Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
f290cb4e0030f4b2f4962cbbc9c7cae9_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f290cb4e0030f4b2f4962cbbc9c7cae9_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
f290cb4e0030f4b2f4962cbbc9c7cae9_mafia_JC.exe
-
Size
488KB
-
MD5
f290cb4e0030f4b2f4962cbbc9c7cae9
-
SHA1
077b55b13eb61ba4feab5c669344fbc35a3d4701
-
SHA256
0a139d9868bed91d19e378bc6b3db23cf65fc1812c535c8aec70363e93c50551
-
SHA512
1d060dce8acb3b763513bed10fa9feb25d548d6229c04c37ace0e76ea47af7c35cd2b0a430ec88626372f0835e1484deaa20a2c14d9a5359065c7b9f4c98e601
-
SSDEEP
12288:/U5rCOTeiD+K5m/6rpjOd0P0pOY69tMMH3ic+FkfJGbkZNZ:/UQOJDFPpjyrIYwiMv+FkBvN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4820 D011.tmp 3960 D0CD.tmp 5052 D179.tmp 3836 D244.tmp 4464 D2E0.tmp 1440 D3AB.tmp 4496 D476.tmp 2796 D551.tmp 2244 D5FD.tmp 3624 D6D8.tmp 2848 D7C2.tmp 4916 D87E.tmp 4652 D939.tmp 2208 D9B6.tmp 4168 DA52.tmp 2956 DCF2.tmp 4620 DD8F.tmp 696 DE4A.tmp 4064 DEE6.tmp 2964 DFC1.tmp 4248 E05D.tmp 488 E167.tmp 4440 E213.tmp 3548 E2EE.tmp 956 E3B9.tmp 4980 E484.tmp 1436 E530.tmp 4944 E5EB.tmp 3420 E697.tmp 1460 E772.tmp 3908 E85C.tmp 3872 E927.tmp 2636 E9F2.tmp 1084 EA6F.tmp 2252 EADD.tmp 1696 EB69.tmp 2504 EBF6.tmp 3680 EC73.tmp 1736 ECE0.tmp 636 ED5D.tmp 3392 EDEA.tmp 3268 EEA6.tmp 2628 EF42.tmp 3484 EFEE.tmp 4880 F174.tmp 5008 F211.tmp 4972 F2AD.tmp 3380 F32A.tmp 3920 F3D6.tmp 3660 F462.tmp 1504 F4D0.tmp 2744 F56C.tmp 3800 F608.tmp 4304 F6A4.tmp 4808 F731.tmp 3196 F7BE.tmp 4068 F879.tmp 3684 F906.tmp 3016 F9B2.tmp 5052 FA5E.tmp 3952 FAEA.tmp 1920 FB86.tmp 4700 FC23.tmp 4388 FCBF.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4820 4984 f290cb4e0030f4b2f4962cbbc9c7cae9_mafia_JC.exe 82 PID 4984 wrote to memory of 4820 4984 f290cb4e0030f4b2f4962cbbc9c7cae9_mafia_JC.exe 82 PID 4984 wrote to memory of 4820 4984 f290cb4e0030f4b2f4962cbbc9c7cae9_mafia_JC.exe 82 PID 4820 wrote to memory of 3960 4820 D011.tmp 83 PID 4820 wrote to memory of 3960 4820 D011.tmp 83 PID 4820 wrote to memory of 3960 4820 D011.tmp 83 PID 3960 wrote to memory of 5052 3960 D0CD.tmp 84 PID 3960 wrote to memory of 5052 3960 D0CD.tmp 84 PID 3960 wrote to memory of 5052 3960 D0CD.tmp 84 PID 5052 wrote to memory of 3836 5052 D179.tmp 85 PID 5052 wrote to memory of 3836 5052 D179.tmp 85 PID 5052 wrote to memory of 3836 5052 D179.tmp 85 PID 3836 wrote to memory of 4464 3836 D244.tmp 86 PID 3836 wrote to memory of 4464 3836 D244.tmp 86 PID 3836 wrote to memory of 4464 3836 D244.tmp 86 PID 4464 wrote to memory of 1440 4464 D2E0.tmp 87 PID 4464 wrote to memory of 1440 4464 D2E0.tmp 87 PID 4464 wrote to memory of 1440 4464 D2E0.tmp 87 PID 1440 wrote to memory of 4496 1440 D3AB.tmp 88 PID 1440 wrote to memory of 4496 1440 D3AB.tmp 88 PID 1440 wrote to memory of 4496 1440 D3AB.tmp 88 PID 4496 wrote to memory of 2796 4496 D476.tmp 89 PID 4496 wrote to memory of 2796 4496 D476.tmp 89 PID 4496 wrote to memory of 2796 4496 D476.tmp 89 PID 2796 wrote to memory of 2244 2796 D551.tmp 90 PID 2796 wrote to memory of 2244 2796 D551.tmp 90 PID 2796 wrote to memory of 2244 2796 D551.tmp 90 PID 2244 wrote to memory of 3624 2244 D5FD.tmp 91 PID 2244 wrote to memory of 3624 2244 D5FD.tmp 91 PID 2244 wrote to memory of 3624 2244 D5FD.tmp 91 PID 3624 wrote to memory of 2848 3624 D6D8.tmp 92 PID 3624 wrote to memory of 2848 3624 D6D8.tmp 92 PID 3624 wrote to memory of 2848 3624 D6D8.tmp 92 PID 2848 wrote to memory of 4916 2848 D7C2.tmp 93 PID 2848 wrote to memory of 4916 2848 D7C2.tmp 93 PID 2848 wrote to memory of 4916 2848 D7C2.tmp 93 PID 4916 wrote to memory of 4652 4916 D87E.tmp 95 PID 4916 wrote to memory of 4652 4916 D87E.tmp 95 PID 4916 wrote to memory of 4652 4916 D87E.tmp 95 PID 4652 wrote to memory of 2208 4652 D939.tmp 96 PID 4652 wrote to memory of 2208 4652 D939.tmp 96 PID 4652 wrote to memory of 2208 4652 D939.tmp 96 PID 2208 wrote to memory of 4168 2208 D9B6.tmp 97 PID 2208 wrote to memory of 4168 2208 D9B6.tmp 97 PID 2208 wrote to memory of 4168 2208 D9B6.tmp 97 PID 4168 wrote to memory of 2956 4168 DA52.tmp 98 PID 4168 wrote to memory of 2956 4168 DA52.tmp 98 PID 4168 wrote to memory of 2956 4168 DA52.tmp 98 PID 2956 wrote to memory of 4620 2956 DCF2.tmp 99 PID 2956 wrote to memory of 4620 2956 DCF2.tmp 99 PID 2956 wrote to memory of 4620 2956 DCF2.tmp 99 PID 4620 wrote to memory of 696 4620 DD8F.tmp 100 PID 4620 wrote to memory of 696 4620 DD8F.tmp 100 PID 4620 wrote to memory of 696 4620 DD8F.tmp 100 PID 696 wrote to memory of 4064 696 DE4A.tmp 101 PID 696 wrote to memory of 4064 696 DE4A.tmp 101 PID 696 wrote to memory of 4064 696 DE4A.tmp 101 PID 4064 wrote to memory of 2964 4064 DEE6.tmp 102 PID 4064 wrote to memory of 2964 4064 DEE6.tmp 102 PID 4064 wrote to memory of 2964 4064 DEE6.tmp 102 PID 2964 wrote to memory of 4248 2964 DFC1.tmp 103 PID 2964 wrote to memory of 4248 2964 DFC1.tmp 103 PID 2964 wrote to memory of 4248 2964 DFC1.tmp 103 PID 4248 wrote to memory of 488 4248 E05D.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\f290cb4e0030f4b2f4962cbbc9c7cae9_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\f290cb4e0030f4b2f4962cbbc9c7cae9_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\D011.tmp"C:\Users\Admin\AppData\Local\Temp\D011.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\D179.tmp"C:\Users\Admin\AppData\Local\Temp\D179.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\D244.tmp"C:\Users\Admin\AppData\Local\Temp\D244.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\D2E0.tmp"C:\Users\Admin\AppData\Local\Temp\D2E0.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\D476.tmp"C:\Users\Admin\AppData\Local\Temp\D476.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\D551.tmp"C:\Users\Admin\AppData\Local\Temp\D551.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"C:\Users\Admin\AppData\Local\Temp\D6D8.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\D7C2.tmp"C:\Users\Admin\AppData\Local\Temp\D7C2.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\D87E.tmp"C:\Users\Admin\AppData\Local\Temp\D87E.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\D939.tmp"C:\Users\Admin\AppData\Local\Temp\D939.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\D9B6.tmp"C:\Users\Admin\AppData\Local\Temp\D9B6.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\DA52.tmp"C:\Users\Admin\AppData\Local\Temp\DA52.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\DCF2.tmp"C:\Users\Admin\AppData\Local\Temp\DCF2.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\DD8F.tmp"C:\Users\Admin\AppData\Local\Temp\DD8F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"C:\Users\Admin\AppData\Local\Temp\DEE6.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"C:\Users\Admin\AppData\Local\Temp\DFC1.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\E05D.tmp"C:\Users\Admin\AppData\Local\Temp\E05D.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\E167.tmp"C:\Users\Admin\AppData\Local\Temp\E167.tmp"23⤵
- Executes dropped EXE
PID:488 -
C:\Users\Admin\AppData\Local\Temp\E213.tmp"C:\Users\Admin\AppData\Local\Temp\E213.tmp"24⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"25⤵
- Executes dropped EXE
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"C:\Users\Admin\AppData\Local\Temp\E3B9.tmp"26⤵
- Executes dropped EXE
PID:956 -
C:\Users\Admin\AppData\Local\Temp\E484.tmp"C:\Users\Admin\AppData\Local\Temp\E484.tmp"27⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\E530.tmp"C:\Users\Admin\AppData\Local\Temp\E530.tmp"28⤵
- Executes dropped EXE
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"C:\Users\Admin\AppData\Local\Temp\E5EB.tmp"29⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\E697.tmp"C:\Users\Admin\AppData\Local\Temp\E697.tmp"30⤵
- Executes dropped EXE
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\E772.tmp"C:\Users\Admin\AppData\Local\Temp\E772.tmp"31⤵
- Executes dropped EXE
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\E85C.tmp"C:\Users\Admin\AppData\Local\Temp\E85C.tmp"32⤵
- Executes dropped EXE
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\E927.tmp"C:\Users\Admin\AppData\Local\Temp\E927.tmp"33⤵
- Executes dropped EXE
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"C:\Users\Admin\AppData\Local\Temp\E9F2.tmp"34⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"35⤵
- Executes dropped EXE
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\EADD.tmp"C:\Users\Admin\AppData\Local\Temp\EADD.tmp"36⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\EB69.tmp"C:\Users\Admin\AppData\Local\Temp\EB69.tmp"37⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\EBF6.tmp"C:\Users\Admin\AppData\Local\Temp\EBF6.tmp"38⤵
- Executes dropped EXE
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\EC73.tmp"C:\Users\Admin\AppData\Local\Temp\EC73.tmp"39⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\ECE0.tmp"C:\Users\Admin\AppData\Local\Temp\ECE0.tmp"40⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"41⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\EDEA.tmp"C:\Users\Admin\AppData\Local\Temp\EDEA.tmp"42⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"43⤵
- Executes dropped EXE
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\EF42.tmp"C:\Users\Admin\AppData\Local\Temp\EF42.tmp"44⤵
- Executes dropped EXE
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\EFEE.tmp"C:\Users\Admin\AppData\Local\Temp\EFEE.tmp"45⤵
- Executes dropped EXE
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\F174.tmp"C:\Users\Admin\AppData\Local\Temp\F174.tmp"46⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\F211.tmp"C:\Users\Admin\AppData\Local\Temp\F211.tmp"47⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"48⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\F32A.tmp"C:\Users\Admin\AppData\Local\Temp\F32A.tmp"49⤵
- Executes dropped EXE
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"50⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\F462.tmp"C:\Users\Admin\AppData\Local\Temp\F462.tmp"51⤵
- Executes dropped EXE
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\F4D0.tmp"C:\Users\Admin\AppData\Local\Temp\F4D0.tmp"52⤵
- Executes dropped EXE
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\F56C.tmp"C:\Users\Admin\AppData\Local\Temp\F56C.tmp"53⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\F608.tmp"C:\Users\Admin\AppData\Local\Temp\F608.tmp"54⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"C:\Users\Admin\AppData\Local\Temp\F6A4.tmp"55⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\F731.tmp"C:\Users\Admin\AppData\Local\Temp\F731.tmp"56⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"C:\Users\Admin\AppData\Local\Temp\F7BE.tmp"57⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\F879.tmp"C:\Users\Admin\AppData\Local\Temp\F879.tmp"58⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\F906.tmp"C:\Users\Admin\AppData\Local\Temp\F906.tmp"59⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\F9B2.tmp"C:\Users\Admin\AppData\Local\Temp\F9B2.tmp"60⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\FA5E.tmp"C:\Users\Admin\AppData\Local\Temp\FA5E.tmp"61⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\FAEA.tmp"C:\Users\Admin\AppData\Local\Temp\FAEA.tmp"62⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\FB86.tmp"C:\Users\Admin\AppData\Local\Temp\FB86.tmp"63⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\FC23.tmp"C:\Users\Admin\AppData\Local\Temp\FC23.tmp"64⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"C:\Users\Admin\AppData\Local\Temp\FCBF.tmp"65⤵
- Executes dropped EXE
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"66⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\FDC9.tmp"C:\Users\Admin\AppData\Local\Temp\FDC9.tmp"67⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\FE74.tmp"C:\Users\Admin\AppData\Local\Temp\FE74.tmp"68⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\FF30.tmp"C:\Users\Admin\AppData\Local\Temp\FF30.tmp"69⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"70⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\68.tmp"C:\Users\Admin\AppData\Local\Temp\68.tmp"71⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\E5.tmp"C:\Users\Admin\AppData\Local\Temp\E5.tmp"72⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\191.tmp"C:\Users\Admin\AppData\Local\Temp\191.tmp"73⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\21E.tmp"C:\Users\Admin\AppData\Local\Temp\21E.tmp"74⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\2AB.tmp"C:\Users\Admin\AppData\Local\Temp\2AB.tmp"75⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\328.tmp"C:\Users\Admin\AppData\Local\Temp\328.tmp"76⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\395.tmp"C:\Users\Admin\AppData\Local\Temp\395.tmp"77⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\402.tmp"C:\Users\Admin\AppData\Local\Temp\402.tmp"78⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\47F.tmp"C:\Users\Admin\AppData\Local\Temp\47F.tmp"79⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\4FC.tmp"C:\Users\Admin\AppData\Local\Temp\4FC.tmp"80⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\56A.tmp"C:\Users\Admin\AppData\Local\Temp\56A.tmp"81⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\5D7.tmp"C:\Users\Admin\AppData\Local\Temp\5D7.tmp"82⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\654.tmp"C:\Users\Admin\AppData\Local\Temp\654.tmp"83⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\6C1.tmp"C:\Users\Admin\AppData\Local\Temp\6C1.tmp"84⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\75E.tmp"C:\Users\Admin\AppData\Local\Temp\75E.tmp"85⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\7DB.tmp"C:\Users\Admin\AppData\Local\Temp\7DB.tmp"86⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\877.tmp"C:\Users\Admin\AppData\Local\Temp\877.tmp"87⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\8E4.tmp"C:\Users\Admin\AppData\Local\Temp\8E4.tmp"88⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\961.tmp"C:\Users\Admin\AppData\Local\Temp\961.tmp"89⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\9EE.tmp"C:\Users\Admin\AppData\Local\Temp\9EE.tmp"90⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\A5B.tmp"C:\Users\Admin\AppData\Local\Temp\A5B.tmp"91⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\AF8.tmp"C:\Users\Admin\AppData\Local\Temp\AF8.tmp"92⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\B94.tmp"C:\Users\Admin\AppData\Local\Temp\B94.tmp"93⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\C01.tmp"C:\Users\Admin\AppData\Local\Temp\C01.tmp"94⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\C7E.tmp"C:\Users\Admin\AppData\Local\Temp\C7E.tmp"95⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\CEC.tmp"C:\Users\Admin\AppData\Local\Temp\CEC.tmp"96⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"97⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\DD6.tmp"C:\Users\Admin\AppData\Local\Temp\DD6.tmp"98⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\E63.tmp"C:\Users\Admin\AppData\Local\Temp\E63.tmp"99⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\EE0.tmp"C:\Users\Admin\AppData\Local\Temp\EE0.tmp"100⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\F5D.tmp"C:\Users\Admin\AppData\Local\Temp\F5D.tmp"101⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\FCA.tmp"C:\Users\Admin\AppData\Local\Temp\FCA.tmp"102⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\1028.tmp"C:\Users\Admin\AppData\Local\Temp\1028.tmp"103⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\1085.tmp"C:\Users\Admin\AppData\Local\Temp\1085.tmp"104⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\10F3.tmp"C:\Users\Admin\AppData\Local\Temp\10F3.tmp"105⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\11AE.tmp"C:\Users\Admin\AppData\Local\Temp\11AE.tmp"106⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\123B.tmp"C:\Users\Admin\AppData\Local\Temp\123B.tmp"107⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\12C8.tmp"C:\Users\Admin\AppData\Local\Temp\12C8.tmp"108⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\1373.tmp"C:\Users\Admin\AppData\Local\Temp\1373.tmp"109⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\13E1.tmp"C:\Users\Admin\AppData\Local\Temp\13E1.tmp"110⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\147D.tmp"C:\Users\Admin\AppData\Local\Temp\147D.tmp"111⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\1519.tmp"C:\Users\Admin\AppData\Local\Temp\1519.tmp"112⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\15E4.tmp"C:\Users\Admin\AppData\Local\Temp\15E4.tmp"113⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\1661.tmp"C:\Users\Admin\AppData\Local\Temp\1661.tmp"114⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\16EE.tmp"C:\Users\Admin\AppData\Local\Temp\16EE.tmp"115⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\175B.tmp"C:\Users\Admin\AppData\Local\Temp\175B.tmp"116⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\1817.tmp"C:\Users\Admin\AppData\Local\Temp\1817.tmp"117⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\1894.tmp"C:\Users\Admin\AppData\Local\Temp\1894.tmp"118⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\1940.tmp"C:\Users\Admin\AppData\Local\Temp\1940.tmp"119⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\19EC.tmp"C:\Users\Admin\AppData\Local\Temp\19EC.tmp"120⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\1A78.tmp"C:\Users\Admin\AppData\Local\Temp\1A78.tmp"121⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\1AE6.tmp"C:\Users\Admin\AppData\Local\Temp\1AE6.tmp"122⤵PID:1580
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-