Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 18:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
da489b21e098987511695d4e8082e968_mafia_JC.exe
Resource
win7-20230824-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
da489b21e098987511695d4e8082e968_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
da489b21e098987511695d4e8082e968_mafia_JC.exe
-
Size
486KB
-
MD5
da489b21e098987511695d4e8082e968
-
SHA1
c9c57547cce3fe305183822407771e57f4082ec5
-
SHA256
61fcb77f1c57d382453d7b634c46e0a5b1f3349d88cc316ef7d4df15e67c3594
-
SHA512
3cbc8f82163fd69e9f24c4e447a5d2a6122c6586f9531b00ae1b8f1e6a7b7698e88ee191318f0d7b4864a3df763ecf341661c69c22be16734fb2f5f2d1615f2d
-
SSDEEP
12288:oU5rCOTeiDov4nVzbeJNny5O3O/prSS/IdNZ:oUQOJDowncy5OCp18N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3032 AE12.tmp 2772 AEFD.tmp 4716 AFD7.tmp 1640 B074.tmp 1348 B14E.tmp 1956 B1EB.tmp 4568 B2B6.tmp 4644 B3DF.tmp 1808 B47B.tmp 892 B546.tmp 4536 B5D3.tmp 5000 B66F.tmp 224 B759.tmp 3812 B815.tmp 1664 B8D0.tmp 2264 B97C.tmp 4492 BA18.tmp 1328 BB70.tmp 116 BC3B.tmp 4188 BCD8.tmp 2960 BD93.tmp 2500 BE4F.tmp 4580 BEEB.tmp 1840 BFE5.tmp 2584 C340.tmp 3828 C42B.tmp 4036 C4F6.tmp 2028 C7A5.tmp 1148 C832.tmp 760 C92C.tmp 4968 C9B8.tmp 756 CA84.tmp 2800 CB10.tmp 2320 CBAC.tmp 2324 CC58.tmp 5100 CCE5.tmp 4044 CD91.tmp 2184 CE3D.tmp 4876 CEF8.tmp 1984 D225.tmp 4220 D2D1.tmp 4452 D35D.tmp 3256 D3CB.tmp 4688 D448.tmp 4984 D4A5.tmp 4316 D9B6.tmp 2528 DB5C.tmp 1976 DBF8.tmp 3032 DC85.tmp 2772 DD02.tmp 1804 DD7F.tmp 4280 DE2B.tmp 2104 DEB7.tmp 1544 DF34.tmp 1348 E445.tmp 3640 E4F1.tmp 4532 E8D9.tmp 4956 E9B4.tmp 4308 EA7F.tmp 3412 F117.tmp 4432 F2DC.tmp 4112 F51E.tmp 4224 F5AA.tmp 2368 F6A4.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 3032 1552 da489b21e098987511695d4e8082e968_mafia_JC.exe 81 PID 1552 wrote to memory of 3032 1552 da489b21e098987511695d4e8082e968_mafia_JC.exe 81 PID 1552 wrote to memory of 3032 1552 da489b21e098987511695d4e8082e968_mafia_JC.exe 81 PID 3032 wrote to memory of 2772 3032 AE12.tmp 82 PID 3032 wrote to memory of 2772 3032 AE12.tmp 82 PID 3032 wrote to memory of 2772 3032 AE12.tmp 82 PID 2772 wrote to memory of 4716 2772 AEFD.tmp 83 PID 2772 wrote to memory of 4716 2772 AEFD.tmp 83 PID 2772 wrote to memory of 4716 2772 AEFD.tmp 83 PID 4716 wrote to memory of 1640 4716 AFD7.tmp 84 PID 4716 wrote to memory of 1640 4716 AFD7.tmp 84 PID 4716 wrote to memory of 1640 4716 AFD7.tmp 84 PID 1640 wrote to memory of 1348 1640 B074.tmp 85 PID 1640 wrote to memory of 1348 1640 B074.tmp 85 PID 1640 wrote to memory of 1348 1640 B074.tmp 85 PID 1348 wrote to memory of 1956 1348 B14E.tmp 86 PID 1348 wrote to memory of 1956 1348 B14E.tmp 86 PID 1348 wrote to memory of 1956 1348 B14E.tmp 86 PID 1956 wrote to memory of 4568 1956 B1EB.tmp 87 PID 1956 wrote to memory of 4568 1956 B1EB.tmp 87 PID 1956 wrote to memory of 4568 1956 B1EB.tmp 87 PID 4568 wrote to memory of 4644 4568 B2B6.tmp 88 PID 4568 wrote to memory of 4644 4568 B2B6.tmp 88 PID 4568 wrote to memory of 4644 4568 B2B6.tmp 88 PID 4644 wrote to memory of 1808 4644 B3DF.tmp 89 PID 4644 wrote to memory of 1808 4644 B3DF.tmp 89 PID 4644 wrote to memory of 1808 4644 B3DF.tmp 89 PID 1808 wrote to memory of 892 1808 B47B.tmp 90 PID 1808 wrote to memory of 892 1808 B47B.tmp 90 PID 1808 wrote to memory of 892 1808 B47B.tmp 90 PID 892 wrote to memory of 4536 892 B546.tmp 91 PID 892 wrote to memory of 4536 892 B546.tmp 91 PID 892 wrote to memory of 4536 892 B546.tmp 91 PID 4536 wrote to memory of 5000 4536 B5D3.tmp 92 PID 4536 wrote to memory of 5000 4536 B5D3.tmp 92 PID 4536 wrote to memory of 5000 4536 B5D3.tmp 92 PID 5000 wrote to memory of 224 5000 B66F.tmp 95 PID 5000 wrote to memory of 224 5000 B66F.tmp 95 PID 5000 wrote to memory of 224 5000 B66F.tmp 95 PID 224 wrote to memory of 3812 224 B759.tmp 96 PID 224 wrote to memory of 3812 224 B759.tmp 96 PID 224 wrote to memory of 3812 224 B759.tmp 96 PID 3812 wrote to memory of 1664 3812 B815.tmp 97 PID 3812 wrote to memory of 1664 3812 B815.tmp 97 PID 3812 wrote to memory of 1664 3812 B815.tmp 97 PID 1664 wrote to memory of 2264 1664 B8D0.tmp 98 PID 1664 wrote to memory of 2264 1664 B8D0.tmp 98 PID 1664 wrote to memory of 2264 1664 B8D0.tmp 98 PID 2264 wrote to memory of 4492 2264 B97C.tmp 99 PID 2264 wrote to memory of 4492 2264 B97C.tmp 99 PID 2264 wrote to memory of 4492 2264 B97C.tmp 99 PID 4492 wrote to memory of 1328 4492 BA18.tmp 101 PID 4492 wrote to memory of 1328 4492 BA18.tmp 101 PID 4492 wrote to memory of 1328 4492 BA18.tmp 101 PID 1328 wrote to memory of 116 1328 BB70.tmp 102 PID 1328 wrote to memory of 116 1328 BB70.tmp 102 PID 1328 wrote to memory of 116 1328 BB70.tmp 102 PID 116 wrote to memory of 4188 116 BC3B.tmp 103 PID 116 wrote to memory of 4188 116 BC3B.tmp 103 PID 116 wrote to memory of 4188 116 BC3B.tmp 103 PID 4188 wrote to memory of 2960 4188 BCD8.tmp 105 PID 4188 wrote to memory of 2960 4188 BCD8.tmp 105 PID 4188 wrote to memory of 2960 4188 BCD8.tmp 105 PID 2960 wrote to memory of 2500 2960 BD93.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\da489b21e098987511695d4e8082e968_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\da489b21e098987511695d4e8082e968_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\AE12.tmp"C:\Users\Admin\AppData\Local\Temp\AE12.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\AFD7.tmp"C:\Users\Admin\AppData\Local\Temp\AFD7.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\B074.tmp"C:\Users\Admin\AppData\Local\Temp\B074.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\B14E.tmp"C:\Users\Admin\AppData\Local\Temp\B14E.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\B2B6.tmp"C:\Users\Admin\AppData\Local\Temp\B2B6.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\B47B.tmp"C:\Users\Admin\AppData\Local\Temp\B47B.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\B546.tmp"C:\Users\Admin\AppData\Local\Temp\B546.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"C:\Users\Admin\AppData\Local\Temp\B5D3.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\B66F.tmp"C:\Users\Admin\AppData\Local\Temp\B66F.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\B759.tmp"C:\Users\Admin\AppData\Local\Temp\B759.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\B815.tmp"C:\Users\Admin\AppData\Local\Temp\B815.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"C:\Users\Admin\AppData\Local\Temp\B8D0.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\B97C.tmp"C:\Users\Admin\AppData\Local\Temp\B97C.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\BA18.tmp"C:\Users\Admin\AppData\Local\Temp\BA18.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\BB70.tmp"C:\Users\Admin\AppData\Local\Temp\BB70.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\BD93.tmp"C:\Users\Admin\AppData\Local\Temp\BD93.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"23⤵
- Executes dropped EXE
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\BEEB.tmp"C:\Users\Admin\AppData\Local\Temp\BEEB.tmp"24⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"C:\Users\Admin\AppData\Local\Temp\BFE5.tmp"25⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\C340.tmp"C:\Users\Admin\AppData\Local\Temp\C340.tmp"26⤵
- Executes dropped EXE
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\C42B.tmp"C:\Users\Admin\AppData\Local\Temp\C42B.tmp"27⤵
- Executes dropped EXE
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"28⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\C7A5.tmp"C:\Users\Admin\AppData\Local\Temp\C7A5.tmp"29⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\C832.tmp"C:\Users\Admin\AppData\Local\Temp\C832.tmp"30⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\C92C.tmp"C:\Users\Admin\AppData\Local\Temp\C92C.tmp"31⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\C9B8.tmp"C:\Users\Admin\AppData\Local\Temp\C9B8.tmp"32⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\CA84.tmp"C:\Users\Admin\AppData\Local\Temp\CA84.tmp"33⤵
- Executes dropped EXE
PID:756 -
C:\Users\Admin\AppData\Local\Temp\CB10.tmp"C:\Users\Admin\AppData\Local\Temp\CB10.tmp"34⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\CBAC.tmp"C:\Users\Admin\AppData\Local\Temp\CBAC.tmp"35⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\CC58.tmp"C:\Users\Admin\AppData\Local\Temp\CC58.tmp"36⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\CCE5.tmp"C:\Users\Admin\AppData\Local\Temp\CCE5.tmp"37⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\CD91.tmp"C:\Users\Admin\AppData\Local\Temp\CD91.tmp"38⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\CE3D.tmp"C:\Users\Admin\AppData\Local\Temp\CE3D.tmp"39⤵
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"40⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\D225.tmp"C:\Users\Admin\AppData\Local\Temp\D225.tmp"41⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"42⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\D35D.tmp"C:\Users\Admin\AppData\Local\Temp\D35D.tmp"43⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"44⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\D448.tmp"C:\Users\Admin\AppData\Local\Temp\D448.tmp"45⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\D4A5.tmp"C:\Users\Admin\AppData\Local\Temp\D4A5.tmp"46⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\D9B6.tmp"C:\Users\Admin\AppData\Local\Temp\D9B6.tmp"47⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\DADF.tmp"C:\Users\Admin\AppData\Local\Temp\DADF.tmp"48⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\DB5C.tmp"C:\Users\Admin\AppData\Local\Temp\DB5C.tmp"49⤵
- Executes dropped EXE
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"50⤵
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\DC85.tmp"C:\Users\Admin\AppData\Local\Temp\DC85.tmp"51⤵
- Executes dropped EXE
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\DD02.tmp"C:\Users\Admin\AppData\Local\Temp\DD02.tmp"52⤵
- Executes dropped EXE
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"53⤵
- Executes dropped EXE
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\DE2B.tmp"C:\Users\Admin\AppData\Local\Temp\DE2B.tmp"54⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"55⤵
- Executes dropped EXE
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\DF34.tmp"C:\Users\Admin\AppData\Local\Temp\DF34.tmp"56⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\E445.tmp"C:\Users\Admin\AppData\Local\Temp\E445.tmp"57⤵
- Executes dropped EXE
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"58⤵
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\E8D9.tmp"C:\Users\Admin\AppData\Local\Temp\E8D9.tmp"59⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\E9B4.tmp"C:\Users\Admin\AppData\Local\Temp\E9B4.tmp"60⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\EA7F.tmp"C:\Users\Admin\AppData\Local\Temp\EA7F.tmp"61⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\F117.tmp"C:\Users\Admin\AppData\Local\Temp\F117.tmp"62⤵
- Executes dropped EXE
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\F2DC.tmp"C:\Users\Admin\AppData\Local\Temp\F2DC.tmp"63⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\F51E.tmp"C:\Users\Admin\AppData\Local\Temp\F51E.tmp"64⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\F5AA.tmp"C:\Users\Admin\AppData\Local\Temp\F5AA.tmp"65⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"66⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"67⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\F86A.tmp"C:\Users\Admin\AppData\Local\Temp\F86A.tmp"68⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\FB48.tmp"C:\Users\Admin\AppData\Local\Temp\FB48.tmp"69⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\FC13.tmp"C:\Users\Admin\AppData\Local\Temp\FC13.tmp"70⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"71⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"72⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\FFBD.tmp"C:\Users\Admin\AppData\Local\Temp\FFBD.tmp"73⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\C6.tmp"C:\Users\Admin\AppData\Local\Temp\C6.tmp"74⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\172.tmp"C:\Users\Admin\AppData\Local\Temp\172.tmp"75⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\1FF.tmp"C:\Users\Admin\AppData\Local\Temp\1FF.tmp"76⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\2BA.tmp"C:\Users\Admin\AppData\Local\Temp\2BA.tmp"77⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\402.tmp"C:\Users\Admin\AppData\Local\Temp\402.tmp"78⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\470.tmp"C:\Users\Admin\AppData\Local\Temp\470.tmp"79⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\4DD.tmp"C:\Users\Admin\AppData\Local\Temp\4DD.tmp"80⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\5B8.tmp"C:\Users\Admin\AppData\Local\Temp\5B8.tmp"81⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\673.tmp"C:\Users\Admin\AppData\Local\Temp\673.tmp"82⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\71F.tmp"C:\Users\Admin\AppData\Local\Temp\71F.tmp"83⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\923.tmp"C:\Users\Admin\AppData\Local\Temp\923.tmp"84⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\9BF.tmp"C:\Users\Admin\AppData\Local\Temp\9BF.tmp"85⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\A4C.tmp"C:\Users\Admin\AppData\Local\Temp\A4C.tmp"86⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\AF8.tmp"C:\Users\Admin\AppData\Local\Temp\AF8.tmp"87⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\B75.tmp"C:\Users\Admin\AppData\Local\Temp\B75.tmp"88⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\C01.tmp"C:\Users\Admin\AppData\Local\Temp\C01.tmp"89⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\C6F.tmp"C:\Users\Admin\AppData\Local\Temp\C6F.tmp"90⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\CEC.tmp"C:\Users\Admin\AppData\Local\Temp\CEC.tmp"91⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"92⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\E14.tmp"C:\Users\Admin\AppData\Local\Temp\E14.tmp"93⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\E82.tmp"C:\Users\Admin\AppData\Local\Temp\E82.tmp"94⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\F0E.tmp"C:\Users\Admin\AppData\Local\Temp\F0E.tmp"95⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\F9B.tmp"C:\Users\Admin\AppData\Local\Temp\F9B.tmp"96⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\1037.tmp"C:\Users\Admin\AppData\Local\Temp\1037.tmp"97⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\10A5.tmp"C:\Users\Admin\AppData\Local\Temp\10A5.tmp"98⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\13A2.tmp"C:\Users\Admin\AppData\Local\Temp\13A2.tmp"99⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\1410.tmp"C:\Users\Admin\AppData\Local\Temp\1410.tmp"100⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\148D.tmp"C:\Users\Admin\AppData\Local\Temp\148D.tmp"101⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\150A.tmp"C:\Users\Admin\AppData\Local\Temp\150A.tmp"102⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\1587.tmp"C:\Users\Admin\AppData\Local\Temp\1587.tmp"103⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\1604.tmp"C:\Users\Admin\AppData\Local\Temp\1604.tmp"104⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\1681.tmp"C:\Users\Admin\AppData\Local\Temp\1681.tmp"105⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\170D.tmp"C:\Users\Admin\AppData\Local\Temp\170D.tmp"106⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\176B.tmp"C:\Users\Admin\AppData\Local\Temp\176B.tmp"107⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\1807.tmp"C:\Users\Admin\AppData\Local\Temp\1807.tmp"108⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\1884.tmp"C:\Users\Admin\AppData\Local\Temp\1884.tmp"109⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\1911.tmp"C:\Users\Admin\AppData\Local\Temp\1911.tmp"110⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\196F.tmp"C:\Users\Admin\AppData\Local\Temp\196F.tmp"111⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\19EC.tmp"C:\Users\Admin\AppData\Local\Temp\19EC.tmp"112⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\1A69.tmp"C:\Users\Admin\AppData\Local\Temp\1A69.tmp"113⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\1B05.tmp"C:\Users\Admin\AppData\Local\Temp\1B05.tmp"114⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\1D47.tmp"C:\Users\Admin\AppData\Local\Temp\1D47.tmp"115⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"C:\Users\Admin\AppData\Local\Temp\1DB4.tmp"116⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\1E51.tmp"C:\Users\Admin\AppData\Local\Temp\1E51.tmp"117⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\1ECE.tmp"C:\Users\Admin\AppData\Local\Temp\1ECE.tmp"118⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\2110.tmp"C:\Users\Admin\AppData\Local\Temp\2110.tmp"119⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\21AC.tmp"C:\Users\Admin\AppData\Local\Temp\21AC.tmp"120⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\2239.tmp"C:\Users\Admin\AppData\Local\Temp\2239.tmp"121⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\22D5.tmp"C:\Users\Admin\AppData\Local\Temp\22D5.tmp"122⤵PID:1532
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-