.tmp"C:\Users\Admin\AppData\Local\Temp\6C23.tmp"122⤵PID:2420
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-