Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 16:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9d8f44cab1264a91a9d0794a6489c201_mafia_JC.exe
Resource
win7-20230824-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
9d8f44cab1264a91a9d0794a6489c201_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
9d8f44cab1264a91a9d0794a6489c201_mafia_JC.exe
-
Size
486KB
-
MD5
9d8f44cab1264a91a9d0794a6489c201
-
SHA1
dab19a1be65b16d324b17fcfeed557ab8261c58c
-
SHA256
808c416ef8b782a2d17421fcc92a0d937d9c151a8b3bd6146adb2d356becbedd
-
SHA512
8f11b68948ea64245a9242f49d1605e1f981b05a030d1bda9a82cba73f68d192a6c528be0dad0615c18117854e5f1abe7c6f7673d81822050fb47c7cffa27304
-
SSDEEP
12288:/U5rCOTeiDmVOftdNxkoVxHvZKdWpfRmuulNZ:/UQOJDUO/soPxKdzblN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4772 CBEB.tmp 4520 CCB6.tmp 420 CD62.tmp 3924 CE4C.tmp 1220 CF37.tmp 1756 D040.tmp 2776 D0EC.tmp 4704 D1B7.tmp 2912 D292.tmp 1460 D37C.tmp 1680 D438.tmp 4832 D503.tmp 3144 D5AF.tmp 3416 D64B.tmp 1636 DB9B.tmp 2404 DCC3.tmp 700 DD8F.tmp 3316 DE2B.tmp 1344 DF25.tmp 764 E00F.tmp 1428 E0CB.tmp 3424 E1C5.tmp 1816 E2BF.tmp 4800 E36B.tmp 4732 E426.tmp 3848 E4F1.tmp 4328 E57E.tmp 3908 E649.tmp 212 E6E5.tmp 3884 E7DF.tmp 1860 E8BA.tmp 1560 E995.tmp 4332 EA41.tmp 3868 EB1B.tmp 4376 EB98.tmp 1528 EC35.tmp 3348 ECB2.tmp 3540 ED6D.tmp 4256 EE09.tmp 5100 EEB5.tmp 2168 EF61.tmp 3032 F0A9.tmp 1096 F155.tmp 3000 F1C2.tmp 3880 F24F.tmp 3944 F2CC.tmp 1968 F359.tmp 5064 F405.tmp 4564 F4C0.tmp 3240 F55C.tmp 4556 F637.tmp 3380 F6E3.tmp 1112 F77F.tmp 4820 F83B.tmp 4052 F915.tmp 2904 F9F0.tmp 2160 FAAC.tmp 2144 FB48.tmp 3408 FBF4.tmp 2424 FC90.tmp 2748 FD3C.tmp 3468 FDF7.tmp 992 FE84.tmp 4876 FF30.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 716 wrote to memory of 4772 716 9d8f44cab1264a91a9d0794a6489c201_mafia_JC.exe 81 PID 716 wrote to memory of 4772 716 9d8f44cab1264a91a9d0794a6489c201_mafia_JC.exe 81 PID 716 wrote to memory of 4772 716 9d8f44cab1264a91a9d0794a6489c201_mafia_JC.exe 81 PID 4772 wrote to memory of 4520 4772 CBEB.tmp 82 PID 4772 wrote to memory of 4520 4772 CBEB.tmp 82 PID 4772 wrote to memory of 4520 4772 CBEB.tmp 82 PID 4520 wrote to memory of 420 4520 CCB6.tmp 83 PID 4520 wrote to memory of 420 4520 CCB6.tmp 83 PID 4520 wrote to memory of 420 4520 CCB6.tmp 83 PID 420 wrote to memory of 3924 420 CD62.tmp 84 PID 420 wrote to memory of 3924 420 CD62.tmp 84 PID 420 wrote to memory of 3924 420 CD62.tmp 84 PID 3924 wrote to memory of 1220 3924 CE4C.tmp 85 PID 3924 wrote to memory of 1220 3924 CE4C.tmp 85 PID 3924 wrote to memory of 1220 3924 CE4C.tmp 85 PID 1220 wrote to memory of 1756 1220 CF37.tmp 86 PID 1220 wrote to memory of 1756 1220 CF37.tmp 86 PID 1220 wrote to memory of 1756 1220 CF37.tmp 86 PID 1756 wrote to memory of 2776 1756 D040.tmp 87 PID 1756 wrote to memory of 2776 1756 D040.tmp 87 PID 1756 wrote to memory of 2776 1756 D040.tmp 87 PID 2776 wrote to memory of 4704 2776 D0EC.tmp 88 PID 2776 wrote to memory of 4704 2776 D0EC.tmp 88 PID 2776 wrote to memory of 4704 2776 D0EC.tmp 88 PID 4704 wrote to memory of 2912 4704 D1B7.tmp 89 PID 4704 wrote to memory of 2912 4704 D1B7.tmp 89 PID 4704 wrote to memory of 2912 4704 D1B7.tmp 89 PID 2912 wrote to memory of 1460 2912 D292.tmp 91 PID 2912 wrote to memory of 1460 2912 D292.tmp 91 PID 2912 wrote to memory of 1460 2912 D292.tmp 91 PID 1460 wrote to memory of 1680 1460 D37C.tmp 92 PID 1460 wrote to memory of 1680 1460 D37C.tmp 92 PID 1460 wrote to memory of 1680 1460 D37C.tmp 92 PID 1680 wrote to memory of 4832 1680 D438.tmp 93 PID 1680 wrote to memory of 4832 1680 D438.tmp 93 PID 1680 wrote to memory of 4832 1680 D438.tmp 93 PID 4832 wrote to memory of 3144 4832 D503.tmp 94 PID 4832 wrote to memory of 3144 4832 D503.tmp 94 PID 4832 wrote to memory of 3144 4832 D503.tmp 94 PID 3144 wrote to memory of 3416 3144 D5AF.tmp 95 PID 3144 wrote to memory of 3416 3144 D5AF.tmp 95 PID 3144 wrote to memory of 3416 3144 D5AF.tmp 95 PID 3416 wrote to memory of 1636 3416 D64B.tmp 96 PID 3416 wrote to memory of 1636 3416 D64B.tmp 96 PID 3416 wrote to memory of 1636 3416 D64B.tmp 96 PID 1636 wrote to memory of 2404 1636 DB9B.tmp 97 PID 1636 wrote to memory of 2404 1636 DB9B.tmp 97 PID 1636 wrote to memory of 2404 1636 DB9B.tmp 97 PID 2404 wrote to memory of 700 2404 DCC3.tmp 98 PID 2404 wrote to memory of 700 2404 DCC3.tmp 98 PID 2404 wrote to memory of 700 2404 DCC3.tmp 98 PID 700 wrote to memory of 3316 700 DD8F.tmp 99 PID 700 wrote to memory of 3316 700 DD8F.tmp 99 PID 700 wrote to memory of 3316 700 DD8F.tmp 99 PID 3316 wrote to memory of 1344 3316 DE2B.tmp 102 PID 3316 wrote to memory of 1344 3316 DE2B.tmp 102 PID 3316 wrote to memory of 1344 3316 DE2B.tmp 102 PID 1344 wrote to memory of 764 1344 DF25.tmp 103 PID 1344 wrote to memory of 764 1344 DF25.tmp 103 PID 1344 wrote to memory of 764 1344 DF25.tmp 103 PID 764 wrote to memory of 1428 764 E00F.tmp 104 PID 764 wrote to memory of 1428 764 E00F.tmp 104 PID 764 wrote to memory of 1428 764 E00F.tmp 104 PID 1428 wrote to memory of 3424 1428 E0CB.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d8f44cab1264a91a9d0794a6489c201_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\9d8f44cab1264a91a9d0794a6489c201_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\CBEB.tmp"C:\Users\Admin\AppData\Local\Temp\CBEB.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\CCB6.tmp"C:\Users\Admin\AppData\Local\Temp\CCB6.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\CD62.tmp"C:\Users\Admin\AppData\Local\Temp\CD62.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\CF37.tmp"C:\Users\Admin\AppData\Local\Temp\CF37.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\D040.tmp"C:\Users\Admin\AppData\Local\Temp\D040.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\D0EC.tmp"C:\Users\Admin\AppData\Local\Temp\D0EC.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\D292.tmp"C:\Users\Admin\AppData\Local\Temp\D292.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\D37C.tmp"C:\Users\Admin\AppData\Local\Temp\D37C.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\D438.tmp"C:\Users\Admin\AppData\Local\Temp\D438.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\D503.tmp"C:\Users\Admin\AppData\Local\Temp\D503.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"C:\Users\Admin\AppData\Local\Temp\D5AF.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\D64B.tmp"C:\Users\Admin\AppData\Local\Temp\D64B.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"C:\Users\Admin\AppData\Local\Temp\DB9B.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"C:\Users\Admin\AppData\Local\Temp\DCC3.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\DD8F.tmp"C:\Users\Admin\AppData\Local\Temp\DD8F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\DE2B.tmp"C:\Users\Admin\AppData\Local\Temp\DE2B.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\DF25.tmp"C:\Users\Admin\AppData\Local\Temp\DF25.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\E00F.tmp"C:\Users\Admin\AppData\Local\Temp\E00F.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\E0CB.tmp"C:\Users\Admin\AppData\Local\Temp\E0CB.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"23⤵
- Executes dropped EXE
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\E2BF.tmp"C:\Users\Admin\AppData\Local\Temp\E2BF.tmp"24⤵
- Executes dropped EXE
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\E36B.tmp"C:\Users\Admin\AppData\Local\Temp\E36B.tmp"25⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\E426.tmp"C:\Users\Admin\AppData\Local\Temp\E426.tmp"26⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"27⤵
- Executes dropped EXE
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\E57E.tmp"C:\Users\Admin\AppData\Local\Temp\E57E.tmp"28⤵
- Executes dropped EXE
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\E649.tmp"C:\Users\Admin\AppData\Local\Temp\E649.tmp"29⤵
- Executes dropped EXE
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"30⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\E7DF.tmp"C:\Users\Admin\AppData\Local\Temp\E7DF.tmp"31⤵
- Executes dropped EXE
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"32⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\E995.tmp"C:\Users\Admin\AppData\Local\Temp\E995.tmp"33⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\EA41.tmp"C:\Users\Admin\AppData\Local\Temp\EA41.tmp"34⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\EB1B.tmp"C:\Users\Admin\AppData\Local\Temp\EB1B.tmp"35⤵
- Executes dropped EXE
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\EB98.tmp"C:\Users\Admin\AppData\Local\Temp\EB98.tmp"36⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\EC35.tmp"C:\Users\Admin\AppData\Local\Temp\EC35.tmp"37⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"C:\Users\Admin\AppData\Local\Temp\ECB2.tmp"38⤵
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"39⤵
- Executes dropped EXE
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\EE09.tmp"C:\Users\Admin\AppData\Local\Temp\EE09.tmp"40⤵
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\EEB5.tmp"C:\Users\Admin\AppData\Local\Temp\EEB5.tmp"41⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\EF61.tmp"C:\Users\Admin\AppData\Local\Temp\EF61.tmp"42⤵
- Executes dropped EXE
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"43⤵
- Executes dropped EXE
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\F155.tmp"C:\Users\Admin\AppData\Local\Temp\F155.tmp"44⤵
- Executes dropped EXE
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\F1C2.tmp"C:\Users\Admin\AppData\Local\Temp\F1C2.tmp"45⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\F24F.tmp"C:\Users\Admin\AppData\Local\Temp\F24F.tmp"46⤵
- Executes dropped EXE
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"C:\Users\Admin\AppData\Local\Temp\F2CC.tmp"47⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\F359.tmp"C:\Users\Admin\AppData\Local\Temp\F359.tmp"48⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\F405.tmp"C:\Users\Admin\AppData\Local\Temp\F405.tmp"49⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\F4C0.tmp"C:\Users\Admin\AppData\Local\Temp\F4C0.tmp"50⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\F55C.tmp"C:\Users\Admin\AppData\Local\Temp\F55C.tmp"51⤵
- Executes dropped EXE
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\F637.tmp"C:\Users\Admin\AppData\Local\Temp\F637.tmp"52⤵
- Executes dropped EXE
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"53⤵
- Executes dropped EXE
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\F77F.tmp"C:\Users\Admin\AppData\Local\Temp\F77F.tmp"54⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\F83B.tmp"C:\Users\Admin\AppData\Local\Temp\F83B.tmp"55⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\F915.tmp"C:\Users\Admin\AppData\Local\Temp\F915.tmp"56⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"57⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"58⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\FB48.tmp"C:\Users\Admin\AppData\Local\Temp\FB48.tmp"59⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\FBF4.tmp"C:\Users\Admin\AppData\Local\Temp\FBF4.tmp"60⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\FC90.tmp"C:\Users\Admin\AppData\Local\Temp\FC90.tmp"61⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"62⤵
- Executes dropped EXE
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"63⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\FE84.tmp"C:\Users\Admin\AppData\Local\Temp\FE84.tmp"64⤵
- Executes dropped EXE
PID:992 -
C:\Users\Admin\AppData\Local\Temp\FF30.tmp"C:\Users\Admin\AppData\Local\Temp\FF30.tmp"65⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\FFBD.tmp"C:\Users\Admin\AppData\Local\Temp\FFBD.tmp"66⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\59.tmp"C:\Users\Admin\AppData\Local\Temp\59.tmp"67⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\105.tmp"C:\Users\Admin\AppData\Local\Temp\105.tmp"68⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\172.tmp"C:\Users\Admin\AppData\Local\Temp\172.tmp"69⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\1FF.tmp"C:\Users\Admin\AppData\Local\Temp\1FF.tmp"70⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\27C.tmp"C:\Users\Admin\AppData\Local\Temp\27C.tmp"71⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\2F9.tmp"C:\Users\Admin\AppData\Local\Temp\2F9.tmp"72⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\395.tmp"C:\Users\Admin\AppData\Local\Temp\395.tmp"73⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\664.tmp"C:\Users\Admin\AppData\Local\Temp\664.tmp"74⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\710.tmp"C:\Users\Admin\AppData\Local\Temp\710.tmp"75⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\7AC.tmp"C:\Users\Admin\AppData\Local\Temp\7AC.tmp"76⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\848.tmp"C:\Users\Admin\AppData\Local\Temp\848.tmp"77⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\8D5.tmp"C:\Users\Admin\AppData\Local\Temp\8D5.tmp"78⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\961.tmp"C:\Users\Admin\AppData\Local\Temp\961.tmp"79⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\A0D.tmp"C:\Users\Admin\AppData\Local\Temp\A0D.tmp"80⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\A9A.tmp"C:\Users\Admin\AppData\Local\Temp\A9A.tmp"81⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\B26.tmp"C:\Users\Admin\AppData\Local\Temp\B26.tmp"82⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\BD2.tmp"C:\Users\Admin\AppData\Local\Temp\BD2.tmp"83⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\C6F.tmp"C:\Users\Admin\AppData\Local\Temp\C6F.tmp"84⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\D1A.tmp"C:\Users\Admin\AppData\Local\Temp\D1A.tmp"85⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\D97.tmp"C:\Users\Admin\AppData\Local\Temp\D97.tmp"86⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\E14.tmp"C:\Users\Admin\AppData\Local\Temp\E14.tmp"87⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\EA1.tmp"C:\Users\Admin\AppData\Local\Temp\EA1.tmp"88⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\F3D.tmp"C:\Users\Admin\AppData\Local\Temp\F3D.tmp"89⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\FF9.tmp"C:\Users\Admin\AppData\Local\Temp\FF9.tmp"90⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\10A5.tmp"C:\Users\Admin\AppData\Local\Temp\10A5.tmp"91⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\1141.tmp"C:\Users\Admin\AppData\Local\Temp\1141.tmp"92⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\11ED.tmp"C:\Users\Admin\AppData\Local\Temp\11ED.tmp"93⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\1289.tmp"C:\Users\Admin\AppData\Local\Temp\1289.tmp"94⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\1354.tmp"C:\Users\Admin\AppData\Local\Temp\1354.tmp"95⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\13F0.tmp"C:\Users\Admin\AppData\Local\Temp\13F0.tmp"96⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\148D.tmp"C:\Users\Admin\AppData\Local\Temp\148D.tmp"97⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\1519.tmp"C:\Users\Admin\AppData\Local\Temp\1519.tmp"98⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\15D5.tmp"C:\Users\Admin\AppData\Local\Temp\15D5.tmp"99⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\16A0.tmp"C:\Users\Admin\AppData\Local\Temp\16A0.tmp"100⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\175B.tmp"C:\Users\Admin\AppData\Local\Temp\175B.tmp"101⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\1817.tmp"C:\Users\Admin\AppData\Local\Temp\1817.tmp"102⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\18C3.tmp"C:\Users\Admin\AppData\Local\Temp\18C3.tmp"103⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\1930.tmp"C:\Users\Admin\AppData\Local\Temp\1930.tmp"104⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\19BD.tmp"C:\Users\Admin\AppData\Local\Temp\19BD.tmp"105⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\1A88.tmp"C:\Users\Admin\AppData\Local\Temp\1A88.tmp"106⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\1B43.tmp"C:\Users\Admin\AppData\Local\Temp\1B43.tmp"107⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"C:\Users\Admin\AppData\Local\Temp\1C1E.tmp"108⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"109⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\1D37.tmp"C:\Users\Admin\AppData\Local\Temp\1D37.tmp"110⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"111⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"C:\Users\Admin\AppData\Local\Temp\1E9F.tmp"112⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"113⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\2016.tmp"C:\Users\Admin\AppData\Local\Temp\2016.tmp"114⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\20F1.tmp"C:\Users\Admin\AppData\Local\Temp\20F1.tmp"115⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\218D.tmp"C:\Users\Admin\AppData\Local\Temp\218D.tmp"116⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\2219.tmp"C:\Users\Admin\AppData\Local\Temp\2219.tmp"117⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\2296.tmp"C:\Users\Admin\AppData\Local\Temp\2296.tmp"118⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\2352.tmp"C:\Users\Admin\AppData\Local\Temp\2352.tmp"119⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\23DF.tmp"C:\Users\Admin\AppData\Local\Temp\23DF.tmp"120⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\245C.tmp"C:\Users\Admin\AppData\Local\Temp\245C.tmp"121⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\2517.tmp"C:\Users\Admin\AppData\Local\Temp\2517.tmp"122⤵PID:4476
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-