Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 18:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c6d3de4266b00ba796fbd03ca67b3e7c_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
c6d3de4266b00ba796fbd03ca67b3e7c_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
c6d3de4266b00ba796fbd03ca67b3e7c_mafia_JC.exe
-
Size
486KB
-
MD5
c6d3de4266b00ba796fbd03ca67b3e7c
-
SHA1
daccfdb98876066477256b8c5da44ffe7d10c355
-
SHA256
686dcc7a8e1bb7fd3bc6297acff4171a7480632889ac51550b0bf3a1b38567ab
-
SHA512
b4bf0572808d3dbfc013774948db9abacde5afce6919ebbdcc8ba24aa60287c8ea9d442b8c2461b76453a35fd269064e9f2422035365ad365961a17126307f70
-
SSDEEP
12288:/U5rCOTeiDYrlF+gm4nZ45nmbvRWOyjXoZmdAL0NZ:/UQOJDGn45nmZMXoIdAL0N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4668 EC63.tmp 4656 ED2F.tmp 376 EDEA.tmp 4568 EEC5.tmp 2792 EFCE.tmp 2484 F0A9.tmp 3484 F136.tmp 2780 F1F1.tmp 1936 F27E.tmp 2228 F349.tmp 2688 F405.tmp 4700 F491.tmp 4928 F53D.tmp 5016 F5F9.tmp 4980 F695.tmp 5084 F712.tmp 4820 F79E.tmp 1808 F81B.tmp 1092 F8A8.tmp 1212 F935.tmp 4780 F9F0.tmp 2452 FA7D.tmp 4456 FB58.tmp 3212 FBE4.tmp 5068 FC80.tmp 4940 FD4C.tmp 4152 FDC9.tmp 4768 FE65.tmp 2948 FF01.tmp 3560 FF7E.tmp 4572 B.tmp 4224 A7.tmp 4776 1FF.tmp 4884 27C.tmp 1360 2E9.tmp 532 3B4.tmp 2180 48F.tmp 2684 56A.tmp 4972 654.tmp 916 73E.tmp 2808 858.tmp 3264 932.tmp 3400 A1D.tmp 396 AF8.tmp 3492 BD2.tmp 3520 CAD.tmp 1760 D78.tmp 2936 E63.tmp 4128 EFF.tmp 3692 F9B.tmp 1580 1028.tmp 4168 10D4.tmp 968 117F.tmp 4040 12A8.tmp 2820 1345.tmp 3100 13F0.tmp 4092 149C.tmp 1340 150A.tmp 2288 1587.tmp 3484 1604.tmp 1868 1671.tmp 2708 16EE.tmp 1936 176B.tmp 3140 1807.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3928 wrote to memory of 4668 3928 c6d3de4266b00ba796fbd03ca67b3e7c_mafia_JC.exe 81 PID 3928 wrote to memory of 4668 3928 c6d3de4266b00ba796fbd03ca67b3e7c_mafia_JC.exe 81 PID 3928 wrote to memory of 4668 3928 c6d3de4266b00ba796fbd03ca67b3e7c_mafia_JC.exe 81 PID 4668 wrote to memory of 4656 4668 EC63.tmp 82 PID 4668 wrote to memory of 4656 4668 EC63.tmp 82 PID 4668 wrote to memory of 4656 4668 EC63.tmp 82 PID 4656 wrote to memory of 376 4656 ED2F.tmp 83 PID 4656 wrote to memory of 376 4656 ED2F.tmp 83 PID 4656 wrote to memory of 376 4656 ED2F.tmp 83 PID 376 wrote to memory of 4568 376 EDEA.tmp 84 PID 376 wrote to memory of 4568 376 EDEA.tmp 84 PID 376 wrote to memory of 4568 376 EDEA.tmp 84 PID 4568 wrote to memory of 2792 4568 EEC5.tmp 85 PID 4568 wrote to memory of 2792 4568 EEC5.tmp 85 PID 4568 wrote to memory of 2792 4568 EEC5.tmp 85 PID 2792 wrote to memory of 2484 2792 EFCE.tmp 86 PID 2792 wrote to memory of 2484 2792 EFCE.tmp 86 PID 2792 wrote to memory of 2484 2792 EFCE.tmp 86 PID 2484 wrote to memory of 3484 2484 F0A9.tmp 87 PID 2484 wrote to memory of 3484 2484 F0A9.tmp 87 PID 2484 wrote to memory of 3484 2484 F0A9.tmp 87 PID 3484 wrote to memory of 2780 3484 F136.tmp 88 PID 3484 wrote to memory of 2780 3484 F136.tmp 88 PID 3484 wrote to memory of 2780 3484 F136.tmp 88 PID 2780 wrote to memory of 1936 2780 F1F1.tmp 90 PID 2780 wrote to memory of 1936 2780 F1F1.tmp 90 PID 2780 wrote to memory of 1936 2780 F1F1.tmp 90 PID 1936 wrote to memory of 2228 1936 F27E.tmp 91 PID 1936 wrote to memory of 2228 1936 F27E.tmp 91 PID 1936 wrote to memory of 2228 1936 F27E.tmp 91 PID 2228 wrote to memory of 2688 2228 F349.tmp 92 PID 2228 wrote to memory of 2688 2228 F349.tmp 92 PID 2228 wrote to memory of 2688 2228 F349.tmp 92 PID 2688 wrote to memory of 4700 2688 F405.tmp 93 PID 2688 wrote to memory of 4700 2688 F405.tmp 93 PID 2688 wrote to memory of 4700 2688 F405.tmp 93 PID 4700 wrote to memory of 4928 4700 F491.tmp 94 PID 4700 wrote to memory of 4928 4700 F491.tmp 94 PID 4700 wrote to memory of 4928 4700 F491.tmp 94 PID 4928 wrote to memory of 5016 4928 F53D.tmp 95 PID 4928 wrote to memory of 5016 4928 F53D.tmp 95 PID 4928 wrote to memory of 5016 4928 F53D.tmp 95 PID 5016 wrote to memory of 4980 5016 F5F9.tmp 96 PID 5016 wrote to memory of 4980 5016 F5F9.tmp 96 PID 5016 wrote to memory of 4980 5016 F5F9.tmp 96 PID 4980 wrote to memory of 5084 4980 F695.tmp 97 PID 4980 wrote to memory of 5084 4980 F695.tmp 97 PID 4980 wrote to memory of 5084 4980 F695.tmp 97 PID 5084 wrote to memory of 4820 5084 F712.tmp 98 PID 5084 wrote to memory of 4820 5084 F712.tmp 98 PID 5084 wrote to memory of 4820 5084 F712.tmp 98 PID 4820 wrote to memory of 1808 4820 F79E.tmp 101 PID 4820 wrote to memory of 1808 4820 F79E.tmp 101 PID 4820 wrote to memory of 1808 4820 F79E.tmp 101 PID 1808 wrote to memory of 1092 1808 F81B.tmp 102 PID 1808 wrote to memory of 1092 1808 F81B.tmp 102 PID 1808 wrote to memory of 1092 1808 F81B.tmp 102 PID 1092 wrote to memory of 1212 1092 F8A8.tmp 103 PID 1092 wrote to memory of 1212 1092 F8A8.tmp 103 PID 1092 wrote to memory of 1212 1092 F8A8.tmp 103 PID 1212 wrote to memory of 4780 1212 F935.tmp 105 PID 1212 wrote to memory of 4780 1212 F935.tmp 105 PID 1212 wrote to memory of 4780 1212 F935.tmp 105 PID 4780 wrote to memory of 2452 4780 F9F0.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6d3de4266b00ba796fbd03ca67b3e7c_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\c6d3de4266b00ba796fbd03ca67b3e7c_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\EC63.tmp"C:\Users\Admin\AppData\Local\Temp\EC63.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\ED2F.tmp"C:\Users\Admin\AppData\Local\Temp\ED2F.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\EDEA.tmp"C:\Users\Admin\AppData\Local\Temp\EDEA.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\EEC5.tmp"C:\Users\Admin\AppData\Local\Temp\EEC5.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\EFCE.tmp"C:\Users\Admin\AppData\Local\Temp\EFCE.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"C:\Users\Admin\AppData\Local\Temp\F0A9.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\F136.tmp"C:\Users\Admin\AppData\Local\Temp\F136.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\F1F1.tmp"C:\Users\Admin\AppData\Local\Temp\F1F1.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\F27E.tmp"C:\Users\Admin\AppData\Local\Temp\F27E.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\F349.tmp"C:\Users\Admin\AppData\Local\Temp\F349.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\F405.tmp"C:\Users\Admin\AppData\Local\Temp\F405.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\F491.tmp"C:\Users\Admin\AppData\Local\Temp\F491.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\F53D.tmp"C:\Users\Admin\AppData\Local\Temp\F53D.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\F695.tmp"C:\Users\Admin\AppData\Local\Temp\F695.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\F712.tmp"C:\Users\Admin\AppData\Local\Temp\F712.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\F79E.tmp"C:\Users\Admin\AppData\Local\Temp\F79E.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\F81B.tmp"C:\Users\Admin\AppData\Local\Temp\F81B.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\F8A8.tmp"C:\Users\Admin\AppData\Local\Temp\F8A8.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\F935.tmp"C:\Users\Admin\AppData\Local\Temp\F935.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FA7D.tmp"C:\Users\Admin\AppData\Local\Temp\FA7D.tmp"1⤵
- Executes dropped EXE
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\FB58.tmp"C:\Users\Admin\AppData\Local\Temp\FB58.tmp"2⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\FBE4.tmp"C:\Users\Admin\AppData\Local\Temp\FBE4.tmp"3⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\FC80.tmp"C:\Users\Admin\AppData\Local\Temp\FC80.tmp"4⤵
- Executes dropped EXE
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\FD4C.tmp"C:\Users\Admin\AppData\Local\Temp\FD4C.tmp"5⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\FDC9.tmp"C:\Users\Admin\AppData\Local\Temp\FDC9.tmp"6⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\FE65.tmp"C:\Users\Admin\AppData\Local\Temp\FE65.tmp"7⤵
- Executes dropped EXE
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\FF01.tmp"C:\Users\Admin\AppData\Local\Temp\FF01.tmp"8⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\FF7E.tmp"C:\Users\Admin\AppData\Local\Temp\FF7E.tmp"9⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\B.tmp"C:\Users\Admin\AppData\Local\Temp\B.tmp"10⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\A7.tmp"C:\Users\Admin\AppData\Local\Temp\A7.tmp"11⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\1FF.tmp"C:\Users\Admin\AppData\Local\Temp\1FF.tmp"12⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\27C.tmp"C:\Users\Admin\AppData\Local\Temp\27C.tmp"13⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\2E9.tmp"C:\Users\Admin\AppData\Local\Temp\2E9.tmp"14⤵
- Executes dropped EXE
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\3B4.tmp"C:\Users\Admin\AppData\Local\Temp\3B4.tmp"15⤵
- Executes dropped EXE
PID:532 -
C:\Users\Admin\AppData\Local\Temp\48F.tmp"C:\Users\Admin\AppData\Local\Temp\48F.tmp"16⤵
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\56A.tmp"C:\Users\Admin\AppData\Local\Temp\56A.tmp"17⤵
- Executes dropped EXE
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\654.tmp"C:\Users\Admin\AppData\Local\Temp\654.tmp"18⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\73E.tmp"C:\Users\Admin\AppData\Local\Temp\73E.tmp"19⤵
- Executes dropped EXE
PID:916 -
C:\Users\Admin\AppData\Local\Temp\858.tmp"C:\Users\Admin\AppData\Local\Temp\858.tmp"20⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\932.tmp"C:\Users\Admin\AppData\Local\Temp\932.tmp"21⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\A1D.tmp"C:\Users\Admin\AppData\Local\Temp\A1D.tmp"22⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\AF8.tmp"C:\Users\Admin\AppData\Local\Temp\AF8.tmp"23⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\BD2.tmp"C:\Users\Admin\AppData\Local\Temp\BD2.tmp"24⤵
- Executes dropped EXE
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\CAD.tmp"C:\Users\Admin\AppData\Local\Temp\CAD.tmp"25⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\D78.tmp"C:\Users\Admin\AppData\Local\Temp\D78.tmp"26⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\E63.tmp"C:\Users\Admin\AppData\Local\Temp\E63.tmp"27⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\EFF.tmp"C:\Users\Admin\AppData\Local\Temp\EFF.tmp"28⤵
- Executes dropped EXE
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\F9B.tmp"C:\Users\Admin\AppData\Local\Temp\F9B.tmp"29⤵
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\1028.tmp"C:\Users\Admin\AppData\Local\Temp\1028.tmp"30⤵
- Executes dropped EXE
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\10D4.tmp"C:\Users\Admin\AppData\Local\Temp\10D4.tmp"31⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\117F.tmp"C:\Users\Admin\AppData\Local\Temp\117F.tmp"32⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\120C.tmp"C:\Users\Admin\AppData\Local\Temp\120C.tmp"33⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\12A8.tmp"C:\Users\Admin\AppData\Local\Temp\12A8.tmp"34⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\1345.tmp"C:\Users\Admin\AppData\Local\Temp\1345.tmp"35⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\13F0.tmp"C:\Users\Admin\AppData\Local\Temp\13F0.tmp"36⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\149C.tmp"C:\Users\Admin\AppData\Local\Temp\149C.tmp"37⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\150A.tmp"C:\Users\Admin\AppData\Local\Temp\150A.tmp"38⤵
- Executes dropped EXE
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\1587.tmp"C:\Users\Admin\AppData\Local\Temp\1587.tmp"39⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\1604.tmp"C:\Users\Admin\AppData\Local\Temp\1604.tmp"40⤵
- Executes dropped EXE
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\1671.tmp"C:\Users\Admin\AppData\Local\Temp\1671.tmp"41⤵
- Executes dropped EXE
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\16EE.tmp"C:\Users\Admin\AppData\Local\Temp\16EE.tmp"42⤵
- Executes dropped EXE
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\176B.tmp"C:\Users\Admin\AppData\Local\Temp\176B.tmp"43⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\1807.tmp"C:\Users\Admin\AppData\Local\Temp\1807.tmp"44⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\1884.tmp"C:\Users\Admin\AppData\Local\Temp\1884.tmp"45⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\1901.tmp"C:\Users\Admin\AppData\Local\Temp\1901.tmp"46⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\196F.tmp"C:\Users\Admin\AppData\Local\Temp\196F.tmp"47⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\19FB.tmp"C:\Users\Admin\AppData\Local\Temp\19FB.tmp"48⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\1A69.tmp"C:\Users\Admin\AppData\Local\Temp\1A69.tmp"49⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\1AD6.tmp"C:\Users\Admin\AppData\Local\Temp\1AD6.tmp"50⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\1B43.tmp"C:\Users\Admin\AppData\Local\Temp\1B43.tmp"51⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"52⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\1C8C.tmp"C:\Users\Admin\AppData\Local\Temp\1C8C.tmp"53⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\1D18.tmp"C:\Users\Admin\AppData\Local\Temp\1D18.tmp"54⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"C:\Users\Admin\AppData\Local\Temp\1DA5.tmp"55⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\1E31.tmp"C:\Users\Admin\AppData\Local\Temp\1E31.tmp"56⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"57⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"58⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"59⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\1FF7.tmp"C:\Users\Admin\AppData\Local\Temp\1FF7.tmp"60⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\2093.tmp"C:\Users\Admin\AppData\Local\Temp\2093.tmp"61⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\2100.tmp"C:\Users\Admin\AppData\Local\Temp\2100.tmp"62⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\216E.tmp"C:\Users\Admin\AppData\Local\Temp\216E.tmp"63⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\21DB.tmp"C:\Users\Admin\AppData\Local\Temp\21DB.tmp"64⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\2239.tmp"C:\Users\Admin\AppData\Local\Temp\2239.tmp"65⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\2296.tmp"C:\Users\Admin\AppData\Local\Temp\2296.tmp"66⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\2304.tmp"C:\Users\Admin\AppData\Local\Temp\2304.tmp"67⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\2381.tmp"C:\Users\Admin\AppData\Local\Temp\2381.tmp"68⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\23FE.tmp"C:\Users\Admin\AppData\Local\Temp\23FE.tmp"69⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\246B.tmp"C:\Users\Admin\AppData\Local\Temp\246B.tmp"70⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\2517.tmp"C:\Users\Admin\AppData\Local\Temp\2517.tmp"71⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\25A4.tmp"C:\Users\Admin\AppData\Local\Temp\25A4.tmp"72⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\2650.tmp"C:\Users\Admin\AppData\Local\Temp\2650.tmp"73⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\270B.tmp"C:\Users\Admin\AppData\Local\Temp\270B.tmp"74⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\27A7.tmp"C:\Users\Admin\AppData\Local\Temp\27A7.tmp"75⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\2834.tmp"C:\Users\Admin\AppData\Local\Temp\2834.tmp"76⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\28B1.tmp"C:\Users\Admin\AppData\Local\Temp\28B1.tmp"77⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"78⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\29E9.tmp"C:\Users\Admin\AppData\Local\Temp\29E9.tmp"79⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\2A66.tmp"C:\Users\Admin\AppData\Local\Temp\2A66.tmp"80⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\2B03.tmp"C:\Users\Admin\AppData\Local\Temp\2B03.tmp"81⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"82⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\2C2C.tmp"C:\Users\Admin\AppData\Local\Temp\2C2C.tmp"83⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"84⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\2D35.tmp"C:\Users\Admin\AppData\Local\Temp\2D35.tmp"85⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"C:\Users\Admin\AppData\Local\Temp\2DB2.tmp"86⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"87⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"88⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\2F68.tmp"C:\Users\Admin\AppData\Local\Temp\2F68.tmp"89⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\3014.tmp"C:\Users\Admin\AppData\Local\Temp\3014.tmp"90⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\30A0.tmp"C:\Users\Admin\AppData\Local\Temp\30A0.tmp"91⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\312D.tmp"C:\Users\Admin\AppData\Local\Temp\312D.tmp"92⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\31C9.tmp"C:\Users\Admin\AppData\Local\Temp\31C9.tmp"93⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\3236.tmp"C:\Users\Admin\AppData\Local\Temp\3236.tmp"94⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\32A4.tmp"C:\Users\Admin\AppData\Local\Temp\32A4.tmp"95⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\3340.tmp"C:\Users\Admin\AppData\Local\Temp\3340.tmp"96⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\33CD.tmp"C:\Users\Admin\AppData\Local\Temp\33CD.tmp"97⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\3479.tmp"C:\Users\Admin\AppData\Local\Temp\3479.tmp"98⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\34F6.tmp"C:\Users\Admin\AppData\Local\Temp\34F6.tmp"99⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\3573.tmp"C:\Users\Admin\AppData\Local\Temp\3573.tmp"100⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\35F0.tmp"C:\Users\Admin\AppData\Local\Temp\35F0.tmp"101⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\369B.tmp"C:\Users\Admin\AppData\Local\Temp\369B.tmp"102⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\3738.tmp"C:\Users\Admin\AppData\Local\Temp\3738.tmp"103⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\37F3.tmp"C:\Users\Admin\AppData\Local\Temp\37F3.tmp"104⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\3870.tmp"C:\Users\Admin\AppData\Local\Temp\3870.tmp"105⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\38FD.tmp"C:\Users\Admin\AppData\Local\Temp\38FD.tmp"106⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\3989.tmp"C:\Users\Admin\AppData\Local\Temp\3989.tmp"107⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\3A06.tmp"C:\Users\Admin\AppData\Local\Temp\3A06.tmp"108⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"C:\Users\Admin\AppData\Local\Temp\3AB2.tmp"109⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"110⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"111⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\3C58.tmp"C:\Users\Admin\AppData\Local\Temp\3C58.tmp"112⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\3D04.tmp"C:\Users\Admin\AppData\Local\Temp\3D04.tmp"113⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"114⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"115⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"C:\Users\Admin\AppData\Local\Temp\3EAA.tmp"116⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\3F85.tmp"C:\Users\Admin\AppData\Local\Temp\3F85.tmp"117⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\4002.tmp"C:\Users\Admin\AppData\Local\Temp\4002.tmp"118⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\408E.tmp"C:\Users\Admin\AppData\Local\Temp\408E.tmp"119⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\412B.tmp"C:\Users\Admin\AppData\Local\Temp\412B.tmp"120⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\41B7.tmp"C:\Users\Admin\AppData\Local\Temp\41B7.tmp"121⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\4253.tmp"C:\Users\Admin\AppData\Local\Temp\4253.tmp"122⤵PID:4676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-