Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 15:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
df65a5cd52382c059068785b71c34374_mafia_JC.exe
Resource
win7-20230824-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
df65a5cd52382c059068785b71c34374_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
df65a5cd52382c059068785b71c34374_mafia_JC.exe
-
Size
488KB
-
MD5
df65a5cd52382c059068785b71c34374
-
SHA1
1e28d1802e0edbeec2222213180f7707fbaf568c
-
SHA256
91aa4013bce3766fccdd6677561c851f8593b999d5f80257fb5dad0f482f2dbe
-
SHA512
ad69db3754924143c0a8f2707ccce7ac364b1d75173038187759801de15476c3117e92dd353bdee28572b091fdeea36bd232292818232984bc16b2030ec4c407
-
SSDEEP
12288:/U5rCOTeiDBfUxih1wAvgMBdnvUd6d7XEey263NZ:/UQOJDBfUkYAldnvUdeQb73N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3856 CC97.tmp 208 CD43.tmp 3460 CDEF.tmp 2088 CE8B.tmp 880 CF75.tmp 3660 D031.tmp 1604 D0CD.tmp 2068 D1A8.tmp 5112 D254.tmp 1752 D2F0.tmp 1164 D39C.tmp 1592 D467.tmp 4444 D513.tmp 2660 D61C.tmp 2608 D6B9.tmp 4316 D764.tmp 4712 D810.tmp 1716 D8CC.tmp 3612 DAEF.tmp 2096 DBAA.tmp 2808 DCB4.tmp 2076 DD9E.tmp 1444 DE98.tmp 3908 DF44.tmp 3336 DFE0.tmp 3260 E08C.tmp 2680 E138.tmp 1200 E1D4.tmp 1888 E2EE.tmp 4496 E3A9.tmp 1232 E4A3.tmp 3312 E530.tmp 1612 E5FB.tmp 3308 E697.tmp 3120 E762.tmp 2592 E82D.tmp 3640 E8CA.tmp 4676 E985.tmp 1820 EAFC.tmp 2872 EBA8.tmp 3052 EC73.tmp 4956 ECF0.tmp 2148 EDAC.tmp 2276 EE57.tmp 4788 EF13.tmp 4524 EF90.tmp 4292 F01D.tmp 2116 F0C8.tmp 4860 F184.tmp 5028 F201.tmp 2696 F27E.tmp 4256 F32A.tmp 4216 F3A7.tmp 4892 F433.tmp 1792 F50E.tmp 4332 F5BA.tmp 4804 F647.tmp 3460 F6E3.tmp 2088 F77F.tmp 1672 F80C.tmp 2068 F879.tmp 932 F906.tmp 4380 F983.tmp 4832 FA00.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4892 wrote to memory of 3856 4892 df65a5cd52382c059068785b71c34374_mafia_JC.exe 81 PID 4892 wrote to memory of 3856 4892 df65a5cd52382c059068785b71c34374_mafia_JC.exe 81 PID 4892 wrote to memory of 3856 4892 df65a5cd52382c059068785b71c34374_mafia_JC.exe 81 PID 3856 wrote to memory of 208 3856 CC97.tmp 82 PID 3856 wrote to memory of 208 3856 CC97.tmp 82 PID 3856 wrote to memory of 208 3856 CC97.tmp 82 PID 208 wrote to memory of 3460 208 CD43.tmp 83 PID 208 wrote to memory of 3460 208 CD43.tmp 83 PID 208 wrote to memory of 3460 208 CD43.tmp 83 PID 3460 wrote to memory of 2088 3460 CDEF.tmp 84 PID 3460 wrote to memory of 2088 3460 CDEF.tmp 84 PID 3460 wrote to memory of 2088 3460 CDEF.tmp 84 PID 2088 wrote to memory of 880 2088 CE8B.tmp 85 PID 2088 wrote to memory of 880 2088 CE8B.tmp 85 PID 2088 wrote to memory of 880 2088 CE8B.tmp 85 PID 880 wrote to memory of 3660 880 CF75.tmp 86 PID 880 wrote to memory of 3660 880 CF75.tmp 86 PID 880 wrote to memory of 3660 880 CF75.tmp 86 PID 3660 wrote to memory of 1604 3660 D031.tmp 87 PID 3660 wrote to memory of 1604 3660 D031.tmp 87 PID 3660 wrote to memory of 1604 3660 D031.tmp 87 PID 1604 wrote to memory of 2068 1604 D0CD.tmp 88 PID 1604 wrote to memory of 2068 1604 D0CD.tmp 88 PID 1604 wrote to memory of 2068 1604 D0CD.tmp 88 PID 2068 wrote to memory of 5112 2068 D1A8.tmp 90 PID 2068 wrote to memory of 5112 2068 D1A8.tmp 90 PID 2068 wrote to memory of 5112 2068 D1A8.tmp 90 PID 5112 wrote to memory of 1752 5112 D254.tmp 91 PID 5112 wrote to memory of 1752 5112 D254.tmp 91 PID 5112 wrote to memory of 1752 5112 D254.tmp 91 PID 1752 wrote to memory of 1164 1752 D2F0.tmp 92 PID 1752 wrote to memory of 1164 1752 D2F0.tmp 92 PID 1752 wrote to memory of 1164 1752 D2F0.tmp 92 PID 1164 wrote to memory of 1592 1164 D39C.tmp 93 PID 1164 wrote to memory of 1592 1164 D39C.tmp 93 PID 1164 wrote to memory of 1592 1164 D39C.tmp 93 PID 1592 wrote to memory of 4444 1592 D467.tmp 94 PID 1592 wrote to memory of 4444 1592 D467.tmp 94 PID 1592 wrote to memory of 4444 1592 D467.tmp 94 PID 4444 wrote to memory of 2660 4444 D513.tmp 95 PID 4444 wrote to memory of 2660 4444 D513.tmp 95 PID 4444 wrote to memory of 2660 4444 D513.tmp 95 PID 2660 wrote to memory of 2608 2660 D61C.tmp 96 PID 2660 wrote to memory of 2608 2660 D61C.tmp 96 PID 2660 wrote to memory of 2608 2660 D61C.tmp 96 PID 2608 wrote to memory of 4316 2608 D6B9.tmp 97 PID 2608 wrote to memory of 4316 2608 D6B9.tmp 97 PID 2608 wrote to memory of 4316 2608 D6B9.tmp 97 PID 4316 wrote to memory of 4712 4316 D764.tmp 98 PID 4316 wrote to memory of 4712 4316 D764.tmp 98 PID 4316 wrote to memory of 4712 4316 D764.tmp 98 PID 4712 wrote to memory of 1716 4712 D810.tmp 99 PID 4712 wrote to memory of 1716 4712 D810.tmp 99 PID 4712 wrote to memory of 1716 4712 D810.tmp 99 PID 1716 wrote to memory of 3612 1716 D8CC.tmp 102 PID 1716 wrote to memory of 3612 1716 D8CC.tmp 102 PID 1716 wrote to memory of 3612 1716 D8CC.tmp 102 PID 3612 wrote to memory of 2096 3612 DAEF.tmp 103 PID 3612 wrote to memory of 2096 3612 DAEF.tmp 103 PID 3612 wrote to memory of 2096 3612 DAEF.tmp 103 PID 2096 wrote to memory of 2808 2096 DBAA.tmp 104 PID 2096 wrote to memory of 2808 2096 DBAA.tmp 104 PID 2096 wrote to memory of 2808 2096 DBAA.tmp 104 PID 2808 wrote to memory of 2076 2808 DCB4.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\df65a5cd52382c059068785b71c34374_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\df65a5cd52382c059068785b71c34374_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\CC97.tmp"C:\Users\Admin\AppData\Local\Temp\CC97.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\CD43.tmp"C:\Users\Admin\AppData\Local\Temp\CD43.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\CDEF.tmp"C:\Users\Admin\AppData\Local\Temp\CDEF.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\CF75.tmp"C:\Users\Admin\AppData\Local\Temp\CF75.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\D031.tmp"C:\Users\Admin\AppData\Local\Temp\D031.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\D254.tmp"C:\Users\Admin\AppData\Local\Temp\D254.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\D2F0.tmp"C:\Users\Admin\AppData\Local\Temp\D2F0.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\D39C.tmp"C:\Users\Admin\AppData\Local\Temp\D39C.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\D467.tmp"C:\Users\Admin\AppData\Local\Temp\D467.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\D513.tmp"C:\Users\Admin\AppData\Local\Temp\D513.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\D61C.tmp"C:\Users\Admin\AppData\Local\Temp\D61C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\D764.tmp"C:\Users\Admin\AppData\Local\Temp\D764.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\D810.tmp"C:\Users\Admin\AppData\Local\Temp\D810.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\D8CC.tmp"C:\Users\Admin\AppData\Local\Temp\D8CC.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\DAEF.tmp"C:\Users\Admin\AppData\Local\Temp\DAEF.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\DD9E.tmp"C:\Users\Admin\AppData\Local\Temp\DD9E.tmp"23⤵
- Executes dropped EXE
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\DE98.tmp"C:\Users\Admin\AppData\Local\Temp\DE98.tmp"24⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\DF44.tmp"C:\Users\Admin\AppData\Local\Temp\DF44.tmp"25⤵
- Executes dropped EXE
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"26⤵
- Executes dropped EXE
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\E08C.tmp"C:\Users\Admin\AppData\Local\Temp\E08C.tmp"27⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\E138.tmp"C:\Users\Admin\AppData\Local\Temp\E138.tmp"28⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"29⤵
- Executes dropped EXE
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"30⤵
- Executes dropped EXE
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\E3A9.tmp"C:\Users\Admin\AppData\Local\Temp\E3A9.tmp"31⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\E4A3.tmp"C:\Users\Admin\AppData\Local\Temp\E4A3.tmp"32⤵
- Executes dropped EXE
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\E530.tmp"C:\Users\Admin\AppData\Local\Temp\E530.tmp"33⤵
- Executes dropped EXE
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\E5FB.tmp"C:\Users\Admin\AppData\Local\Temp\E5FB.tmp"34⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\E697.tmp"C:\Users\Admin\AppData\Local\Temp\E697.tmp"35⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\E762.tmp"C:\Users\Admin\AppData\Local\Temp\E762.tmp"36⤵
- Executes dropped EXE
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\E82D.tmp"C:\Users\Admin\AppData\Local\Temp\E82D.tmp"37⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"38⤵
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\E985.tmp"C:\Users\Admin\AppData\Local\Temp\E985.tmp"39⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\EAFC.tmp"C:\Users\Admin\AppData\Local\Temp\EAFC.tmp"40⤵
- Executes dropped EXE
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"41⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\EC73.tmp"C:\Users\Admin\AppData\Local\Temp\EC73.tmp"42⤵
- Executes dropped EXE
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\ECF0.tmp"C:\Users\Admin\AppData\Local\Temp\ECF0.tmp"43⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\EDAC.tmp"C:\Users\Admin\AppData\Local\Temp\EDAC.tmp"44⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\EE57.tmp"C:\Users\Admin\AppData\Local\Temp\EE57.tmp"45⤵
- Executes dropped EXE
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\EF13.tmp"C:\Users\Admin\AppData\Local\Temp\EF13.tmp"46⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\EF90.tmp"C:\Users\Admin\AppData\Local\Temp\EF90.tmp"47⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"48⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"49⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\F184.tmp"C:\Users\Admin\AppData\Local\Temp\F184.tmp"50⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\F201.tmp"C:\Users\Admin\AppData\Local\Temp\F201.tmp"51⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\F27E.tmp"C:\Users\Admin\AppData\Local\Temp\F27E.tmp"52⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\F32A.tmp"C:\Users\Admin\AppData\Local\Temp\F32A.tmp"53⤵
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\F3A7.tmp"C:\Users\Admin\AppData\Local\Temp\F3A7.tmp"54⤵
- Executes dropped EXE
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\F433.tmp"C:\Users\Admin\AppData\Local\Temp\F433.tmp"55⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\F50E.tmp"C:\Users\Admin\AppData\Local\Temp\F50E.tmp"56⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\F5BA.tmp"C:\Users\Admin\AppData\Local\Temp\F5BA.tmp"57⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\F647.tmp"C:\Users\Admin\AppData\Local\Temp\F647.tmp"58⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"59⤵
- Executes dropped EXE
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\F77F.tmp"C:\Users\Admin\AppData\Local\Temp\F77F.tmp"60⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\F80C.tmp"C:\Users\Admin\AppData\Local\Temp\F80C.tmp"61⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\F879.tmp"C:\Users\Admin\AppData\Local\Temp\F879.tmp"62⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\F906.tmp"C:\Users\Admin\AppData\Local\Temp\F906.tmp"63⤵
- Executes dropped EXE
PID:932 -
C:\Users\Admin\AppData\Local\Temp\F983.tmp"C:\Users\Admin\AppData\Local\Temp\F983.tmp"64⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\FA00.tmp"C:\Users\Admin\AppData\Local\Temp\FA00.tmp"65⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\FA8C.tmp"C:\Users\Admin\AppData\Local\Temp\FA8C.tmp"66⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\FB29.tmp"C:\Users\Admin\AppData\Local\Temp\FB29.tmp"67⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"68⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\FC42.tmp"C:\Users\Admin\AppData\Local\Temp\FC42.tmp"69⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"70⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"C:\Users\Admin\AppData\Local\Temp\FD2C.tmp"71⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"C:\Users\Admin\AppData\Local\Temp\FD9A.tmp"72⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\FE07.tmp"C:\Users\Admin\AppData\Local\Temp\FE07.tmp"73⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\FEA3.tmp"C:\Users\Admin\AppData\Local\Temp\FEA3.tmp"74⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\FF30.tmp"C:\Users\Admin\AppData\Local\Temp\FF30.tmp"75⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"C:\Users\Admin\AppData\Local\Temp\FFAD.tmp"76⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\3A.tmp"C:\Users\Admin\AppData\Local\Temp\3A.tmp"77⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\B7.tmp"C:\Users\Admin\AppData\Local\Temp\B7.tmp"78⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\143.tmp"C:\Users\Admin\AppData\Local\Temp\143.tmp"79⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\1A1.tmp"C:\Users\Admin\AppData\Local\Temp\1A1.tmp"80⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\20E.tmp"C:\Users\Admin\AppData\Local\Temp\20E.tmp"81⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\28B.tmp"C:\Users\Admin\AppData\Local\Temp\28B.tmp"82⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\337.tmp"C:\Users\Admin\AppData\Local\Temp\337.tmp"83⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\3C4.tmp"C:\Users\Admin\AppData\Local\Temp\3C4.tmp"84⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\422.tmp"C:\Users\Admin\AppData\Local\Temp\422.tmp"85⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\4BE.tmp"C:\Users\Admin\AppData\Local\Temp\4BE.tmp"86⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\52B.tmp"C:\Users\Admin\AppData\Local\Temp\52B.tmp"87⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\599.tmp"C:\Users\Admin\AppData\Local\Temp\599.tmp"88⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\635.tmp"C:\Users\Admin\AppData\Local\Temp\635.tmp"89⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\6C1.tmp"C:\Users\Admin\AppData\Local\Temp\6C1.tmp"90⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\75E.tmp"C:\Users\Admin\AppData\Local\Temp\75E.tmp"91⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\80A.tmp"C:\Users\Admin\AppData\Local\Temp\80A.tmp"92⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\896.tmp"C:\Users\Admin\AppData\Local\Temp\896.tmp"93⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\923.tmp"C:\Users\Admin\AppData\Local\Temp\923.tmp"94⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\9A0.tmp"C:\Users\Admin\AppData\Local\Temp\9A0.tmp"95⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\A1D.tmp"C:\Users\Admin\AppData\Local\Temp\A1D.tmp"96⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\AA9.tmp"C:\Users\Admin\AppData\Local\Temp\AA9.tmp"97⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\B36.tmp"C:\Users\Admin\AppData\Local\Temp\B36.tmp"98⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\BA3.tmp"C:\Users\Admin\AppData\Local\Temp\BA3.tmp"99⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\C30.tmp"C:\Users\Admin\AppData\Local\Temp\C30.tmp"100⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\CCC.tmp"C:\Users\Admin\AppData\Local\Temp\CCC.tmp"101⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\D78.tmp"C:\Users\Admin\AppData\Local\Temp\D78.tmp"102⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\E14.tmp"C:\Users\Admin\AppData\Local\Temp\E14.tmp"103⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\EB1.tmp"C:\Users\Admin\AppData\Local\Temp\EB1.tmp"104⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\F4D.tmp"C:\Users\Admin\AppData\Local\Temp\F4D.tmp"105⤵PID:288
-
C:\Users\Admin\AppData\Local\Temp\FF9.tmp"C:\Users\Admin\AppData\Local\Temp\FF9.tmp"106⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\1095.tmp"C:\Users\Admin\AppData\Local\Temp\1095.tmp"107⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\1131.tmp"C:\Users\Admin\AppData\Local\Temp\1131.tmp"108⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\11DD.tmp"C:\Users\Admin\AppData\Local\Temp\11DD.tmp"109⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\126A.tmp"C:\Users\Admin\AppData\Local\Temp\126A.tmp"110⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\12E7.tmp"C:\Users\Admin\AppData\Local\Temp\12E7.tmp"111⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\1383.tmp"C:\Users\Admin\AppData\Local\Temp\1383.tmp"112⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\143F.tmp"C:\Users\Admin\AppData\Local\Temp\143F.tmp"113⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\14FA.tmp"C:\Users\Admin\AppData\Local\Temp\14FA.tmp"114⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\1577.tmp"C:\Users\Admin\AppData\Local\Temp\1577.tmp"115⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\15F4.tmp"C:\Users\Admin\AppData\Local\Temp\15F4.tmp"116⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\1681.tmp"C:\Users\Admin\AppData\Local\Temp\1681.tmp"117⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\170D.tmp"C:\Users\Admin\AppData\Local\Temp\170D.tmp"118⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\17B9.tmp"C:\Users\Admin\AppData\Local\Temp\17B9.tmp"119⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\1827.tmp"C:\Users\Admin\AppData\Local\Temp\1827.tmp"120⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\18B3.tmp"C:\Users\Admin\AppData\Local\Temp\18B3.tmp"121⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\195F.tmp"C:\Users\Admin\AppData\Local\Temp\195F.tmp"122⤵PID:1752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-