Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 18:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e9fd289dd0e170c5f0c4779590c47953_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
e9fd289dd0e170c5f0c4779590c47953_mafia_JC.exe
Resource
win10v2004-20230824-en
2 signatures
150 seconds
General
-
Target
e9fd289dd0e170c5f0c4779590c47953_mafia_JC.exe
-
Size
488KB
-
MD5
e9fd289dd0e170c5f0c4779590c47953
-
SHA1
cae280391e8ba1990d22755391a8924d34b9b04a
-
SHA256
d50cd9fffc8684cf4c4d8c33670bfcd9cfac70b17761d0e8bf0194916a47ffd4
-
SHA512
87630df6f231342f3e4ce56be4ef2824addcc4a08388186c2dfaee7c46b1cf807714425485eba643ec34fdf6a9ea66f6e55776ed5cb1fc9c1d5e31335fb3bd7a
-
SSDEEP
12288:/U5rCOTeiDw2Ti1gsf0fC/xolMkgZYKNZ:/UQOJDw221HhxeMDhN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1388 1D28.tmp 5112 3582.tmp 4708 364D.tmp 3840 3776.tmp 1768 3880.tmp 1272 3999.tmp 5012 3B20.tmp 4276 3BCC.tmp 3944 3C68.tmp 2196 3D04.tmp 2644 3DCF.tmp 3948 3EBA.tmp 2092 3F85.tmp 1696 4031.tmp 2688 40BD.tmp 3876 4179.tmp 4476 4225.tmp 3240 42B1.tmp 116 436D.tmp 4040 43F9.tmp 2704 44C4.tmp 3348 4580.tmp 1852 462C.tmp 3364 46D8.tmp 3688 47C2.tmp 1680 488D.tmp 2976 4949.tmp 2112 4A23.tmp 1932 4AFE.tmp 3100 4BC9.tmp 2660 4C85.tmp 848 4D8E.tmp 1912 4EA8.tmp 2952 4F25.tmp 4676 4FC1.tmp 3976 506D.tmp 2984 50F9.tmp 4344 5176.tmp 3248 5203.tmp 560 5290.tmp 1484 532C.tmp 4164 53D8.tmp 3148 5445.tmp 668 5501.tmp 416 55AD.tmp 2292 5639.tmp 2148 56C6.tmp 1276 5762.tmp 4596 57EF.tmp 3536 586C.tmp 3760 5918.tmp 4140 59B4.tmp 1556 5A7F.tmp 2316 5B1B.tmp 3824 5B98.tmp 340 5C54.tmp 1768 5CE0.tmp 3936 5D6D.tmp 3652 5DFA.tmp 388 5EB5.tmp 4276 5F42.tmp 4768 5FDE.tmp 4588 608A.tmp 2608 6145.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 1388 4712 e9fd289dd0e170c5f0c4779590c47953_mafia_JC.exe 86 PID 4712 wrote to memory of 1388 4712 e9fd289dd0e170c5f0c4779590c47953_mafia_JC.exe 86 PID 4712 wrote to memory of 1388 4712 e9fd289dd0e170c5f0c4779590c47953_mafia_JC.exe 86 PID 1388 wrote to memory of 5112 1388 1D28.tmp 87 PID 1388 wrote to memory of 5112 1388 1D28.tmp 87 PID 1388 wrote to memory of 5112 1388 1D28.tmp 87 PID 5112 wrote to memory of 4708 5112 3582.tmp 88 PID 5112 wrote to memory of 4708 5112 3582.tmp 88 PID 5112 wrote to memory of 4708 5112 3582.tmp 88 PID 4708 wrote to memory of 3840 4708 364D.tmp 89 PID 4708 wrote to memory of 3840 4708 364D.tmp 89 PID 4708 wrote to memory of 3840 4708 364D.tmp 89 PID 3840 wrote to memory of 1768 3840 3776.tmp 90 PID 3840 wrote to memory of 1768 3840 3776.tmp 90 PID 3840 wrote to memory of 1768 3840 3776.tmp 90 PID 1768 wrote to memory of 1272 1768 3880.tmp 92 PID 1768 wrote to memory of 1272 1768 3880.tmp 92 PID 1768 wrote to memory of 1272 1768 3880.tmp 92 PID 1272 wrote to memory of 5012 1272 3999.tmp 93 PID 1272 wrote to memory of 5012 1272 3999.tmp 93 PID 1272 wrote to memory of 5012 1272 3999.tmp 93 PID 5012 wrote to memory of 4276 5012 3B20.tmp 94 PID 5012 wrote to memory of 4276 5012 3B20.tmp 94 PID 5012 wrote to memory of 4276 5012 3B20.tmp 94 PID 4276 wrote to memory of 3944 4276 3BCC.tmp 95 PID 4276 wrote to memory of 3944 4276 3BCC.tmp 95 PID 4276 wrote to memory of 3944 4276 3BCC.tmp 95 PID 3944 wrote to memory of 2196 3944 3C68.tmp 96 PID 3944 wrote to memory of 2196 3944 3C68.tmp 96 PID 3944 wrote to memory of 2196 3944 3C68.tmp 96 PID 2196 wrote to memory of 2644 2196 3D04.tmp 97 PID 2196 wrote to memory of 2644 2196 3D04.tmp 97 PID 2196 wrote to memory of 2644 2196 3D04.tmp 97 PID 2644 wrote to memory of 3948 2644 3DCF.tmp 98 PID 2644 wrote to memory of 3948 2644 3DCF.tmp 98 PID 2644 wrote to memory of 3948 2644 3DCF.tmp 98 PID 3948 wrote to memory of 2092 3948 3EBA.tmp 99 PID 3948 wrote to memory of 2092 3948 3EBA.tmp 99 PID 3948 wrote to memory of 2092 3948 3EBA.tmp 99 PID 2092 wrote to memory of 1696 2092 3F85.tmp 100 PID 2092 wrote to memory of 1696 2092 3F85.tmp 100 PID 2092 wrote to memory of 1696 2092 3F85.tmp 100 PID 1696 wrote to memory of 2688 1696 4031.tmp 101 PID 1696 wrote to memory of 2688 1696 4031.tmp 101 PID 1696 wrote to memory of 2688 1696 4031.tmp 101 PID 2688 wrote to memory of 3876 2688 40BD.tmp 102 PID 2688 wrote to memory of 3876 2688 40BD.tmp 102 PID 2688 wrote to memory of 3876 2688 40BD.tmp 102 PID 3876 wrote to memory of 4476 3876 4179.tmp 103 PID 3876 wrote to memory of 4476 3876 4179.tmp 103 PID 3876 wrote to memory of 4476 3876 4179.tmp 103 PID 4476 wrote to memory of 3240 4476 4225.tmp 104 PID 4476 wrote to memory of 3240 4476 4225.tmp 104 PID 4476 wrote to memory of 3240 4476 4225.tmp 104 PID 3240 wrote to memory of 116 3240 42B1.tmp 105 PID 3240 wrote to memory of 116 3240 42B1.tmp 105 PID 3240 wrote to memory of 116 3240 42B1.tmp 105 PID 116 wrote to memory of 4040 116 436D.tmp 106 PID 116 wrote to memory of 4040 116 436D.tmp 106 PID 116 wrote to memory of 4040 116 436D.tmp 106 PID 4040 wrote to memory of 2704 4040 43F9.tmp 107 PID 4040 wrote to memory of 2704 4040 43F9.tmp 107 PID 4040 wrote to memory of 2704 4040 43F9.tmp 107 PID 2704 wrote to memory of 3348 2704 44C4.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9fd289dd0e170c5f0c4779590c47953_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\e9fd289dd0e170c5f0c4779590c47953_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\1D28.tmp"C:\Users\Admin\AppData\Local\Temp\1D28.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\364D.tmp"C:\Users\Admin\AppData\Local\Temp\364D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\3776.tmp"C:\Users\Admin\AppData\Local\Temp\3776.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\3880.tmp"C:\Users\Admin\AppData\Local\Temp\3880.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\3999.tmp"C:\Users\Admin\AppData\Local\Temp\3999.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\3B20.tmp"C:\Users\Admin\AppData\Local\Temp\3B20.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\3BCC.tmp"C:\Users\Admin\AppData\Local\Temp\3BCC.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\3C68.tmp"C:\Users\Admin\AppData\Local\Temp\3C68.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\3D04.tmp"C:\Users\Admin\AppData\Local\Temp\3D04.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\3DCF.tmp"C:\Users\Admin\AppData\Local\Temp\3DCF.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\3F85.tmp"C:\Users\Admin\AppData\Local\Temp\3F85.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\4031.tmp"C:\Users\Admin\AppData\Local\Temp\4031.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\40BD.tmp"C:\Users\Admin\AppData\Local\Temp\40BD.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\4179.tmp"C:\Users\Admin\AppData\Local\Temp\4179.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\4225.tmp"C:\Users\Admin\AppData\Local\Temp\4225.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\42B1.tmp"C:\Users\Admin\AppData\Local\Temp\42B1.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\436D.tmp"C:\Users\Admin\AppData\Local\Temp\436D.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\43F9.tmp"C:\Users\Admin\AppData\Local\Temp\43F9.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\44C4.tmp"C:\Users\Admin\AppData\Local\Temp\44C4.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\4580.tmp"C:\Users\Admin\AppData\Local\Temp\4580.tmp"23⤵
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\462C.tmp"C:\Users\Admin\AppData\Local\Temp\462C.tmp"24⤵
- Executes dropped EXE
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\46D8.tmp"C:\Users\Admin\AppData\Local\Temp\46D8.tmp"25⤵
- Executes dropped EXE
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\47C2.tmp"C:\Users\Admin\AppData\Local\Temp\47C2.tmp"26⤵
- Executes dropped EXE
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\488D.tmp"C:\Users\Admin\AppData\Local\Temp\488D.tmp"27⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\4949.tmp"C:\Users\Admin\AppData\Local\Temp\4949.tmp"28⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\4A23.tmp"C:\Users\Admin\AppData\Local\Temp\4A23.tmp"29⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"30⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"31⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\4C85.tmp"C:\Users\Admin\AppData\Local\Temp\4C85.tmp"32⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"C:\Users\Admin\AppData\Local\Temp\4D8E.tmp"33⤵
- Executes dropped EXE
PID:848 -
C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"34⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\4F25.tmp"C:\Users\Admin\AppData\Local\Temp\4F25.tmp"35⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\4FC1.tmp"C:\Users\Admin\AppData\Local\Temp\4FC1.tmp"36⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\506D.tmp"C:\Users\Admin\AppData\Local\Temp\506D.tmp"37⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\50F9.tmp"C:\Users\Admin\AppData\Local\Temp\50F9.tmp"38⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\5176.tmp"C:\Users\Admin\AppData\Local\Temp\5176.tmp"39⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\5203.tmp"C:\Users\Admin\AppData\Local\Temp\5203.tmp"40⤵
- Executes dropped EXE
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\5290.tmp"C:\Users\Admin\AppData\Local\Temp\5290.tmp"41⤵
- Executes dropped EXE
PID:560 -
C:\Users\Admin\AppData\Local\Temp\532C.tmp"C:\Users\Admin\AppData\Local\Temp\532C.tmp"42⤵
- Executes dropped EXE
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\53D8.tmp"C:\Users\Admin\AppData\Local\Temp\53D8.tmp"43⤵
- Executes dropped EXE
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\5445.tmp"C:\Users\Admin\AppData\Local\Temp\5445.tmp"44⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\5501.tmp"C:\Users\Admin\AppData\Local\Temp\5501.tmp"45⤵
- Executes dropped EXE
PID:668 -
C:\Users\Admin\AppData\Local\Temp\55AD.tmp"C:\Users\Admin\AppData\Local\Temp\55AD.tmp"46⤵
- Executes dropped EXE
PID:416 -
C:\Users\Admin\AppData\Local\Temp\5639.tmp"C:\Users\Admin\AppData\Local\Temp\5639.tmp"47⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\56C6.tmp"C:\Users\Admin\AppData\Local\Temp\56C6.tmp"48⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\5762.tmp"C:\Users\Admin\AppData\Local\Temp\5762.tmp"49⤵
- Executes dropped EXE
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\57EF.tmp"C:\Users\Admin\AppData\Local\Temp\57EF.tmp"50⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\586C.tmp"C:\Users\Admin\AppData\Local\Temp\586C.tmp"51⤵
- Executes dropped EXE
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\5918.tmp"C:\Users\Admin\AppData\Local\Temp\5918.tmp"52⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\59B4.tmp"C:\Users\Admin\AppData\Local\Temp\59B4.tmp"53⤵
- Executes dropped EXE
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\5A7F.tmp"C:\Users\Admin\AppData\Local\Temp\5A7F.tmp"54⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\5B1B.tmp"C:\Users\Admin\AppData\Local\Temp\5B1B.tmp"55⤵
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\5B98.tmp"C:\Users\Admin\AppData\Local\Temp\5B98.tmp"56⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\5C54.tmp"C:\Users\Admin\AppData\Local\Temp\5C54.tmp"57⤵
- Executes dropped EXE
PID:340 -
C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"58⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"59⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\5DFA.tmp"C:\Users\Admin\AppData\Local\Temp\5DFA.tmp"60⤵
- Executes dropped EXE
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"C:\Users\Admin\AppData\Local\Temp\5EB5.tmp"61⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\5F42.tmp"C:\Users\Admin\AppData\Local\Temp\5F42.tmp"62⤵
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"63⤵
- Executes dropped EXE
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\608A.tmp"C:\Users\Admin\AppData\Local\Temp\608A.tmp"64⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\6145.tmp"C:\Users\Admin\AppData\Local\Temp\6145.tmp"65⤵
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\61B3.tmp"C:\Users\Admin\AppData\Local\Temp\61B3.tmp"66⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\624F.tmp"C:\Users\Admin\AppData\Local\Temp\624F.tmp"67⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\62EB.tmp"C:\Users\Admin\AppData\Local\Temp\62EB.tmp"68⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\6397.tmp"C:\Users\Admin\AppData\Local\Temp\6397.tmp"69⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\6443.tmp"C:\Users\Admin\AppData\Local\Temp\6443.tmp"70⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\64DF.tmp"C:\Users\Admin\AppData\Local\Temp\64DF.tmp"71⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\656C.tmp"C:\Users\Admin\AppData\Local\Temp\656C.tmp"72⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\65E9.tmp"C:\Users\Admin\AppData\Local\Temp\65E9.tmp"73⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\6675.tmp"C:\Users\Admin\AppData\Local\Temp\6675.tmp"74⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\6750.tmp"C:\Users\Admin\AppData\Local\Temp\6750.tmp"75⤵PID:712
-
C:\Users\Admin\AppData\Local\Temp\67DD.tmp"C:\Users\Admin\AppData\Local\Temp\67DD.tmp"76⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\684A.tmp"C:\Users\Admin\AppData\Local\Temp\684A.tmp"77⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\68C7.tmp"C:\Users\Admin\AppData\Local\Temp\68C7.tmp"78⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\6944.tmp"C:\Users\Admin\AppData\Local\Temp\6944.tmp"79⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\69E0.tmp"C:\Users\Admin\AppData\Local\Temp\69E0.tmp"80⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\6A6D.tmp"C:\Users\Admin\AppData\Local\Temp\6A6D.tmp"81⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\6AEA.tmp"C:\Users\Admin\AppData\Local\Temp\6AEA.tmp"82⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\6B57.tmp"C:\Users\Admin\AppData\Local\Temp\6B57.tmp"83⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\6BD4.tmp"C:\Users\Admin\AppData\Local\Temp\6BD4.tmp"84⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\6C61.tmp"C:\Users\Admin\AppData\Local\Temp\6C61.tmp"85⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\6CCE.tmp"C:\Users\Admin\AppData\Local\Temp\6CCE.tmp"86⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\6D6B.tmp"C:\Users\Admin\AppData\Local\Temp\6D6B.tmp"87⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\6DF7.tmp"C:\Users\Admin\AppData\Local\Temp\6DF7.tmp"88⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\6E74.tmp"C:\Users\Admin\AppData\Local\Temp\6E74.tmp"89⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\6EE2.tmp"C:\Users\Admin\AppData\Local\Temp\6EE2.tmp"90⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\6F9D.tmp"C:\Users\Admin\AppData\Local\Temp\6F9D.tmp"91⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\702A.tmp"C:\Users\Admin\AppData\Local\Temp\702A.tmp"92⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\7097.tmp"C:\Users\Admin\AppData\Local\Temp\7097.tmp"93⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\7124.tmp"C:\Users\Admin\AppData\Local\Temp\7124.tmp"94⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\71DF.tmp"C:\Users\Admin\AppData\Local\Temp\71DF.tmp"95⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\724D.tmp"C:\Users\Admin\AppData\Local\Temp\724D.tmp"96⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\72E9.tmp"C:\Users\Admin\AppData\Local\Temp\72E9.tmp"97⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\7366.tmp"C:\Users\Admin\AppData\Local\Temp\7366.tmp"98⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\73F3.tmp"C:\Users\Admin\AppData\Local\Temp\73F3.tmp"99⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\748F.tmp"C:\Users\Admin\AppData\Local\Temp\748F.tmp"100⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\74FC.tmp"C:\Users\Admin\AppData\Local\Temp\74FC.tmp"101⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\7598.tmp"C:\Users\Admin\AppData\Local\Temp\7598.tmp"102⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\7625.tmp"C:\Users\Admin\AppData\Local\Temp\7625.tmp"103⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\76A2.tmp"C:\Users\Admin\AppData\Local\Temp\76A2.tmp"104⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\772F.tmp"C:\Users\Admin\AppData\Local\Temp\772F.tmp"105⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\77CB.tmp"C:\Users\Admin\AppData\Local\Temp\77CB.tmp"106⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\7858.tmp"C:\Users\Admin\AppData\Local\Temp\7858.tmp"107⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\78E4.tmp"C:\Users\Admin\AppData\Local\Temp\78E4.tmp"108⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\7971.tmp"C:\Users\Admin\AppData\Local\Temp\7971.tmp"109⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\79FD.tmp"C:\Users\Admin\AppData\Local\Temp\79FD.tmp"110⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\7A6B.tmp"C:\Users\Admin\AppData\Local\Temp\7A6B.tmp"111⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\7B26.tmp"C:\Users\Admin\AppData\Local\Temp\7B26.tmp"112⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\7BC3.tmp"C:\Users\Admin\AppData\Local\Temp\7BC3.tmp"113⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\7C4F.tmp"C:\Users\Admin\AppData\Local\Temp\7C4F.tmp"114⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\7CCC.tmp"C:\Users\Admin\AppData\Local\Temp\7CCC.tmp"115⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\7D3A.tmp"C:\Users\Admin\AppData\Local\Temp\7D3A.tmp"116⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\7DD6.tmp"C:\Users\Admin\AppData\Local\Temp\7DD6.tmp"117⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\7E53.tmp"C:\Users\Admin\AppData\Local\Temp\7E53.tmp"118⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\7EDF.tmp"C:\Users\Admin\AppData\Local\Temp\7EDF.tmp"119⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\7F5C.tmp"C:\Users\Admin\AppData\Local\Temp\7F5C.tmp"120⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\7FE9.tmp"C:\Users\Admin\AppData\Local\Temp\7FE9.tmp"121⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\8076.tmp"C:\Users\Admin\AppData\Local\Temp\8076.tmp"122⤵PID:3824
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-