Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 18:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d8ae93d6eb9c792a570d6bebb4349bf7_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d8ae93d6eb9c792a570d6bebb4349bf7_mafia_JC.exe
Resource
win10v2004-20230824-en
3 signatures
150 seconds
General
-
Target
d8ae93d6eb9c792a570d6bebb4349bf7_mafia_JC.exe
-
Size
520KB
-
MD5
d8ae93d6eb9c792a570d6bebb4349bf7
-
SHA1
8852dd89fcfeac4afb69a6a04b3b2dd020b825db
-
SHA256
c738e5a0d6d0ffc93b4b4517335f42798b534647fd1ef91be7920565ab955ca6
-
SHA512
0e3a16f0e21c5c5166c2cf584cf605cc90fcd3932d100ba3c6cd027116afddb46b71b5836f0b23bf98a6d9ce6495a258e56b172817a34d73f04053f896c06f0f
-
SSDEEP
12288:YcRnG07aWiajAILeS6R08g9kr6cCTShFiF1Tu7X4UNZ:YcI0BiIllMv3uaFiTuj4UN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1340 2B51.tmp 4412 2C4B.tmp 4252 2D06.tmp 2016 3999.tmp 3152 3C0A.tmp 4512 3D43.tmp 4908 3E2D.tmp 856 3F17.tmp 4304 3FD3.tmp 3644 408E.tmp 4524 414A.tmp 932 4205.tmp 4964 42C1.tmp 4380 43AB.tmp 1992 4486.tmp 3264 4532.tmp 2864 45FD.tmp 2284 4699.tmp 3776 47F1.tmp 2448 48BC.tmp 2612 49C6.tmp 1632 4A72.tmp 3416 4B3D.tmp 5000 4C17.tmp 2496 4D31.tmp 2484 4DEC.tmp 1708 4E98.tmp 468 4F25.tmp 1392 4FF0.tmp 5076 50BB.tmp 4696 5157.tmp 3700 5232.tmp 4516 52AF.tmp 1396 534B.tmp 2920 5407.tmp 3360 5484.tmp 5012 554F.tmp 4180 5658.tmp 412 5704.tmp 2424 5781.tmp 3260 582D.tmp 928 58D9.tmp 368 5975.tmp 3140 5AEC.tmp 2648 5BA8.tmp 1140 5CB1.tmp 1952 5D7D.tmp 2856 5E86.tmp 2076 5F32.tmp 3408 5FBF.tmp 4840 605B.tmp 4160 60D8.tmp 924 61A3.tmp 4852 6230.tmp 856 630A.tmp 2812 6378.tmp 4304 6414.tmp 3284 64B0.tmp 4292 652D.tmp 4844 65BA.tmp 3620 6666.tmp 4964 6721.tmp 1036 679E.tmp 4956 683B.tmp -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{0D4940F6-EE44-4EFC-ACA3-D8663A60A69A}.catalogItem svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1340 1140 d8ae93d6eb9c792a570d6bebb4349bf7_mafia_JC.exe 85 PID 1140 wrote to memory of 1340 1140 d8ae93d6eb9c792a570d6bebb4349bf7_mafia_JC.exe 85 PID 1140 wrote to memory of 1340 1140 d8ae93d6eb9c792a570d6bebb4349bf7_mafia_JC.exe 85 PID 1340 wrote to memory of 4412 1340 2B51.tmp 86 PID 1340 wrote to memory of 4412 1340 2B51.tmp 86 PID 1340 wrote to memory of 4412 1340 2B51.tmp 86 PID 4412 wrote to memory of 4252 4412 2C4B.tmp 88 PID 4412 wrote to memory of 4252 4412 2C4B.tmp 88 PID 4412 wrote to memory of 4252 4412 2C4B.tmp 88 PID 4252 wrote to memory of 2016 4252 2D06.tmp 89 PID 4252 wrote to memory of 2016 4252 2D06.tmp 89 PID 4252 wrote to memory of 2016 4252 2D06.tmp 89 PID 2016 wrote to memory of 3152 2016 3999.tmp 90 PID 2016 wrote to memory of 3152 2016 3999.tmp 90 PID 2016 wrote to memory of 3152 2016 3999.tmp 90 PID 3152 wrote to memory of 4512 3152 3C0A.tmp 91 PID 3152 wrote to memory of 4512 3152 3C0A.tmp 91 PID 3152 wrote to memory of 4512 3152 3C0A.tmp 91 PID 4512 wrote to memory of 4908 4512 3D43.tmp 92 PID 4512 wrote to memory of 4908 4512 3D43.tmp 92 PID 4512 wrote to memory of 4908 4512 3D43.tmp 92 PID 4908 wrote to memory of 856 4908 3E2D.tmp 93 PID 4908 wrote to memory of 856 4908 3E2D.tmp 93 PID 4908 wrote to memory of 856 4908 3E2D.tmp 93 PID 856 wrote to memory of 4304 856 3F17.tmp 95 PID 856 wrote to memory of 4304 856 3F17.tmp 95 PID 856 wrote to memory of 4304 856 3F17.tmp 95 PID 4304 wrote to memory of 3644 4304 3FD3.tmp 96 PID 4304 wrote to memory of 3644 4304 3FD3.tmp 96 PID 4304 wrote to memory of 3644 4304 3FD3.tmp 96 PID 3644 wrote to memory of 4524 3644 408E.tmp 97 PID 3644 wrote to memory of 4524 3644 408E.tmp 97 PID 3644 wrote to memory of 4524 3644 408E.tmp 97 PID 4524 wrote to memory of 932 4524 414A.tmp 98 PID 4524 wrote to memory of 932 4524 414A.tmp 98 PID 4524 wrote to memory of 932 4524 414A.tmp 98 PID 932 wrote to memory of 4964 932 4205.tmp 99 PID 932 wrote to memory of 4964 932 4205.tmp 99 PID 932 wrote to memory of 4964 932 4205.tmp 99 PID 4964 wrote to memory of 4380 4964 42C1.tmp 100 PID 4964 wrote to memory of 4380 4964 42C1.tmp 100 PID 4964 wrote to memory of 4380 4964 42C1.tmp 100 PID 4380 wrote to memory of 1992 4380 43AB.tmp 101 PID 4380 wrote to memory of 1992 4380 43AB.tmp 101 PID 4380 wrote to memory of 1992 4380 43AB.tmp 101 PID 1992 wrote to memory of 3264 1992 4486.tmp 102 PID 1992 wrote to memory of 3264 1992 4486.tmp 102 PID 1992 wrote to memory of 3264 1992 4486.tmp 102 PID 3264 wrote to memory of 2864 3264 4532.tmp 103 PID 3264 wrote to memory of 2864 3264 4532.tmp 103 PID 3264 wrote to memory of 2864 3264 4532.tmp 103 PID 2864 wrote to memory of 2284 2864 45FD.tmp 104 PID 2864 wrote to memory of 2284 2864 45FD.tmp 104 PID 2864 wrote to memory of 2284 2864 45FD.tmp 104 PID 2284 wrote to memory of 3776 2284 4699.tmp 105 PID 2284 wrote to memory of 3776 2284 4699.tmp 105 PID 2284 wrote to memory of 3776 2284 4699.tmp 105 PID 3776 wrote to memory of 2448 3776 47F1.tmp 106 PID 3776 wrote to memory of 2448 3776 47F1.tmp 106 PID 3776 wrote to memory of 2448 3776 47F1.tmp 106 PID 2448 wrote to memory of 2612 2448 48BC.tmp 107 PID 2448 wrote to memory of 2612 2448 48BC.tmp 107 PID 2448 wrote to memory of 2612 2448 48BC.tmp 107 PID 2612 wrote to memory of 1632 2612 49C6.tmp 108
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:4636
-
C:\Users\Admin\AppData\Local\Temp\d8ae93d6eb9c792a570d6bebb4349bf7_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\d8ae93d6eb9c792a570d6bebb4349bf7_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\2B51.tmp"C:\Users\Admin\AppData\Local\Temp\2B51.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\2C4B.tmp"C:\Users\Admin\AppData\Local\Temp\2C4B.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\2D06.tmp"C:\Users\Admin\AppData\Local\Temp\2D06.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\3999.tmp"C:\Users\Admin\AppData\Local\Temp\3999.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\3D43.tmp"C:\Users\Admin\AppData\Local\Temp\3D43.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\3F17.tmp"C:\Users\Admin\AppData\Local\Temp\3F17.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\3FD3.tmp"C:\Users\Admin\AppData\Local\Temp\3FD3.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\408E.tmp"C:\Users\Admin\AppData\Local\Temp\408E.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\414A.tmp"C:\Users\Admin\AppData\Local\Temp\414A.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\4205.tmp"C:\Users\Admin\AppData\Local\Temp\4205.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\42C1.tmp"C:\Users\Admin\AppData\Local\Temp\42C1.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\43AB.tmp"C:\Users\Admin\AppData\Local\Temp\43AB.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\4486.tmp"C:\Users\Admin\AppData\Local\Temp\4486.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\4532.tmp"C:\Users\Admin\AppData\Local\Temp\4532.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\45FD.tmp"C:\Users\Admin\AppData\Local\Temp\45FD.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\4699.tmp"C:\Users\Admin\AppData\Local\Temp\4699.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\47F1.tmp"C:\Users\Admin\AppData\Local\Temp\47F1.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\48BC.tmp"C:\Users\Admin\AppData\Local\Temp\48BC.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\49C6.tmp"C:\Users\Admin\AppData\Local\Temp\49C6.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\4A72.tmp"C:\Users\Admin\AppData\Local\Temp\4A72.tmp"23⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\4B3D.tmp"C:\Users\Admin\AppData\Local\Temp\4B3D.tmp"24⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\4C17.tmp"C:\Users\Admin\AppData\Local\Temp\4C17.tmp"25⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\4D31.tmp"C:\Users\Admin\AppData\Local\Temp\4D31.tmp"26⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"27⤵
- Executes dropped EXE
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\4E98.tmp"C:\Users\Admin\AppData\Local\Temp\4E98.tmp"28⤵
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\4F25.tmp"C:\Users\Admin\AppData\Local\Temp\4F25.tmp"29⤵
- Executes dropped EXE
PID:468 -
C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"30⤵
- Executes dropped EXE
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\50BB.tmp"C:\Users\Admin\AppData\Local\Temp\50BB.tmp"31⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\5157.tmp"C:\Users\Admin\AppData\Local\Temp\5157.tmp"32⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\5232.tmp"C:\Users\Admin\AppData\Local\Temp\5232.tmp"33⤵
- Executes dropped EXE
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\52AF.tmp"C:\Users\Admin\AppData\Local\Temp\52AF.tmp"34⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\534B.tmp"C:\Users\Admin\AppData\Local\Temp\534B.tmp"35⤵
- Executes dropped EXE
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\5407.tmp"C:\Users\Admin\AppData\Local\Temp\5407.tmp"36⤵
- Executes dropped EXE
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\5484.tmp"C:\Users\Admin\AppData\Local\Temp\5484.tmp"37⤵
- Executes dropped EXE
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\554F.tmp"C:\Users\Admin\AppData\Local\Temp\554F.tmp"38⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\5658.tmp"C:\Users\Admin\AppData\Local\Temp\5658.tmp"39⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\5704.tmp"C:\Users\Admin\AppData\Local\Temp\5704.tmp"40⤵
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\5781.tmp"C:\Users\Admin\AppData\Local\Temp\5781.tmp"41⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\582D.tmp"C:\Users\Admin\AppData\Local\Temp\582D.tmp"42⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\58D9.tmp"C:\Users\Admin\AppData\Local\Temp\58D9.tmp"43⤵
- Executes dropped EXE
PID:928 -
C:\Users\Admin\AppData\Local\Temp\5975.tmp"C:\Users\Admin\AppData\Local\Temp\5975.tmp"44⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\5A40.tmp"C:\Users\Admin\AppData\Local\Temp\5A40.tmp"45⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\5AEC.tmp"C:\Users\Admin\AppData\Local\Temp\5AEC.tmp"46⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\5BA8.tmp"C:\Users\Admin\AppData\Local\Temp\5BA8.tmp"47⤵
- Executes dropped EXE
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"C:\Users\Admin\AppData\Local\Temp\5CB1.tmp"48⤵
- Executes dropped EXE
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"49⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\5E86.tmp"C:\Users\Admin\AppData\Local\Temp\5E86.tmp"50⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\5F32.tmp"C:\Users\Admin\AppData\Local\Temp\5F32.tmp"51⤵
- Executes dropped EXE
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\5FBF.tmp"C:\Users\Admin\AppData\Local\Temp\5FBF.tmp"52⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\605B.tmp"C:\Users\Admin\AppData\Local\Temp\605B.tmp"53⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\60D8.tmp"C:\Users\Admin\AppData\Local\Temp\60D8.tmp"54⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\61A3.tmp"C:\Users\Admin\AppData\Local\Temp\61A3.tmp"55⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\6230.tmp"C:\Users\Admin\AppData\Local\Temp\6230.tmp"56⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\630A.tmp"C:\Users\Admin\AppData\Local\Temp\630A.tmp"57⤵
- Executes dropped EXE
PID:856 -
C:\Users\Admin\AppData\Local\Temp\6378.tmp"C:\Users\Admin\AppData\Local\Temp\6378.tmp"58⤵
- Executes dropped EXE
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\6414.tmp"C:\Users\Admin\AppData\Local\Temp\6414.tmp"59⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\64B0.tmp"C:\Users\Admin\AppData\Local\Temp\64B0.tmp"60⤵
- Executes dropped EXE
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\652D.tmp"C:\Users\Admin\AppData\Local\Temp\652D.tmp"61⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\65BA.tmp"C:\Users\Admin\AppData\Local\Temp\65BA.tmp"62⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\6666.tmp"C:\Users\Admin\AppData\Local\Temp\6666.tmp"63⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\6721.tmp"C:\Users\Admin\AppData\Local\Temp\6721.tmp"64⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\679E.tmp"C:\Users\Admin\AppData\Local\Temp\679E.tmp"65⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\683B.tmp"C:\Users\Admin\AppData\Local\Temp\683B.tmp"66⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\6906.tmp"C:\Users\Admin\AppData\Local\Temp\6906.tmp"67⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\69A2.tmp"C:\Users\Admin\AppData\Local\Temp\69A2.tmp"68⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\6A3E.tmp"C:\Users\Admin\AppData\Local\Temp\6A3E.tmp"69⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\6ACB.tmp"C:\Users\Admin\AppData\Local\Temp\6ACB.tmp"70⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\6B48.tmp"C:\Users\Admin\AppData\Local\Temp\6B48.tmp"71⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\6BD4.tmp"C:\Users\Admin\AppData\Local\Temp\6BD4.tmp"72⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"73⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\6D1D.tmp"C:\Users\Admin\AppData\Local\Temp\6D1D.tmp"74⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\6DD8.tmp"C:\Users\Admin\AppData\Local\Temp\6DD8.tmp"75⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\6E55.tmp"C:\Users\Admin\AppData\Local\Temp\6E55.tmp"76⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\6ED2.tmp"C:\Users\Admin\AppData\Local\Temp\6ED2.tmp"77⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"78⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\700B.tmp"C:\Users\Admin\AppData\Local\Temp\700B.tmp"79⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\70B6.tmp"C:\Users\Admin\AppData\Local\Temp\70B6.tmp"80⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\7143.tmp"C:\Users\Admin\AppData\Local\Temp\7143.tmp"81⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\71C0.tmp"C:\Users\Admin\AppData\Local\Temp\71C0.tmp"82⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\728B.tmp"C:\Users\Admin\AppData\Local\Temp\728B.tmp"83⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\7308.tmp"C:\Users\Admin\AppData\Local\Temp\7308.tmp"84⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\73D3.tmp"C:\Users\Admin\AppData\Local\Temp\73D3.tmp"85⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\7450.tmp"C:\Users\Admin\AppData\Local\Temp\7450.tmp"86⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\74BE.tmp"C:\Users\Admin\AppData\Local\Temp\74BE.tmp"87⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\756A.tmp"C:\Users\Admin\AppData\Local\Temp\756A.tmp"88⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\7673.tmp"C:\Users\Admin\AppData\Local\Temp\7673.tmp"89⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\776D.tmp"C:\Users\Admin\AppData\Local\Temp\776D.tmp"90⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\77FA.tmp"C:\Users\Admin\AppData\Local\Temp\77FA.tmp"91⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\7867.tmp"C:\Users\Admin\AppData\Local\Temp\7867.tmp"92⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\7913.tmp"C:\Users\Admin\AppData\Local\Temp\7913.tmp"93⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\79A0.tmp"C:\Users\Admin\AppData\Local\Temp\79A0.tmp"94⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"95⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\7A9A.tmp"C:\Users\Admin\AppData\Local\Temp\7A9A.tmp"96⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\7B26.tmp"C:\Users\Admin\AppData\Local\Temp\7B26.tmp"97⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\7BB3.tmp"C:\Users\Admin\AppData\Local\Temp\7BB3.tmp"98⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\7C20.tmp"C:\Users\Admin\AppData\Local\Temp\7C20.tmp"99⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\7CDC.tmp"C:\Users\Admin\AppData\Local\Temp\7CDC.tmp"100⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\7D68.tmp"C:\Users\Admin\AppData\Local\Temp\7D68.tmp"101⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\7DF5.tmp"C:\Users\Admin\AppData\Local\Temp\7DF5.tmp"102⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\7E72.tmp"C:\Users\Admin\AppData\Local\Temp\7E72.tmp"103⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\7F0E.tmp"C:\Users\Admin\AppData\Local\Temp\7F0E.tmp"104⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\7F7C.tmp"C:\Users\Admin\AppData\Local\Temp\7F7C.tmp"105⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\8008.tmp"C:\Users\Admin\AppData\Local\Temp\8008.tmp"106⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\80A5.tmp"C:\Users\Admin\AppData\Local\Temp\80A5.tmp"107⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\8141.tmp"C:\Users\Admin\AppData\Local\Temp\8141.tmp"108⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\81CD.tmp"C:\Users\Admin\AppData\Local\Temp\81CD.tmp"109⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\825A.tmp"C:\Users\Admin\AppData\Local\Temp\825A.tmp"110⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\82D7.tmp"C:\Users\Admin\AppData\Local\Temp\82D7.tmp"111⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\8354.tmp"C:\Users\Admin\AppData\Local\Temp\8354.tmp"112⤵PID:500
-
C:\Users\Admin\AppData\Local\Temp\83F0.tmp"C:\Users\Admin\AppData\Local\Temp\83F0.tmp"113⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\845E.tmp"C:\Users\Admin\AppData\Local\Temp\845E.tmp"114⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\84DB.tmp"C:\Users\Admin\AppData\Local\Temp\84DB.tmp"115⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\8558.tmp"C:\Users\Admin\AppData\Local\Temp\8558.tmp"116⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\8613.tmp"C:\Users\Admin\AppData\Local\Temp\8613.tmp"117⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\86AF.tmp"C:\Users\Admin\AppData\Local\Temp\86AF.tmp"118⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\872C.tmp"C:\Users\Admin\AppData\Local\Temp\872C.tmp"119⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\87B9.tmp"C:\Users\Admin\AppData\Local\Temp\87B9.tmp"120⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\8865.tmp"C:\Users\Admin\AppData\Local\Temp\8865.tmp"121⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\88F2.tmp"C:\Users\Admin\AppData\Local\Temp\88F2.tmp"122⤵PID:388
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-