Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 19:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cc1a21c2dfe43278b285ebc5c3c872c2_mafia_JC.exe
Resource
win7-20230824-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
cc1a21c2dfe43278b285ebc5c3c872c2_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
cc1a21c2dfe43278b285ebc5c3c872c2_mafia_JC.exe
-
Size
486KB
-
MD5
cc1a21c2dfe43278b285ebc5c3c872c2
-
SHA1
ad5ff271d94ff3a6b830e6bf1962379ab2578b38
-
SHA256
50e9998638c45dcf015288b5b665c663f03d81a6c0fd903f0d34cd23eaaad830
-
SHA512
a668fde63eebf72741e76c41a27eceec13171581e6636ef217219e3f8b3c0c8da6389c204218cc194a67a309f06962f546ef9c511d57cd0304071c39d52d4031
-
SSDEEP
12288:oU5rCOTeiDvPkJQ3s6KrTd/79sV/FHpnzNZ:oUQOJDvPkJt6Kt7iV/3zN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2096 E5DC.tmp 1900 E6C6.tmp 688 E791.tmp 4364 E89B.tmp 4780 E927.tmp 4048 E9F2.tmp 2740 EADD.tmp 1932 EB89.tmp 1404 EC35.tmp 2384 ED00.tmp 2144 EDEA.tmp 368 EEE4.tmp 1428 EFAF.tmp 4376 F1A3.tmp 2996 F23F.tmp 4220 F2DC.tmp 4284 F3C6.tmp 3012 F4A1.tmp 4940 F59B.tmp 416 F666.tmp 4264 F731.tmp 436 F7FC.tmp 540 F898.tmp 4072 F935.tmp 2540 F9F0.tmp 4140 FA7D.tmp 3384 FB48.tmp 896 FC23.tmp 4496 FCDE.tmp 1036 FD9A.tmp 1732 FE94.tmp 5096 FFAD.tmp 3708 78.tmp 2656 134.tmp 1336 1C0.tmp 4224 23D.tmp 3284 356.tmp 4944 3F3.tmp 3768 4BE.tmp 2196 53B.tmp 4996 5F6.tmp 3844 673.tmp 344 72F.tmp 2448 7BB.tmp 4452 867.tmp 3352 8F4.tmp 3444 990.tmp 3416 A1D.tmp 2424 AD8.tmp 4756 B84.tmp 2980 C01.tmp 720 CBD.tmp 312 DD6.tmp 1664 EC0.tmp 1424 F6C.tmp 4056 1008.tmp 4008 10C4.tmp 1652 117F.tmp 2232 121C.tmp 4024 12A8.tmp 3560 1345.tmp 1964 13C2.tmp 2384 146D.tmp 1500 14DB.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3992 wrote to memory of 2096 3992 cc1a21c2dfe43278b285ebc5c3c872c2_mafia_JC.exe 81 PID 3992 wrote to memory of 2096 3992 cc1a21c2dfe43278b285ebc5c3c872c2_mafia_JC.exe 81 PID 3992 wrote to memory of 2096 3992 cc1a21c2dfe43278b285ebc5c3c872c2_mafia_JC.exe 81 PID 2096 wrote to memory of 1900 2096 E5DC.tmp 82 PID 2096 wrote to memory of 1900 2096 E5DC.tmp 82 PID 2096 wrote to memory of 1900 2096 E5DC.tmp 82 PID 1900 wrote to memory of 688 1900 E6C6.tmp 83 PID 1900 wrote to memory of 688 1900 E6C6.tmp 83 PID 1900 wrote to memory of 688 1900 E6C6.tmp 83 PID 688 wrote to memory of 4364 688 E791.tmp 84 PID 688 wrote to memory of 4364 688 E791.tmp 84 PID 688 wrote to memory of 4364 688 E791.tmp 84 PID 4364 wrote to memory of 4780 4364 E89B.tmp 85 PID 4364 wrote to memory of 4780 4364 E89B.tmp 85 PID 4364 wrote to memory of 4780 4364 E89B.tmp 85 PID 4780 wrote to memory of 4048 4780 E927.tmp 86 PID 4780 wrote to memory of 4048 4780 E927.tmp 86 PID 4780 wrote to memory of 4048 4780 E927.tmp 86 PID 4048 wrote to memory of 2740 4048 E9F2.tmp 87 PID 4048 wrote to memory of 2740 4048 E9F2.tmp 87 PID 4048 wrote to memory of 2740 4048 E9F2.tmp 87 PID 2740 wrote to memory of 1932 2740 EADD.tmp 89 PID 2740 wrote to memory of 1932 2740 EADD.tmp 89 PID 2740 wrote to memory of 1932 2740 EADD.tmp 89 PID 1932 wrote to memory of 1404 1932 EB89.tmp 90 PID 1932 wrote to memory of 1404 1932 EB89.tmp 90 PID 1932 wrote to memory of 1404 1932 EB89.tmp 90 PID 1404 wrote to memory of 2384 1404 EC35.tmp 91 PID 1404 wrote to memory of 2384 1404 EC35.tmp 91 PID 1404 wrote to memory of 2384 1404 EC35.tmp 91 PID 2384 wrote to memory of 2144 2384 ED00.tmp 92 PID 2384 wrote to memory of 2144 2384 ED00.tmp 92 PID 2384 wrote to memory of 2144 2384 ED00.tmp 92 PID 2144 wrote to memory of 368 2144 EDEA.tmp 93 PID 2144 wrote to memory of 368 2144 EDEA.tmp 93 PID 2144 wrote to memory of 368 2144 EDEA.tmp 93 PID 368 wrote to memory of 1428 368 EEE4.tmp 94 PID 368 wrote to memory of 1428 368 EEE4.tmp 94 PID 368 wrote to memory of 1428 368 EEE4.tmp 94 PID 1428 wrote to memory of 4376 1428 EFAF.tmp 95 PID 1428 wrote to memory of 4376 1428 EFAF.tmp 95 PID 1428 wrote to memory of 4376 1428 EFAF.tmp 95 PID 4376 wrote to memory of 2996 4376 F1A3.tmp 96 PID 4376 wrote to memory of 2996 4376 F1A3.tmp 96 PID 4376 wrote to memory of 2996 4376 F1A3.tmp 96 PID 2996 wrote to memory of 4220 2996 F23F.tmp 97 PID 2996 wrote to memory of 4220 2996 F23F.tmp 97 PID 2996 wrote to memory of 4220 2996 F23F.tmp 97 PID 4220 wrote to memory of 4284 4220 F2DC.tmp 100 PID 4220 wrote to memory of 4284 4220 F2DC.tmp 100 PID 4220 wrote to memory of 4284 4220 F2DC.tmp 100 PID 4284 wrote to memory of 3012 4284 F3C6.tmp 101 PID 4284 wrote to memory of 3012 4284 F3C6.tmp 101 PID 4284 wrote to memory of 3012 4284 F3C6.tmp 101 PID 3012 wrote to memory of 4940 3012 F4A1.tmp 102 PID 3012 wrote to memory of 4940 3012 F4A1.tmp 102 PID 3012 wrote to memory of 4940 3012 F4A1.tmp 102 PID 4940 wrote to memory of 416 4940 F59B.tmp 103 PID 4940 wrote to memory of 416 4940 F59B.tmp 103 PID 4940 wrote to memory of 416 4940 F59B.tmp 103 PID 416 wrote to memory of 4264 416 F666.tmp 104 PID 416 wrote to memory of 4264 416 F666.tmp 104 PID 416 wrote to memory of 4264 416 F666.tmp 104 PID 4264 wrote to memory of 436 4264 F731.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc1a21c2dfe43278b285ebc5c3c872c2_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\cc1a21c2dfe43278b285ebc5c3c872c2_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\E5DC.tmp"C:\Users\Admin\AppData\Local\Temp\E5DC.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\E6C6.tmp"C:\Users\Admin\AppData\Local\Temp\E6C6.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\E791.tmp"C:\Users\Admin\AppData\Local\Temp\E791.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\E89B.tmp"C:\Users\Admin\AppData\Local\Temp\E89B.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\E927.tmp"C:\Users\Admin\AppData\Local\Temp\E927.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\EADD.tmp"C:\Users\Admin\AppData\Local\Temp\EADD.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\EB89.tmp"C:\Users\Admin\AppData\Local\Temp\EB89.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\EC35.tmp"C:\Users\Admin\AppData\Local\Temp\EC35.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\ED00.tmp"C:\Users\Admin\AppData\Local\Temp\ED00.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\EDEA.tmp"C:\Users\Admin\AppData\Local\Temp\EDEA.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\F1A3.tmp"C:\Users\Admin\AppData\Local\Temp\F1A3.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\F23F.tmp"C:\Users\Admin\AppData\Local\Temp\F23F.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\F2DC.tmp"C:\Users\Admin\AppData\Local\Temp\F2DC.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\F3C6.tmp"C:\Users\Admin\AppData\Local\Temp\F3C6.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\F4A1.tmp"C:\Users\Admin\AppData\Local\Temp\F4A1.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\F59B.tmp"C:\Users\Admin\AppData\Local\Temp\F59B.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\F666.tmp"C:\Users\Admin\AppData\Local\Temp\F666.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Users\Admin\AppData\Local\Temp\F731.tmp"C:\Users\Admin\AppData\Local\Temp\F731.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"23⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\F898.tmp"C:\Users\Admin\AppData\Local\Temp\F898.tmp"24⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\F935.tmp"C:\Users\Admin\AppData\Local\Temp\F935.tmp"25⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"C:\Users\Admin\AppData\Local\Temp\F9F0.tmp"26⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\FA7D.tmp"C:\Users\Admin\AppData\Local\Temp\FA7D.tmp"27⤵
- Executes dropped EXE
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\FB48.tmp"C:\Users\Admin\AppData\Local\Temp\FB48.tmp"28⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\FC23.tmp"C:\Users\Admin\AppData\Local\Temp\FC23.tmp"29⤵
- Executes dropped EXE
PID:896 -
C:\Users\Admin\AppData\Local\Temp\FCDE.tmp"C:\Users\Admin\AppData\Local\Temp\FCDE.tmp"30⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"31⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\FE94.tmp"C:\Users\Admin\AppData\Local\Temp\FE94.tmp"32⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"33⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\78.tmp"C:\Users\Admin\AppData\Local\Temp\78.tmp"34⤵
- Executes dropped EXE
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\134.tmp"C:\Users\Admin\AppData\Local\Temp\134.tmp"35⤵
- Executes dropped EXE
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\1C0.tmp"C:\Users\Admin\AppData\Local\Temp\1C0.tmp"36⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\23D.tmp"C:\Users\Admin\AppData\Local\Temp\23D.tmp"37⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\356.tmp"C:\Users\Admin\AppData\Local\Temp\356.tmp"38⤵
- Executes dropped EXE
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\3F3.tmp"C:\Users\Admin\AppData\Local\Temp\3F3.tmp"39⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\4BE.tmp"C:\Users\Admin\AppData\Local\Temp\4BE.tmp"40⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\53B.tmp"C:\Users\Admin\AppData\Local\Temp\53B.tmp"41⤵
- Executes dropped EXE
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\5F6.tmp"C:\Users\Admin\AppData\Local\Temp\5F6.tmp"42⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\673.tmp"C:\Users\Admin\AppData\Local\Temp\673.tmp"43⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\72F.tmp"C:\Users\Admin\AppData\Local\Temp\72F.tmp"44⤵
- Executes dropped EXE
PID:344 -
C:\Users\Admin\AppData\Local\Temp\7BB.tmp"C:\Users\Admin\AppData\Local\Temp\7BB.tmp"45⤵
- Executes dropped EXE
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\867.tmp"C:\Users\Admin\AppData\Local\Temp\867.tmp"46⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\8F4.tmp"C:\Users\Admin\AppData\Local\Temp\8F4.tmp"47⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\990.tmp"C:\Users\Admin\AppData\Local\Temp\990.tmp"48⤵
- Executes dropped EXE
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\A1D.tmp"C:\Users\Admin\AppData\Local\Temp\A1D.tmp"49⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\AD8.tmp"C:\Users\Admin\AppData\Local\Temp\AD8.tmp"50⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\B84.tmp"C:\Users\Admin\AppData\Local\Temp\B84.tmp"51⤵
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\C01.tmp"C:\Users\Admin\AppData\Local\Temp\C01.tmp"52⤵
- Executes dropped EXE
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"53⤵
- Executes dropped EXE
PID:720 -
C:\Users\Admin\AppData\Local\Temp\DD6.tmp"C:\Users\Admin\AppData\Local\Temp\DD6.tmp"54⤵
- Executes dropped EXE
PID:312 -
C:\Users\Admin\AppData\Local\Temp\EC0.tmp"C:\Users\Admin\AppData\Local\Temp\EC0.tmp"55⤵
- Executes dropped EXE
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\F6C.tmp"C:\Users\Admin\AppData\Local\Temp\F6C.tmp"56⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\1008.tmp"C:\Users\Admin\AppData\Local\Temp\1008.tmp"57⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\10C4.tmp"C:\Users\Admin\AppData\Local\Temp\10C4.tmp"58⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\117F.tmp"C:\Users\Admin\AppData\Local\Temp\117F.tmp"59⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\121C.tmp"C:\Users\Admin\AppData\Local\Temp\121C.tmp"60⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\12A8.tmp"C:\Users\Admin\AppData\Local\Temp\12A8.tmp"61⤵
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\1345.tmp"C:\Users\Admin\AppData\Local\Temp\1345.tmp"62⤵
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\13C2.tmp"C:\Users\Admin\AppData\Local\Temp\13C2.tmp"63⤵
- Executes dropped EXE
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\146D.tmp"C:\Users\Admin\AppData\Local\Temp\146D.tmp"64⤵
- Executes dropped EXE
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\14DB.tmp"C:\Users\Admin\AppData\Local\Temp\14DB.tmp"65⤵
- Executes dropped EXE
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\1558.tmp"C:\Users\Admin\AppData\Local\Temp\1558.tmp"66⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\15E4.tmp"C:\Users\Admin\AppData\Local\Temp\15E4.tmp"67⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\1681.tmp"C:\Users\Admin\AppData\Local\Temp\1681.tmp"68⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\171D.tmp"C:\Users\Admin\AppData\Local\Temp\171D.tmp"69⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\178A.tmp"C:\Users\Admin\AppData\Local\Temp\178A.tmp"70⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\1807.tmp"C:\Users\Admin\AppData\Local\Temp\1807.tmp"71⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\1921.tmp"C:\Users\Admin\AppData\Local\Temp\1921.tmp"72⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\19AD.tmp"C:\Users\Admin\AppData\Local\Temp\19AD.tmp"73⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\1A3A.tmp"C:\Users\Admin\AppData\Local\Temp\1A3A.tmp"74⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\1AC6.tmp"C:\Users\Admin\AppData\Local\Temp\1AC6.tmp"75⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\1B72.tmp"C:\Users\Admin\AppData\Local\Temp\1B72.tmp"76⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"C:\Users\Admin\AppData\Local\Temp\1BEF.tmp"77⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"C:\Users\Admin\AppData\Local\Temp\1C6C.tmp"78⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\1CE9.tmp"C:\Users\Admin\AppData\Local\Temp\1CE9.tmp"79⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\1D95.tmp"C:\Users\Admin\AppData\Local\Temp\1D95.tmp"80⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\1E03.tmp"C:\Users\Admin\AppData\Local\Temp\1E03.tmp"81⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\1E80.tmp"C:\Users\Admin\AppData\Local\Temp\1E80.tmp"82⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\1EDD.tmp"C:\Users\Admin\AppData\Local\Temp\1EDD.tmp"83⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"C:\Users\Admin\AppData\Local\Temp\1F5A.tmp"84⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\1FF7.tmp"C:\Users\Admin\AppData\Local\Temp\1FF7.tmp"85⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\20A2.tmp"C:\Users\Admin\AppData\Local\Temp\20A2.tmp"86⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\212F.tmp"C:\Users\Admin\AppData\Local\Temp\212F.tmp"87⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\21BC.tmp"C:\Users\Admin\AppData\Local\Temp\21BC.tmp"88⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\2248.tmp"C:\Users\Admin\AppData\Local\Temp\2248.tmp"89⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\2304.tmp"C:\Users\Admin\AppData\Local\Temp\2304.tmp"90⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\23CF.tmp"C:\Users\Admin\AppData\Local\Temp\23CF.tmp"91⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\246B.tmp"C:\Users\Admin\AppData\Local\Temp\246B.tmp"92⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\2507.tmp"C:\Users\Admin\AppData\Local\Temp\2507.tmp"93⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\2594.tmp"C:\Users\Admin\AppData\Local\Temp\2594.tmp"94⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\2630.tmp"C:\Users\Admin\AppData\Local\Temp\2630.tmp"95⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\26BD.tmp"C:\Users\Admin\AppData\Local\Temp\26BD.tmp"96⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\2759.tmp"C:\Users\Admin\AppData\Local\Temp\2759.tmp"97⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\27E6.tmp"C:\Users\Admin\AppData\Local\Temp\27E6.tmp"98⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\2882.tmp"C:\Users\Admin\AppData\Local\Temp\2882.tmp"99⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\293E.tmp"C:\Users\Admin\AppData\Local\Temp\293E.tmp"100⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\29F9.tmp"C:\Users\Admin\AppData\Local\Temp\29F9.tmp"101⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\2A95.tmp"C:\Users\Admin\AppData\Local\Temp\2A95.tmp"102⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\2B12.tmp"C:\Users\Admin\AppData\Local\Temp\2B12.tmp"103⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"104⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"105⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2D26.tmp"C:\Users\Admin\AppData\Local\Temp\2D26.tmp"106⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"C:\Users\Admin\AppData\Local\Temp\2DC2.tmp"107⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\2E5E.tmp"C:\Users\Admin\AppData\Local\Temp\2E5E.tmp"108⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"C:\Users\Admin\AppData\Local\Temp\2EFA.tmp"109⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"110⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\3033.tmp"C:\Users\Admin\AppData\Local\Temp\3033.tmp"111⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\30BF.tmp"C:\Users\Admin\AppData\Local\Temp\30BF.tmp"112⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\318B.tmp"C:\Users\Admin\AppData\Local\Temp\318B.tmp"113⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\3256.tmp"C:\Users\Admin\AppData\Local\Temp\3256.tmp"114⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"115⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\338E.tmp"C:\Users\Admin\AppData\Local\Temp\338E.tmp"116⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"117⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\34C7.tmp"C:\Users\Admin\AppData\Local\Temp\34C7.tmp"118⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\3573.tmp"C:\Users\Admin\AppData\Local\Temp\3573.tmp"119⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\35FF.tmp"C:\Users\Admin\AppData\Local\Temp\35FF.tmp"120⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\367C.tmp"C:\Users\Admin\AppData\Local\Temp\367C.tmp"121⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\3709.tmp"C:\Users\Admin\AppData\Local\Temp\3709.tmp"122⤵PID:1868
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-