Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
f69ab83c87dd5a3833a217282e8ca9fd_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f69ab83c87dd5a3833a217282e8ca9fd_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
f69ab83c87dd5a3833a217282e8ca9fd_mafia_JC.exe
-
Size
487KB
-
MD5
f69ab83c87dd5a3833a217282e8ca9fd
-
SHA1
92fb1627c0fb3dc6a8001f28abec95a68e69aa1f
-
SHA256
1223b106d895538e009304330fdc9a5400f0067653ff6bda4eb5aefaa2664f63
-
SHA512
990f7d3af8c2626bda5618994056ee9515389d79c4849d8c533a84ef921e80b2ec7570343f4586fd345156b3bdf692c417edeae2572a4e4f82a479a787cadcb6
-
SSDEEP
6144:zorf3lPvovsgZnqG2C7mOTeiLxDxVLfF4W8MovissxSz59z4Z4pL0vwAh6GfRCA1:yU5rCOTeiNSMmifOL0WL0vwAVvbZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1896 6F35.tmp 3744 6FD1.tmp 4712 705D.tmp 8 7157.tmp 1000 7223.tmp 4716 7B6A.tmp 4708 7BF6.tmp 1860 7CB2.tmp 1664 7D4E.tmp 4652 7E19.tmp 3812 7EF4.tmp 964 7F90.tmp 4732 802C.tmp 4332 80B9.tmp 3396 8165.tmp 4116 81F1.tmp 4772 825F.tmp 3856 832A.tmp 2380 8405.tmp 1648 84C0.tmp 4068 857C.tmp 2840 8685.tmp 220 8741.tmp 2632 87DD.tmp 4860 885A.tmp 3016 8916.tmp 1628 8983.tmp 4752 8A10.tmp 3776 8ABB.tmp 4636 8B87.tmp 408 8C42.tmp 920 8CFE.tmp 4460 8DB9.tmp 3988 8E46.tmp 1836 8EC3.tmp 4788 8F4F.tmp 3352 9422.tmp 2032 94AE.tmp 1400 973F.tmp 3848 97CB.tmp 4544 9839.tmp 3976 98C5.tmp 1164 9961.tmp 688 99EE.tmp 1700 9A8A.tmp 4348 9BF2.tmp 4092 9C7E.tmp 2924 9D98.tmp 4368 9E34.tmp 2256 9EC0.tmp 4764 9F3D.tmp 4696 9FCA.tmp 1936 A095.tmp 4940 A112.tmp 652 A170.tmp 1028 A1CE.tmp 3160 A23B.tmp 4756 A2B8.tmp 1704 A325.tmp 3616 A3D1.tmp 368 A44E.tmp 1084 A4CB.tmp 3952 A6A0.tmp 4932 A6FE.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4828 wrote to memory of 1896 4828 f69ab83c87dd5a3833a217282e8ca9fd_mafia_JC.exe 83 PID 4828 wrote to memory of 1896 4828 f69ab83c87dd5a3833a217282e8ca9fd_mafia_JC.exe 83 PID 4828 wrote to memory of 1896 4828 f69ab83c87dd5a3833a217282e8ca9fd_mafia_JC.exe 83 PID 1896 wrote to memory of 3744 1896 6F35.tmp 84 PID 1896 wrote to memory of 3744 1896 6F35.tmp 84 PID 1896 wrote to memory of 3744 1896 6F35.tmp 84 PID 3744 wrote to memory of 4712 3744 6FD1.tmp 85 PID 3744 wrote to memory of 4712 3744 6FD1.tmp 85 PID 3744 wrote to memory of 4712 3744 6FD1.tmp 85 PID 4712 wrote to memory of 8 4712 705D.tmp 86 PID 4712 wrote to memory of 8 4712 705D.tmp 86 PID 4712 wrote to memory of 8 4712 705D.tmp 86 PID 8 wrote to memory of 1000 8 7157.tmp 87 PID 8 wrote to memory of 1000 8 7157.tmp 87 PID 8 wrote to memory of 1000 8 7157.tmp 87 PID 1000 wrote to memory of 4716 1000 7223.tmp 88 PID 1000 wrote to memory of 4716 1000 7223.tmp 88 PID 1000 wrote to memory of 4716 1000 7223.tmp 88 PID 4716 wrote to memory of 4708 4716 7B6A.tmp 89 PID 4716 wrote to memory of 4708 4716 7B6A.tmp 89 PID 4716 wrote to memory of 4708 4716 7B6A.tmp 89 PID 4708 wrote to memory of 1860 4708 7BF6.tmp 90 PID 4708 wrote to memory of 1860 4708 7BF6.tmp 90 PID 4708 wrote to memory of 1860 4708 7BF6.tmp 90 PID 1860 wrote to memory of 1664 1860 7CB2.tmp 91 PID 1860 wrote to memory of 1664 1860 7CB2.tmp 91 PID 1860 wrote to memory of 1664 1860 7CB2.tmp 91 PID 1664 wrote to memory of 4652 1664 7D4E.tmp 92 PID 1664 wrote to memory of 4652 1664 7D4E.tmp 92 PID 1664 wrote to memory of 4652 1664 7D4E.tmp 92 PID 4652 wrote to memory of 3812 4652 7E19.tmp 93 PID 4652 wrote to memory of 3812 4652 7E19.tmp 93 PID 4652 wrote to memory of 3812 4652 7E19.tmp 93 PID 3812 wrote to memory of 964 3812 7EF4.tmp 94 PID 3812 wrote to memory of 964 3812 7EF4.tmp 94 PID 3812 wrote to memory of 964 3812 7EF4.tmp 94 PID 964 wrote to memory of 4732 964 7F90.tmp 95 PID 964 wrote to memory of 4732 964 7F90.tmp 95 PID 964 wrote to memory of 4732 964 7F90.tmp 95 PID 4732 wrote to memory of 4332 4732 802C.tmp 96 PID 4732 wrote to memory of 4332 4732 802C.tmp 96 PID 4732 wrote to memory of 4332 4732 802C.tmp 96 PID 4332 wrote to memory of 3396 4332 80B9.tmp 97 PID 4332 wrote to memory of 3396 4332 80B9.tmp 97 PID 4332 wrote to memory of 3396 4332 80B9.tmp 97 PID 3396 wrote to memory of 4116 3396 8165.tmp 98 PID 3396 wrote to memory of 4116 3396 8165.tmp 98 PID 3396 wrote to memory of 4116 3396 8165.tmp 98 PID 4116 wrote to memory of 4772 4116 81F1.tmp 99 PID 4116 wrote to memory of 4772 4116 81F1.tmp 99 PID 4116 wrote to memory of 4772 4116 81F1.tmp 99 PID 4772 wrote to memory of 3856 4772 825F.tmp 102 PID 4772 wrote to memory of 3856 4772 825F.tmp 102 PID 4772 wrote to memory of 3856 4772 825F.tmp 102 PID 3856 wrote to memory of 2380 3856 832A.tmp 103 PID 3856 wrote to memory of 2380 3856 832A.tmp 103 PID 3856 wrote to memory of 2380 3856 832A.tmp 103 PID 2380 wrote to memory of 1648 2380 8405.tmp 104 PID 2380 wrote to memory of 1648 2380 8405.tmp 104 PID 2380 wrote to memory of 1648 2380 8405.tmp 104 PID 1648 wrote to memory of 4068 1648 84C0.tmp 105 PID 1648 wrote to memory of 4068 1648 84C0.tmp 105 PID 1648 wrote to memory of 4068 1648 84C0.tmp 105 PID 4068 wrote to memory of 2840 4068 857C.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\f69ab83c87dd5a3833a217282e8ca9fd_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\f69ab83c87dd5a3833a217282e8ca9fd_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\6F35.tmp"C:\Users\Admin\AppData\Local\Temp\6F35.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\6FD1.tmp"C:\Users\Admin\AppData\Local\Temp\6FD1.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\705D.tmp"C:\Users\Admin\AppData\Local\Temp\705D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\7157.tmp"C:\Users\Admin\AppData\Local\Temp\7157.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\7223.tmp"C:\Users\Admin\AppData\Local\Temp\7223.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\7B6A.tmp"C:\Users\Admin\AppData\Local\Temp\7B6A.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\7CB2.tmp"C:\Users\Admin\AppData\Local\Temp\7CB2.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\7D4E.tmp"C:\Users\Admin\AppData\Local\Temp\7D4E.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\7E19.tmp"C:\Users\Admin\AppData\Local\Temp\7E19.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\7EF4.tmp"C:\Users\Admin\AppData\Local\Temp\7EF4.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\7F90.tmp"C:\Users\Admin\AppData\Local\Temp\7F90.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\802C.tmp"C:\Users\Admin\AppData\Local\Temp\802C.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\80B9.tmp"C:\Users\Admin\AppData\Local\Temp\80B9.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\8165.tmp"C:\Users\Admin\AppData\Local\Temp\8165.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\81F1.tmp"C:\Users\Admin\AppData\Local\Temp\81F1.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\825F.tmp"C:\Users\Admin\AppData\Local\Temp\825F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\832A.tmp"C:\Users\Admin\AppData\Local\Temp\832A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\8405.tmp"C:\Users\Admin\AppData\Local\Temp\8405.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\84C0.tmp"C:\Users\Admin\AppData\Local\Temp\84C0.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\857C.tmp"C:\Users\Admin\AppData\Local\Temp\857C.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\8685.tmp"C:\Users\Admin\AppData\Local\Temp\8685.tmp"23⤵
- Executes dropped EXE
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\8741.tmp"C:\Users\Admin\AppData\Local\Temp\8741.tmp"24⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\87DD.tmp"C:\Users\Admin\AppData\Local\Temp\87DD.tmp"25⤵
- Executes dropped EXE
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\885A.tmp"C:\Users\Admin\AppData\Local\Temp\885A.tmp"26⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\8916.tmp"C:\Users\Admin\AppData\Local\Temp\8916.tmp"27⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\8983.tmp"C:\Users\Admin\AppData\Local\Temp\8983.tmp"28⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\8A10.tmp"C:\Users\Admin\AppData\Local\Temp\8A10.tmp"29⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\8ABB.tmp"C:\Users\Admin\AppData\Local\Temp\8ABB.tmp"30⤵
- Executes dropped EXE
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\8B87.tmp"C:\Users\Admin\AppData\Local\Temp\8B87.tmp"31⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\8C42.tmp"C:\Users\Admin\AppData\Local\Temp\8C42.tmp"32⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\8CFE.tmp"C:\Users\Admin\AppData\Local\Temp\8CFE.tmp"33⤵
- Executes dropped EXE
PID:920 -
C:\Users\Admin\AppData\Local\Temp\8DB9.tmp"C:\Users\Admin\AppData\Local\Temp\8DB9.tmp"34⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\8E46.tmp"C:\Users\Admin\AppData\Local\Temp\8E46.tmp"35⤵
- Executes dropped EXE
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\8EC3.tmp"C:\Users\Admin\AppData\Local\Temp\8EC3.tmp"36⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\8F4F.tmp"C:\Users\Admin\AppData\Local\Temp\8F4F.tmp"37⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\9422.tmp"C:\Users\Admin\AppData\Local\Temp\9422.tmp"38⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\94AE.tmp"C:\Users\Admin\AppData\Local\Temp\94AE.tmp"39⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\973F.tmp"C:\Users\Admin\AppData\Local\Temp\973F.tmp"40⤵
- Executes dropped EXE
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\97CB.tmp"C:\Users\Admin\AppData\Local\Temp\97CB.tmp"41⤵
- Executes dropped EXE
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\9839.tmp"C:\Users\Admin\AppData\Local\Temp\9839.tmp"42⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\98C5.tmp"C:\Users\Admin\AppData\Local\Temp\98C5.tmp"43⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\9961.tmp"C:\Users\Admin\AppData\Local\Temp\9961.tmp"44⤵
- Executes dropped EXE
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\99EE.tmp"C:\Users\Admin\AppData\Local\Temp\99EE.tmp"45⤵
- Executes dropped EXE
PID:688 -
C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"46⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\9BF2.tmp"C:\Users\Admin\AppData\Local\Temp\9BF2.tmp"47⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"48⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\9D0B.tmp"C:\Users\Admin\AppData\Local\Temp\9D0B.tmp"49⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\9D98.tmp"C:\Users\Admin\AppData\Local\Temp\9D98.tmp"50⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\9E34.tmp"C:\Users\Admin\AppData\Local\Temp\9E34.tmp"51⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"C:\Users\Admin\AppData\Local\Temp\9EC0.tmp"52⤵
- Executes dropped EXE
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\9F3D.tmp"C:\Users\Admin\AppData\Local\Temp\9F3D.tmp"53⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\9FCA.tmp"C:\Users\Admin\AppData\Local\Temp\9FCA.tmp"54⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\A095.tmp"C:\Users\Admin\AppData\Local\Temp\A095.tmp"55⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\A112.tmp"C:\Users\Admin\AppData\Local\Temp\A112.tmp"56⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\A170.tmp"C:\Users\Admin\AppData\Local\Temp\A170.tmp"57⤵
- Executes dropped EXE
PID:652 -
C:\Users\Admin\AppData\Local\Temp\A1CE.tmp"C:\Users\Admin\AppData\Local\Temp\A1CE.tmp"58⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\A23B.tmp"C:\Users\Admin\AppData\Local\Temp\A23B.tmp"59⤵
- Executes dropped EXE
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"60⤵
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\A325.tmp"C:\Users\Admin\AppData\Local\Temp\A325.tmp"61⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"62⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\A44E.tmp"C:\Users\Admin\AppData\Local\Temp\A44E.tmp"63⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"64⤵
- Executes dropped EXE
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\A6A0.tmp"C:\Users\Admin\AppData\Local\Temp\A6A0.tmp"65⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\A6FE.tmp"C:\Users\Admin\AppData\Local\Temp\A6FE.tmp"66⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\A75C.tmp"C:\Users\Admin\AppData\Local\Temp\A75C.tmp"67⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\A846.tmp"C:\Users\Admin\AppData\Local\Temp\A846.tmp"68⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\A8D3.tmp"C:\Users\Admin\AppData\Local\Temp\A8D3.tmp"69⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\A96F.tmp"C:\Users\Admin\AppData\Local\Temp\A96F.tmp"70⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\A9FB.tmp"C:\Users\Admin\AppData\Local\Temp\A9FB.tmp"71⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\ABA1.tmp"C:\Users\Admin\AppData\Local\Temp\ABA1.tmp"72⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\AD09.tmp"C:\Users\Admin\AppData\Local\Temp\AD09.tmp"73⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\AF4B.tmp"C:\Users\Admin\AppData\Local\Temp\AF4B.tmp"74⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"C:\Users\Admin\AppData\Local\Temp\B4D9.tmp"75⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\B68E.tmp"C:\Users\Admin\AppData\Local\Temp\B68E.tmp"76⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\BBFD.tmp"C:\Users\Admin\AppData\Local\Temp\BBFD.tmp"77⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\C11D.tmp"C:\Users\Admin\AppData\Local\Temp\C11D.tmp"78⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"79⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\C515.tmp"C:\Users\Admin\AppData\Local\Temp\C515.tmp"80⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\C813.tmp"C:\Users\Admin\AppData\Local\Temp\C813.tmp"81⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\CA16.tmp"C:\Users\Admin\AppData\Local\Temp\CA16.tmp"82⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\CAE1.tmp"C:\Users\Admin\AppData\Local\Temp\CAE1.tmp"83⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\CB3F.tmp"C:\Users\Admin\AppData\Local\Temp\CB3F.tmp"84⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"85⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\CC78.tmp"C:\Users\Admin\AppData\Local\Temp\CC78.tmp"86⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\CCD5.tmp"C:\Users\Admin\AppData\Local\Temp\CCD5.tmp"87⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\CD62.tmp"C:\Users\Admin\AppData\Local\Temp\CD62.tmp"88⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"89⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"90⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"91⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\CF85.tmp"C:\Users\Admin\AppData\Local\Temp\CF85.tmp"92⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\D040.tmp"C:\Users\Admin\AppData\Local\Temp\D040.tmp"93⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\D0BD.tmp"C:\Users\Admin\AppData\Local\Temp\D0BD.tmp"94⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\D14A.tmp"C:\Users\Admin\AppData\Local\Temp\D14A.tmp"95⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\D1D7.tmp"C:\Users\Admin\AppData\Local\Temp\D1D7.tmp"96⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\D282.tmp"C:\Users\Admin\AppData\Local\Temp\D282.tmp"97⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\D30F.tmp"C:\Users\Admin\AppData\Local\Temp\D30F.tmp"98⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"C:\Users\Admin\AppData\Local\Temp\D3AB.tmp"99⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\D457.tmp"C:\Users\Admin\AppData\Local\Temp\D457.tmp"100⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\D522.tmp"C:\Users\Admin\AppData\Local\Temp\D522.tmp"101⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\D8AD.tmp"C:\Users\Admin\AppData\Local\Temp\D8AD.tmp"102⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\D91A.tmp"C:\Users\Admin\AppData\Local\Temp\D91A.tmp"103⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\D987.tmp"C:\Users\Admin\AppData\Local\Temp\D987.tmp"104⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"105⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\DA91.tmp"C:\Users\Admin\AppData\Local\Temp\DA91.tmp"106⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\DAFE.tmp"C:\Users\Admin\AppData\Local\Temp\DAFE.tmp"107⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"C:\Users\Admin\AppData\Local\Temp\DB8B.tmp"108⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\DC18.tmp"C:\Users\Admin\AppData\Local\Temp\DC18.tmp"109⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\DC95.tmp"C:\Users\Admin\AppData\Local\Temp\DC95.tmp"110⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\DD21.tmp"C:\Users\Admin\AppData\Local\Temp\DD21.tmp"111⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\DE1B.tmp"C:\Users\Admin\AppData\Local\Temp\DE1B.tmp"112⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"C:\Users\Admin\AppData\Local\Temp\DEB7.tmp"113⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\DF44.tmp"C:\Users\Admin\AppData\Local\Temp\DF44.tmp"114⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"C:\Users\Admin\AppData\Local\Temp\E4D2.tmp"115⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\E5AD.tmp"C:\Users\Admin\AppData\Local\Temp\E5AD.tmp"116⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\E639.tmp"C:\Users\Admin\AppData\Local\Temp\E639.tmp"117⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\E6B6.tmp"C:\Users\Admin\AppData\Local\Temp\E6B6.tmp"118⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\E733.tmp"C:\Users\Admin\AppData\Local\Temp\E733.tmp"119⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\E87B.tmp"C:\Users\Admin\AppData\Local\Temp\E87B.tmp"120⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\E927.tmp"C:\Users\Admin\AppData\Local\Temp\E927.tmp"121⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"122⤵PID:3616
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-