Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
9989913ab5301832477939cc3bf3b32e_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9989913ab5301832477939cc3bf3b32e_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
9989913ab5301832477939cc3bf3b32e_mafia_JC.exe
-
Size
488KB
-
MD5
9989913ab5301832477939cc3bf3b32e
-
SHA1
294ae6ae44caecbd360c4b39ecb46d0e4c4e2d2e
-
SHA256
1ecba1d0efcdf2c42c21ed1cc85ec3f5b36c6fc40f2e5bcd4f077450f217f769
-
SHA512
0dcb81bd3ce1cddde21dd99acfaa6c5bed49bafd6d24ad3cb70e881f6a3918d6ce9753d1f9c3aaa4ec74f1b161b1d9a12e29d06253723b7a3ffe1e4822287f6f
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7XUQNhk9Mw0uaro9nEf/Kb7ddftlXcD6YBUxa:/U5rCOTeiDfk30Rro8/Kb7jVrWNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3028 6DFC.tmp 1660 6EC7.tmp 2696 6F73.tmp 3364 704E.tmp 3084 7109.tmp 4748 7407.tmp 868 74C2.tmp 3376 757E.tmp 1148 760B.tmp 1888 76D6.tmp 3148 7791.tmp 1456 787C.tmp 4116 7947.tmp 1984 79E3.tmp 3752 7CE1.tmp 1432 7D9C.tmp 4012 7E29.tmp 4584 7EC5.tmp 3484 7F80.tmp 4792 8482.tmp 1252 855C.tmp 3700 879F.tmp 3996 882B.tmp 4740 88E7.tmp 1640 8973.tmp 3456 89F0.tmp 2188 8F9D.tmp 2556 9069.tmp 1468 9376.tmp 2432 9422.tmp 3620 950C.tmp 4600 9F8C.tmp 3268 A066.tmp 4900 A1DD.tmp 3000 A4FA.tmp 4456 A596.tmp 2844 A604.tmp 3552 A681.tmp 3848 A74C.tmp 5068 AA3A.tmp 4504 AAA7.tmp 2928 AB44.tmp 1908 ABC1.tmp 2380 AC2E.tmp 1752 AC9B.tmp 4288 AE22.tmp 4264 AE8F.tmp 2612 AF0C.tmp 5112 AFA9.tmp 1280 B035.tmp 4928 B0A3.tmp 2696 B120.tmp 760 B1AC.tmp 3092 B239.tmp 3084 B2D5.tmp 3816 B352.tmp 1940 B3B0.tmp 2400 B44C.tmp 3376 B4E8.tmp 2772 B575.tmp 3808 B5F2.tmp 4852 B69E.tmp 3152 B72A.tmp 2144 BAE4.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 3028 4052 9989913ab5301832477939cc3bf3b32e_mafia_JC.exe 82 PID 4052 wrote to memory of 3028 4052 9989913ab5301832477939cc3bf3b32e_mafia_JC.exe 82 PID 4052 wrote to memory of 3028 4052 9989913ab5301832477939cc3bf3b32e_mafia_JC.exe 82 PID 3028 wrote to memory of 1660 3028 6DFC.tmp 83 PID 3028 wrote to memory of 1660 3028 6DFC.tmp 83 PID 3028 wrote to memory of 1660 3028 6DFC.tmp 83 PID 1660 wrote to memory of 2696 1660 6EC7.tmp 84 PID 1660 wrote to memory of 2696 1660 6EC7.tmp 84 PID 1660 wrote to memory of 2696 1660 6EC7.tmp 84 PID 2696 wrote to memory of 3364 2696 6F73.tmp 85 PID 2696 wrote to memory of 3364 2696 6F73.tmp 85 PID 2696 wrote to memory of 3364 2696 6F73.tmp 85 PID 3364 wrote to memory of 3084 3364 704E.tmp 86 PID 3364 wrote to memory of 3084 3364 704E.tmp 86 PID 3364 wrote to memory of 3084 3364 704E.tmp 86 PID 3084 wrote to memory of 4748 3084 7109.tmp 87 PID 3084 wrote to memory of 4748 3084 7109.tmp 87 PID 3084 wrote to memory of 4748 3084 7109.tmp 87 PID 4748 wrote to memory of 868 4748 7407.tmp 88 PID 4748 wrote to memory of 868 4748 7407.tmp 88 PID 4748 wrote to memory of 868 4748 7407.tmp 88 PID 868 wrote to memory of 3376 868 74C2.tmp 89 PID 868 wrote to memory of 3376 868 74C2.tmp 89 PID 868 wrote to memory of 3376 868 74C2.tmp 89 PID 3376 wrote to memory of 1148 3376 757E.tmp 90 PID 3376 wrote to memory of 1148 3376 757E.tmp 90 PID 3376 wrote to memory of 1148 3376 757E.tmp 90 PID 1148 wrote to memory of 1888 1148 760B.tmp 91 PID 1148 wrote to memory of 1888 1148 760B.tmp 91 PID 1148 wrote to memory of 1888 1148 760B.tmp 91 PID 1888 wrote to memory of 3148 1888 76D6.tmp 92 PID 1888 wrote to memory of 3148 1888 76D6.tmp 92 PID 1888 wrote to memory of 3148 1888 76D6.tmp 92 PID 3148 wrote to memory of 1456 3148 7791.tmp 93 PID 3148 wrote to memory of 1456 3148 7791.tmp 93 PID 3148 wrote to memory of 1456 3148 7791.tmp 93 PID 1456 wrote to memory of 4116 1456 787C.tmp 94 PID 1456 wrote to memory of 4116 1456 787C.tmp 94 PID 1456 wrote to memory of 4116 1456 787C.tmp 94 PID 4116 wrote to memory of 1984 4116 7947.tmp 95 PID 4116 wrote to memory of 1984 4116 7947.tmp 95 PID 4116 wrote to memory of 1984 4116 7947.tmp 95 PID 1984 wrote to memory of 3752 1984 79E3.tmp 96 PID 1984 wrote to memory of 3752 1984 79E3.tmp 96 PID 1984 wrote to memory of 3752 1984 79E3.tmp 96 PID 3752 wrote to memory of 1432 3752 7CE1.tmp 97 PID 3752 wrote to memory of 1432 3752 7CE1.tmp 97 PID 3752 wrote to memory of 1432 3752 7CE1.tmp 97 PID 1432 wrote to memory of 4012 1432 7D9C.tmp 98 PID 1432 wrote to memory of 4012 1432 7D9C.tmp 98 PID 1432 wrote to memory of 4012 1432 7D9C.tmp 98 PID 4012 wrote to memory of 4584 4012 7E29.tmp 99 PID 4012 wrote to memory of 4584 4012 7E29.tmp 99 PID 4012 wrote to memory of 4584 4012 7E29.tmp 99 PID 4584 wrote to memory of 3484 4584 7EC5.tmp 102 PID 4584 wrote to memory of 3484 4584 7EC5.tmp 102 PID 4584 wrote to memory of 3484 4584 7EC5.tmp 102 PID 3484 wrote to memory of 4792 3484 7F80.tmp 104 PID 3484 wrote to memory of 4792 3484 7F80.tmp 104 PID 3484 wrote to memory of 4792 3484 7F80.tmp 104 PID 4792 wrote to memory of 1252 4792 8482.tmp 105 PID 4792 wrote to memory of 1252 4792 8482.tmp 105 PID 4792 wrote to memory of 1252 4792 8482.tmp 105 PID 1252 wrote to memory of 3700 1252 855C.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\9989913ab5301832477939cc3bf3b32e_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\9989913ab5301832477939cc3bf3b32e_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\6DFC.tmp"C:\Users\Admin\AppData\Local\Temp\6DFC.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"C:\Users\Admin\AppData\Local\Temp\6EC7.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\6F73.tmp"C:\Users\Admin\AppData\Local\Temp\6F73.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\704E.tmp"C:\Users\Admin\AppData\Local\Temp\704E.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\7109.tmp"C:\Users\Admin\AppData\Local\Temp\7109.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\7407.tmp"C:\Users\Admin\AppData\Local\Temp\7407.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\74C2.tmp"C:\Users\Admin\AppData\Local\Temp\74C2.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\757E.tmp"C:\Users\Admin\AppData\Local\Temp\757E.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\760B.tmp"C:\Users\Admin\AppData\Local\Temp\760B.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\76D6.tmp"C:\Users\Admin\AppData\Local\Temp\76D6.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\7791.tmp"C:\Users\Admin\AppData\Local\Temp\7791.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\787C.tmp"C:\Users\Admin\AppData\Local\Temp\787C.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\7947.tmp"C:\Users\Admin\AppData\Local\Temp\7947.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\79E3.tmp"C:\Users\Admin\AppData\Local\Temp\79E3.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\7D9C.tmp"C:\Users\Admin\AppData\Local\Temp\7D9C.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\7E29.tmp"C:\Users\Admin\AppData\Local\Temp\7E29.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\7EC5.tmp"C:\Users\Admin\AppData\Local\Temp\7EC5.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\7F80.tmp"C:\Users\Admin\AppData\Local\Temp\7F80.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\8482.tmp"C:\Users\Admin\AppData\Local\Temp\8482.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\855C.tmp"C:\Users\Admin\AppData\Local\Temp\855C.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\879F.tmp"C:\Users\Admin\AppData\Local\Temp\879F.tmp"23⤵
- Executes dropped EXE
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\882B.tmp"C:\Users\Admin\AppData\Local\Temp\882B.tmp"24⤵
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\88E7.tmp"C:\Users\Admin\AppData\Local\Temp\88E7.tmp"25⤵
- Executes dropped EXE
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\8973.tmp"C:\Users\Admin\AppData\Local\Temp\8973.tmp"26⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\89F0.tmp"C:\Users\Admin\AppData\Local\Temp\89F0.tmp"27⤵
- Executes dropped EXE
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\8F9D.tmp"C:\Users\Admin\AppData\Local\Temp\8F9D.tmp"28⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\9069.tmp"C:\Users\Admin\AppData\Local\Temp\9069.tmp"29⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\9376.tmp"C:\Users\Admin\AppData\Local\Temp\9376.tmp"30⤵
- Executes dropped EXE
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\9422.tmp"C:\Users\Admin\AppData\Local\Temp\9422.tmp"31⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\950C.tmp"C:\Users\Admin\AppData\Local\Temp\950C.tmp"32⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"C:\Users\Admin\AppData\Local\Temp\9F8C.tmp"33⤵
- Executes dropped EXE
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\A066.tmp"C:\Users\Admin\AppData\Local\Temp\A066.tmp"34⤵
- Executes dropped EXE
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\A1DD.tmp"C:\Users\Admin\AppData\Local\Temp\A1DD.tmp"35⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\A4FA.tmp"C:\Users\Admin\AppData\Local\Temp\A4FA.tmp"36⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\A596.tmp"C:\Users\Admin\AppData\Local\Temp\A596.tmp"37⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\A604.tmp"C:\Users\Admin\AppData\Local\Temp\A604.tmp"38⤵
- Executes dropped EXE
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\A681.tmp"C:\Users\Admin\AppData\Local\Temp\A681.tmp"39⤵
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\A74C.tmp"C:\Users\Admin\AppData\Local\Temp\A74C.tmp"40⤵
- Executes dropped EXE
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\AA3A.tmp"C:\Users\Admin\AppData\Local\Temp\AA3A.tmp"41⤵
- Executes dropped EXE
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\AAA7.tmp"C:\Users\Admin\AppData\Local\Temp\AAA7.tmp"42⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\AB44.tmp"C:\Users\Admin\AppData\Local\Temp\AB44.tmp"43⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\ABC1.tmp"C:\Users\Admin\AppData\Local\Temp\ABC1.tmp"44⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"45⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"46⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\AE22.tmp"C:\Users\Admin\AppData\Local\Temp\AE22.tmp"47⤵
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\AE8F.tmp"C:\Users\Admin\AppData\Local\Temp\AE8F.tmp"48⤵
- Executes dropped EXE
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\AF0C.tmp"C:\Users\Admin\AppData\Local\Temp\AF0C.tmp"49⤵
- Executes dropped EXE
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\AFA9.tmp"C:\Users\Admin\AppData\Local\Temp\AFA9.tmp"50⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\B035.tmp"C:\Users\Admin\AppData\Local\Temp\B035.tmp"51⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"52⤵
- Executes dropped EXE
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\B120.tmp"C:\Users\Admin\AppData\Local\Temp\B120.tmp"53⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\B1AC.tmp"C:\Users\Admin\AppData\Local\Temp\B1AC.tmp"54⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\B239.tmp"C:\Users\Admin\AppData\Local\Temp\B239.tmp"55⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"56⤵
- Executes dropped EXE
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\B352.tmp"C:\Users\Admin\AppData\Local\Temp\B352.tmp"57⤵
- Executes dropped EXE
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\B3B0.tmp"C:\Users\Admin\AppData\Local\Temp\B3B0.tmp"58⤵
- Executes dropped EXE
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\B44C.tmp"C:\Users\Admin\AppData\Local\Temp\B44C.tmp"59⤵
- Executes dropped EXE
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"60⤵
- Executes dropped EXE
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\B575.tmp"C:\Users\Admin\AppData\Local\Temp\B575.tmp"61⤵
- Executes dropped EXE
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\B5F2.tmp"C:\Users\Admin\AppData\Local\Temp\B5F2.tmp"62⤵
- Executes dropped EXE
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\B69E.tmp"C:\Users\Admin\AppData\Local\Temp\B69E.tmp"63⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\B72A.tmp"C:\Users\Admin\AppData\Local\Temp\B72A.tmp"64⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"C:\Users\Admin\AppData\Local\Temp\BAE4.tmp"65⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\BB61.tmp"C:\Users\Admin\AppData\Local\Temp\BB61.tmp"66⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\BBFD.tmp"C:\Users\Admin\AppData\Local\Temp\BBFD.tmp"67⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"68⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\BD55.tmp"C:\Users\Admin\AppData\Local\Temp\BD55.tmp"69⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"70⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\BF29.tmp"C:\Users\Admin\AppData\Local\Temp\BF29.tmp"71⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\BFA6.tmp"C:\Users\Admin\AppData\Local\Temp\BFA6.tmp"72⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\C052.tmp"C:\Users\Admin\AppData\Local\Temp\C052.tmp"73⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\C0EE.tmp"C:\Users\Admin\AppData\Local\Temp\C0EE.tmp"74⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\C19A.tmp"C:\Users\Admin\AppData\Local\Temp\C19A.tmp"75⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\C237.tmp"C:\Users\Admin\AppData\Local\Temp\C237.tmp"76⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\C479.tmp"C:\Users\Admin\AppData\Local\Temp\C479.tmp"77⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"78⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\C534.tmp"C:\Users\Admin\AppData\Local\Temp\C534.tmp"79⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\C592.tmp"C:\Users\Admin\AppData\Local\Temp\C592.tmp"80⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\CA84.tmp"C:\Users\Admin\AppData\Local\Temp\CA84.tmp"81⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"82⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"83⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\CC68.tmp"C:\Users\Admin\AppData\Local\Temp\CC68.tmp"84⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\CD43.tmp"C:\Users\Admin\AppData\Local\Temp\CD43.tmp"85⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"86⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\CF27.tmp"C:\Users\Admin\AppData\Local\Temp\CF27.tmp"87⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\CFC3.tmp"C:\Users\Admin\AppData\Local\Temp\CFC3.tmp"88⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\D06F.tmp"C:\Users\Admin\AppData\Local\Temp\D06F.tmp"89⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\D10B.tmp"C:\Users\Admin\AppData\Local\Temp\D10B.tmp"90⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\D198.tmp"C:\Users\Admin\AppData\Local\Temp\D198.tmp"91⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\D205.tmp"C:\Users\Admin\AppData\Local\Temp\D205.tmp"92⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"93⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\D32E.tmp"C:\Users\Admin\AppData\Local\Temp\D32E.tmp"94⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\D551.tmp"C:\Users\Admin\AppData\Local\Temp\D551.tmp"95⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"C:\Users\Admin\AppData\Local\Temp\D5BF.tmp"96⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\D64B.tmp"C:\Users\Admin\AppData\Local\Temp\D64B.tmp"97⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"98⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\D764.tmp"C:\Users\Admin\AppData\Local\Temp\D764.tmp"99⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\D801.tmp"C:\Users\Admin\AppData\Local\Temp\D801.tmp"100⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\D89D.tmp"C:\Users\Admin\AppData\Local\Temp\D89D.tmp"101⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\D92A.tmp"C:\Users\Admin\AppData\Local\Temp\D92A.tmp"102⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\D9C6.tmp"C:\Users\Admin\AppData\Local\Temp\D9C6.tmp"103⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\DA62.tmp"C:\Users\Admin\AppData\Local\Temp\DA62.tmp"104⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\DAFE.tmp"C:\Users\Admin\AppData\Local\Temp\DAFE.tmp"105⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"106⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\DC27.tmp"C:\Users\Admin\AppData\Local\Temp\DC27.tmp"107⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"108⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\DD21.tmp"C:\Users\Admin\AppData\Local\Temp\DD21.tmp"109⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"110⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"111⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\DEF6.tmp"C:\Users\Admin\AppData\Local\Temp\DEF6.tmp"112⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\DF83.tmp"C:\Users\Admin\AppData\Local\Temp\DF83.tmp"113⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\E000.tmp"C:\Users\Admin\AppData\Local\Temp\E000.tmp"114⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\E09C.tmp"C:\Users\Admin\AppData\Local\Temp\E09C.tmp"115⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\E242.tmp"C:\Users\Admin\AppData\Local\Temp\E242.tmp"116⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\E2BF.tmp"C:\Users\Admin\AppData\Local\Temp\E2BF.tmp"117⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\E33C.tmp"C:\Users\Admin\AppData\Local\Temp\E33C.tmp"118⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"119⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\E426.tmp"C:\Users\Admin\AppData\Local\Temp\E426.tmp"120⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\E4A3.tmp"C:\Users\Admin\AppData\Local\Temp\E4A3.tmp"121⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\E530.tmp"C:\Users\Admin\AppData\Local\Temp\E530.tmp"122⤵PID:3084
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-