Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 16:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9e00f9826172bc643f46961088b691b7_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
9e00f9826172bc643f46961088b691b7_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
9e00f9826172bc643f46961088b691b7_mafia_JC.exe
-
Size
487KB
-
MD5
9e00f9826172bc643f46961088b691b7
-
SHA1
39c5fbae420b2ba0b53a32becc49fae1adc09313
-
SHA256
dd7357416f86ff7f1adcab7644920d3882607bee904f98252f53c5d809baeec0
-
SHA512
34ff70da2c1d6a6451027ffed79555efdd9c3e30db674865678518452ba5ea353d5df47593d6eeb49ac51e7886eaf5588e80e1f41788322430392f6447bf8453
-
SSDEEP
12288:HU5rCOTeiJjQn63drn6Uq70dEJHNHsNZ:HUQOJJW6trnK70mrsN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2620 94BE.tmp 3804 9579.tmp 4808 9625.tmp 4956 96F0.tmp 4832 9923.tmp 3876 99DE.tmp 1184 9AAA.tmp 2060 9B46.tmp 4768 9BB3.tmp 2436 9C6F.tmp 560 9D1B.tmp 4672 9DC6.tmp 1924 9EC0.tmp 4228 9FAB.tmp 3392 A076.tmp 2032 A3B2.tmp 2220 A41F.tmp 812 A50A.tmp 4836 A5D5.tmp 5056 A6A0.tmp 3880 A73C.tmp 2276 A7F8.tmp 3064 A901.tmp 2648 A99E.tmp 1752 AA2A.tmp 1436 AAF5.tmp 1700 AB72.tmp 224 AC6C.tmp 1324 ACE9.tmp 3504 AEAF.tmp 3608 AF89.tmp 4004 B045.tmp 2852 B14E.tmp 1296 B1EB.tmp 1576 B287.tmp 1340 B314.tmp 1076 B3BF.tmp 2488 B45C.tmp 3808 B4E8.tmp 1912 B575.tmp 2692 B611.tmp 2456 B6BD.tmp 2700 B759.tmp 3240 B7D6.tmp 4444 B8A1.tmp 316 B93E.tmp 3168 B9DA.tmp 772 BA47.tmp 2128 BAC4.tmp 2112 BB51.tmp 2176 BBBE.tmp 2728 BC4B.tmp 3460 BCB8.tmp 3736 BD55.tmp 1884 BE00.tmp 2472 BE7D.tmp 1740 BF0A.tmp 2620 BF87.tmp 4340 C004.tmp 4808 C0A0.tmp 4832 C11D.tmp 1060 C18B.tmp 4252 C1E8.tmp 4460 C246.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2620 1984 9e00f9826172bc643f46961088b691b7_mafia_JC.exe 82 PID 1984 wrote to memory of 2620 1984 9e00f9826172bc643f46961088b691b7_mafia_JC.exe 82 PID 1984 wrote to memory of 2620 1984 9e00f9826172bc643f46961088b691b7_mafia_JC.exe 82 PID 2620 wrote to memory of 3804 2620 94BE.tmp 83 PID 2620 wrote to memory of 3804 2620 94BE.tmp 83 PID 2620 wrote to memory of 3804 2620 94BE.tmp 83 PID 3804 wrote to memory of 4808 3804 9579.tmp 84 PID 3804 wrote to memory of 4808 3804 9579.tmp 84 PID 3804 wrote to memory of 4808 3804 9579.tmp 84 PID 4808 wrote to memory of 4956 4808 9625.tmp 85 PID 4808 wrote to memory of 4956 4808 9625.tmp 85 PID 4808 wrote to memory of 4956 4808 9625.tmp 85 PID 4956 wrote to memory of 4832 4956 96F0.tmp 86 PID 4956 wrote to memory of 4832 4956 96F0.tmp 86 PID 4956 wrote to memory of 4832 4956 96F0.tmp 86 PID 4832 wrote to memory of 3876 4832 9923.tmp 87 PID 4832 wrote to memory of 3876 4832 9923.tmp 87 PID 4832 wrote to memory of 3876 4832 9923.tmp 87 PID 3876 wrote to memory of 1184 3876 99DE.tmp 88 PID 3876 wrote to memory of 1184 3876 99DE.tmp 88 PID 3876 wrote to memory of 1184 3876 99DE.tmp 88 PID 1184 wrote to memory of 2060 1184 9AAA.tmp 89 PID 1184 wrote to memory of 2060 1184 9AAA.tmp 89 PID 1184 wrote to memory of 2060 1184 9AAA.tmp 89 PID 2060 wrote to memory of 4768 2060 9B46.tmp 90 PID 2060 wrote to memory of 4768 2060 9B46.tmp 90 PID 2060 wrote to memory of 4768 2060 9B46.tmp 90 PID 4768 wrote to memory of 2436 4768 9BB3.tmp 91 PID 4768 wrote to memory of 2436 4768 9BB3.tmp 91 PID 4768 wrote to memory of 2436 4768 9BB3.tmp 91 PID 2436 wrote to memory of 560 2436 9C6F.tmp 92 PID 2436 wrote to memory of 560 2436 9C6F.tmp 92 PID 2436 wrote to memory of 560 2436 9C6F.tmp 92 PID 560 wrote to memory of 4672 560 9D1B.tmp 93 PID 560 wrote to memory of 4672 560 9D1B.tmp 93 PID 560 wrote to memory of 4672 560 9D1B.tmp 93 PID 4672 wrote to memory of 1924 4672 9DC6.tmp 94 PID 4672 wrote to memory of 1924 4672 9DC6.tmp 94 PID 4672 wrote to memory of 1924 4672 9DC6.tmp 94 PID 1924 wrote to memory of 4228 1924 9EC0.tmp 95 PID 1924 wrote to memory of 4228 1924 9EC0.tmp 95 PID 1924 wrote to memory of 4228 1924 9EC0.tmp 95 PID 4228 wrote to memory of 3392 4228 9FAB.tmp 96 PID 4228 wrote to memory of 3392 4228 9FAB.tmp 96 PID 4228 wrote to memory of 3392 4228 9FAB.tmp 96 PID 3392 wrote to memory of 2032 3392 A076.tmp 97 PID 3392 wrote to memory of 2032 3392 A076.tmp 97 PID 3392 wrote to memory of 2032 3392 A076.tmp 97 PID 2032 wrote to memory of 2220 2032 A3B2.tmp 100 PID 2032 wrote to memory of 2220 2032 A3B2.tmp 100 PID 2032 wrote to memory of 2220 2032 A3B2.tmp 100 PID 2220 wrote to memory of 812 2220 A41F.tmp 101 PID 2220 wrote to memory of 812 2220 A41F.tmp 101 PID 2220 wrote to memory of 812 2220 A41F.tmp 101 PID 812 wrote to memory of 4836 812 A50A.tmp 102 PID 812 wrote to memory of 4836 812 A50A.tmp 102 PID 812 wrote to memory of 4836 812 A50A.tmp 102 PID 4836 wrote to memory of 5056 4836 A5D5.tmp 103 PID 4836 wrote to memory of 5056 4836 A5D5.tmp 103 PID 4836 wrote to memory of 5056 4836 A5D5.tmp 103 PID 5056 wrote to memory of 3880 5056 A6A0.tmp 104 PID 5056 wrote to memory of 3880 5056 A6A0.tmp 104 PID 5056 wrote to memory of 3880 5056 A6A0.tmp 104 PID 3880 wrote to memory of 2276 3880 A73C.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e00f9826172bc643f46961088b691b7_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\9e00f9826172bc643f46961088b691b7_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\94BE.tmp"C:\Users\Admin\AppData\Local\Temp\94BE.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\9579.tmp"C:\Users\Admin\AppData\Local\Temp\9579.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\9625.tmp"C:\Users\Admin\AppData\Local\Temp\9625.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\96F0.tmp"C:\Users\Admin\AppData\Local\Temp\96F0.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\9923.tmp"C:\Users\Admin\AppData\Local\Temp\9923.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\99DE.tmp"C:\Users\Admin\AppData\Local\Temp\99DE.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\9AAA.tmp"C:\Users\Admin\AppData\Local\Temp\9AAA.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\9B46.tmp"C:\Users\Admin\AppData\Local\Temp\9B46.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\9BB3.tmp"C:\Users\Admin\AppData\Local\Temp\9BB3.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\9DC6.tmp"C:\Users\Admin\AppData\Local\Temp\9DC6.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\9FAB.tmp"C:\Users\Admin\AppData\Local\Temp\9FAB.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\A076.tmp"C:\Users\Admin\AppData\Local\Temp\A076.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\A3B2.tmp"C:\Users\Admin\AppData\Local\Temp\A3B2.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\A41F.tmp"C:\Users\Admin\AppData\Local\Temp\A41F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\A50A.tmp"C:\Users\Admin\AppData\Local\Temp\A50A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\A5D5.tmp"C:\Users\Admin\AppData\Local\Temp\A5D5.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\A6A0.tmp"C:\Users\Admin\AppData\Local\Temp\A6A0.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\A73C.tmp"C:\Users\Admin\AppData\Local\Temp\A73C.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"C:\Users\Admin\AppData\Local\Temp\A7F8.tmp"23⤵
- Executes dropped EXE
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\A901.tmp"C:\Users\Admin\AppData\Local\Temp\A901.tmp"24⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\A99E.tmp"C:\Users\Admin\AppData\Local\Temp\A99E.tmp"25⤵
- Executes dropped EXE
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"26⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\AAF5.tmp"C:\Users\Admin\AppData\Local\Temp\AAF5.tmp"27⤵
- Executes dropped EXE
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\AB72.tmp"C:\Users\Admin\AppData\Local\Temp\AB72.tmp"28⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\AC6C.tmp"C:\Users\Admin\AppData\Local\Temp\AC6C.tmp"29⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\ACE9.tmp"C:\Users\Admin\AppData\Local\Temp\ACE9.tmp"30⤵
- Executes dropped EXE
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\AEAF.tmp"C:\Users\Admin\AppData\Local\Temp\AEAF.tmp"31⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\AF89.tmp"C:\Users\Admin\AppData\Local\Temp\AF89.tmp"32⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\B045.tmp"C:\Users\Admin\AppData\Local\Temp\B045.tmp"33⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\B14E.tmp"C:\Users\Admin\AppData\Local\Temp\B14E.tmp"34⤵
- Executes dropped EXE
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"35⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\B287.tmp"C:\Users\Admin\AppData\Local\Temp\B287.tmp"36⤵
- Executes dropped EXE
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\B314.tmp"C:\Users\Admin\AppData\Local\Temp\B314.tmp"37⤵
- Executes dropped EXE
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"38⤵
- Executes dropped EXE
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\B45C.tmp"C:\Users\Admin\AppData\Local\Temp\B45C.tmp"39⤵
- Executes dropped EXE
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"40⤵
- Executes dropped EXE
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\B575.tmp"C:\Users\Admin\AppData\Local\Temp\B575.tmp"41⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\B611.tmp"C:\Users\Admin\AppData\Local\Temp\B611.tmp"42⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\B6BD.tmp"C:\Users\Admin\AppData\Local\Temp\B6BD.tmp"43⤵
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\B759.tmp"C:\Users\Admin\AppData\Local\Temp\B759.tmp"44⤵
- Executes dropped EXE
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"45⤵
- Executes dropped EXE
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"C:\Users\Admin\AppData\Local\Temp\B8A1.tmp"46⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\B93E.tmp"C:\Users\Admin\AppData\Local\Temp\B93E.tmp"47⤵
- Executes dropped EXE
PID:316 -
C:\Users\Admin\AppData\Local\Temp\B9DA.tmp"C:\Users\Admin\AppData\Local\Temp\B9DA.tmp"48⤵
- Executes dropped EXE
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\BA47.tmp"C:\Users\Admin\AppData\Local\Temp\BA47.tmp"49⤵
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"50⤵
- Executes dropped EXE
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\BB51.tmp"C:\Users\Admin\AppData\Local\Temp\BB51.tmp"51⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"52⤵
- Executes dropped EXE
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"53⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\BCB8.tmp"C:\Users\Admin\AppData\Local\Temp\BCB8.tmp"54⤵
- Executes dropped EXE
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\BD55.tmp"C:\Users\Admin\AppData\Local\Temp\BD55.tmp"55⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\BE00.tmp"C:\Users\Admin\AppData\Local\Temp\BE00.tmp"56⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"C:\Users\Admin\AppData\Local\Temp\BE7D.tmp"57⤵
- Executes dropped EXE
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"58⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\BF87.tmp"C:\Users\Admin\AppData\Local\Temp\BF87.tmp"59⤵
- Executes dropped EXE
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\C004.tmp"C:\Users\Admin\AppData\Local\Temp\C004.tmp"60⤵
- Executes dropped EXE
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"C:\Users\Admin\AppData\Local\Temp\C0A0.tmp"61⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\C11D.tmp"C:\Users\Admin\AppData\Local\Temp\C11D.tmp"62⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\C18B.tmp"C:\Users\Admin\AppData\Local\Temp\C18B.tmp"63⤵
- Executes dropped EXE
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\C1E8.tmp"C:\Users\Admin\AppData\Local\Temp\C1E8.tmp"64⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\C246.tmp"C:\Users\Admin\AppData\Local\Temp\C246.tmp"65⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\C331.tmp"C:\Users\Admin\AppData\Local\Temp\C331.tmp"66⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\C3AE.tmp"C:\Users\Admin\AppData\Local\Temp\C3AE.tmp"67⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\C42B.tmp"C:\Users\Admin\AppData\Local\Temp\C42B.tmp"68⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\C4A8.tmp"C:\Users\Admin\AppData\Local\Temp\C4A8.tmp"69⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\C525.tmp"C:\Users\Admin\AppData\Local\Temp\C525.tmp"70⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\C5B1.tmp"C:\Users\Admin\AppData\Local\Temp\C5B1.tmp"71⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\C60F.tmp"C:\Users\Admin\AppData\Local\Temp\C60F.tmp"72⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"73⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\C719.tmp"C:\Users\Admin\AppData\Local\Temp\C719.tmp"74⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\C776.tmp"C:\Users\Admin\AppData\Local\Temp\C776.tmp"75⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"76⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\C999.tmp"C:\Users\Admin\AppData\Local\Temp\C999.tmp"77⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\CA16.tmp"C:\Users\Admin\AppData\Local\Temp\CA16.tmp"78⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\CAD2.tmp"C:\Users\Admin\AppData\Local\Temp\CAD2.tmp"79⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"80⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"81⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\CC78.tmp"C:\Users\Admin\AppData\Local\Temp\CC78.tmp"82⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\CDEF.tmp"C:\Users\Admin\AppData\Local\Temp\CDEF.tmp"83⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"84⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\CF66.tmp"C:\Users\Admin\AppData\Local\Temp\CF66.tmp"85⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\D002.tmp"C:\Users\Admin\AppData\Local\Temp\D002.tmp"86⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\D050.tmp"C:\Users\Admin\AppData\Local\Temp\D050.tmp"87⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\D0BD.tmp"C:\Users\Admin\AppData\Local\Temp\D0BD.tmp"88⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\D12B.tmp"C:\Users\Admin\AppData\Local\Temp\D12B.tmp"89⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"90⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\D244.tmp"C:\Users\Admin\AppData\Local\Temp\D244.tmp"91⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\D2E0.tmp"C:\Users\Admin\AppData\Local\Temp\D2E0.tmp"92⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\D35D.tmp"C:\Users\Admin\AppData\Local\Temp\D35D.tmp"93⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"94⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\D486.tmp"C:\Users\Admin\AppData\Local\Temp\D486.tmp"95⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"96⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\D551.tmp"C:\Users\Admin\AppData\Local\Temp\D551.tmp"97⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"98⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\D66A.tmp"C:\Users\Admin\AppData\Local\Temp\D66A.tmp"99⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\D6E7.tmp"C:\Users\Admin\AppData\Local\Temp\D6E7.tmp"100⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\D764.tmp"C:\Users\Admin\AppData\Local\Temp\D764.tmp"101⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\D801.tmp"C:\Users\Admin\AppData\Local\Temp\D801.tmp"102⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\D89D.tmp"C:\Users\Admin\AppData\Local\Temp\D89D.tmp"103⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\D91A.tmp"C:\Users\Admin\AppData\Local\Temp\D91A.tmp"104⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\D997.tmp"C:\Users\Admin\AppData\Local\Temp\D997.tmp"105⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\DA14.tmp"C:\Users\Admin\AppData\Local\Temp\DA14.tmp"106⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"107⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"C:\Users\Admin\AppData\Local\Temp\DB2D.tmp"108⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"109⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\DC27.tmp"C:\Users\Admin\AppData\Local\Temp\DC27.tmp"110⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"111⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\DD31.tmp"C:\Users\Admin\AppData\Local\Temp\DD31.tmp"112⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\DE3A.tmp"C:\Users\Admin\AppData\Local\Temp\DE3A.tmp"113⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\DED7.tmp"C:\Users\Admin\AppData\Local\Temp\DED7.tmp"114⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\DF44.tmp"C:\Users\Admin\AppData\Local\Temp\DF44.tmp"115⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"116⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\E05D.tmp"C:\Users\Admin\AppData\Local\Temp\E05D.tmp"117⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\E0DA.tmp"C:\Users\Admin\AppData\Local\Temp\E0DA.tmp"118⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\E177.tmp"C:\Users\Admin\AppData\Local\Temp\E177.tmp"119⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\E213.tmp"C:\Users\Admin\AppData\Local\Temp\E213.tmp"120⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\E2AF.tmp"C:\Users\Admin\AppData\Local\Temp\E2AF.tmp"121⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\E32C.tmp"C:\Users\Admin\AppData\Local\Temp\E32C.tmp"122⤵PID:2436
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-