Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_1be83ac4c5da8c2bdc1b4fd5d722b77a_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_1be83ac4c5da8c2bdc1b4fd5d722b77a_mafia_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_1be83ac4c5da8c2bdc1b4fd5d722b77a_mafia_JC.exe
-
Size
486KB
-
MD5
1be83ac4c5da8c2bdc1b4fd5d722b77a
-
SHA1
9e23609693945c0a47a1426c0d06d03ac98ae514
-
SHA256
b5f0526f38887ac47ec08b6ca7eef08a2d9b237dc69e7d3b3478f49fae89ccab
-
SHA512
662c1fae4d191a883f1d8d70e59de9da1dc1e4dc64adbb2b88efe406fde9c5892e70c82a70f8ba7da04f1e390b840429e97934dbeecac8af44d56677167d3a15
-
SSDEEP
12288:/U5rCOTeiDrbMx7TSRzW2O88dlRwPx0y6MFQizANZ:/UQOJDcxTEC2gw/65N
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2144 F85A.tmp 1616 F944.tmp 1516 FA1F.tmp 1548 FAEA.tmp 1656 FBA6.tmp 3436 FC61.tmp 2216 FD3C.tmp 1876 FDF7.tmp 1772 FEF1.tmp 1048 FFCC.tmp 1716 59.tmp 3876 105.tmp 3004 1B1.tmp 952 26C.tmp 1776 328.tmp 4324 4ED.tmp 4904 5B8.tmp 2836 664.tmp 4248 73E.tmp 1428 7FA.tmp 3144 8C5.tmp 1952 9AF.tmp 2320 AA9.tmp 3808 B36.tmp 2296 C30.tmp 1216 CCC.tmp 2920 DC6.tmp 2776 EFF.tmp 2764 F8B.tmp 1232 1037.tmp 1132 1160.tmp 3400 1279.tmp 3776 1383.tmp 3456 142F.tmp 2172 14FA.tmp 4168 15A6.tmp 2736 1671.tmp 2168 171D.tmp 4332 17E8.tmp 3276 18A4.tmp 3304 194F.tmp 1100 19DC.tmp 4012 1A98.tmp 1796 1B24.tmp 2652 1BD0.tmp 4504 1C7C.tmp 2016 1D28.tmp 4464 1DD4.tmp 3952 1E70.tmp 4892 1F0C.tmp 1404 1FD7.tmp 1304 2064.tmp 2992 20E1.tmp 2184 218D.tmp 1956 2258.tmp 2588 2333.tmp 2000 23BF.tmp 212 244C.tmp 412 24C9.tmp 2904 2575.tmp 4824 2650.tmp 4812 270B.tmp 2364 27A7.tmp 4704 2863.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2144 1480 2023-08-22_1be83ac4c5da8c2bdc1b4fd5d722b77a_mafia_JC.exe 82 PID 1480 wrote to memory of 2144 1480 2023-08-22_1be83ac4c5da8c2bdc1b4fd5d722b77a_mafia_JC.exe 82 PID 1480 wrote to memory of 2144 1480 2023-08-22_1be83ac4c5da8c2bdc1b4fd5d722b77a_mafia_JC.exe 82 PID 2144 wrote to memory of 1616 2144 F85A.tmp 83 PID 2144 wrote to memory of 1616 2144 F85A.tmp 83 PID 2144 wrote to memory of 1616 2144 F85A.tmp 83 PID 1616 wrote to memory of 1516 1616 F944.tmp 84 PID 1616 wrote to memory of 1516 1616 F944.tmp 84 PID 1616 wrote to memory of 1516 1616 F944.tmp 84 PID 1516 wrote to memory of 1548 1516 FA1F.tmp 86 PID 1516 wrote to memory of 1548 1516 FA1F.tmp 86 PID 1516 wrote to memory of 1548 1516 FA1F.tmp 86 PID 1548 wrote to memory of 1656 1548 FAEA.tmp 87 PID 1548 wrote to memory of 1656 1548 FAEA.tmp 87 PID 1548 wrote to memory of 1656 1548 FAEA.tmp 87 PID 1656 wrote to memory of 3436 1656 FBA6.tmp 88 PID 1656 wrote to memory of 3436 1656 FBA6.tmp 88 PID 1656 wrote to memory of 3436 1656 FBA6.tmp 88 PID 3436 wrote to memory of 2216 3436 FC61.tmp 89 PID 3436 wrote to memory of 2216 3436 FC61.tmp 89 PID 3436 wrote to memory of 2216 3436 FC61.tmp 89 PID 2216 wrote to memory of 1876 2216 FD3C.tmp 90 PID 2216 wrote to memory of 1876 2216 FD3C.tmp 90 PID 2216 wrote to memory of 1876 2216 FD3C.tmp 90 PID 1876 wrote to memory of 1772 1876 FDF7.tmp 91 PID 1876 wrote to memory of 1772 1876 FDF7.tmp 91 PID 1876 wrote to memory of 1772 1876 FDF7.tmp 91 PID 1772 wrote to memory of 1048 1772 FEF1.tmp 92 PID 1772 wrote to memory of 1048 1772 FEF1.tmp 92 PID 1772 wrote to memory of 1048 1772 FEF1.tmp 92 PID 1048 wrote to memory of 1716 1048 FFCC.tmp 93 PID 1048 wrote to memory of 1716 1048 FFCC.tmp 93 PID 1048 wrote to memory of 1716 1048 FFCC.tmp 93 PID 1716 wrote to memory of 3876 1716 59.tmp 94 PID 1716 wrote to memory of 3876 1716 59.tmp 94 PID 1716 wrote to memory of 3876 1716 59.tmp 94 PID 3876 wrote to memory of 3004 3876 105.tmp 95 PID 3876 wrote to memory of 3004 3876 105.tmp 95 PID 3876 wrote to memory of 3004 3876 105.tmp 95 PID 3004 wrote to memory of 952 3004 1B1.tmp 96 PID 3004 wrote to memory of 952 3004 1B1.tmp 96 PID 3004 wrote to memory of 952 3004 1B1.tmp 96 PID 952 wrote to memory of 1776 952 26C.tmp 97 PID 952 wrote to memory of 1776 952 26C.tmp 97 PID 952 wrote to memory of 1776 952 26C.tmp 97 PID 1776 wrote to memory of 4324 1776 328.tmp 98 PID 1776 wrote to memory of 4324 1776 328.tmp 98 PID 1776 wrote to memory of 4324 1776 328.tmp 98 PID 4324 wrote to memory of 4904 4324 4ED.tmp 99 PID 4324 wrote to memory of 4904 4324 4ED.tmp 99 PID 4324 wrote to memory of 4904 4324 4ED.tmp 99 PID 4904 wrote to memory of 2836 4904 5B8.tmp 100 PID 4904 wrote to memory of 2836 4904 5B8.tmp 100 PID 4904 wrote to memory of 2836 4904 5B8.tmp 100 PID 2836 wrote to memory of 4248 2836 664.tmp 101 PID 2836 wrote to memory of 4248 2836 664.tmp 101 PID 2836 wrote to memory of 4248 2836 664.tmp 101 PID 4248 wrote to memory of 1428 4248 73E.tmp 102 PID 4248 wrote to memory of 1428 4248 73E.tmp 102 PID 4248 wrote to memory of 1428 4248 73E.tmp 102 PID 1428 wrote to memory of 3144 1428 7FA.tmp 103 PID 1428 wrote to memory of 3144 1428 7FA.tmp 103 PID 1428 wrote to memory of 3144 1428 7FA.tmp 103 PID 3144 wrote to memory of 1952 3144 8C5.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-22_1be83ac4c5da8c2bdc1b4fd5d722b77a_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-22_1be83ac4c5da8c2bdc1b4fd5d722b77a_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\F85A.tmp"C:\Users\Admin\AppData\Local\Temp\F85A.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\F944.tmp"C:\Users\Admin\AppData\Local\Temp\F944.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"C:\Users\Admin\AppData\Local\Temp\FA1F.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\FAEA.tmp"C:\Users\Admin\AppData\Local\Temp\FAEA.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\FC61.tmp"C:\Users\Admin\AppData\Local\Temp\FC61.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"C:\Users\Admin\AppData\Local\Temp\FD3C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\FEF1.tmp"C:\Users\Admin\AppData\Local\Temp\FEF1.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\59.tmp"C:\Users\Admin\AppData\Local\Temp\59.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\105.tmp"C:\Users\Admin\AppData\Local\Temp\105.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\1B1.tmp"C:\Users\Admin\AppData\Local\Temp\1B1.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\26C.tmp"C:\Users\Admin\AppData\Local\Temp\26C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\328.tmp"C:\Users\Admin\AppData\Local\Temp\328.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\4ED.tmp"C:\Users\Admin\AppData\Local\Temp\4ED.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\5B8.tmp"C:\Users\Admin\AppData\Local\Temp\5B8.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\664.tmp"C:\Users\Admin\AppData\Local\Temp\664.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\73E.tmp"C:\Users\Admin\AppData\Local\Temp\73E.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\7FA.tmp"C:\Users\Admin\AppData\Local\Temp\7FA.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\8C5.tmp"C:\Users\Admin\AppData\Local\Temp\8C5.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\9AF.tmp"C:\Users\Admin\AppData\Local\Temp\9AF.tmp"23⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\AA9.tmp"C:\Users\Admin\AppData\Local\Temp\AA9.tmp"24⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\B36.tmp"C:\Users\Admin\AppData\Local\Temp\B36.tmp"25⤵
- Executes dropped EXE
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\C30.tmp"C:\Users\Admin\AppData\Local\Temp\C30.tmp"26⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\CCC.tmp"C:\Users\Admin\AppData\Local\Temp\CCC.tmp"27⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\DC6.tmp"C:\Users\Admin\AppData\Local\Temp\DC6.tmp"28⤵
- Executes dropped EXE
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\EFF.tmp"C:\Users\Admin\AppData\Local\Temp\EFF.tmp"29⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\F8B.tmp"C:\Users\Admin\AppData\Local\Temp\F8B.tmp"30⤵
- Executes dropped EXE
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\1037.tmp"C:\Users\Admin\AppData\Local\Temp\1037.tmp"31⤵
- Executes dropped EXE
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\1160.tmp"C:\Users\Admin\AppData\Local\Temp\1160.tmp"32⤵
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\1279.tmp"C:\Users\Admin\AppData\Local\Temp\1279.tmp"33⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\1383.tmp"C:\Users\Admin\AppData\Local\Temp\1383.tmp"34⤵
- Executes dropped EXE
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\142F.tmp"C:\Users\Admin\AppData\Local\Temp\142F.tmp"35⤵
- Executes dropped EXE
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\14FA.tmp"C:\Users\Admin\AppData\Local\Temp\14FA.tmp"36⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\15A6.tmp"C:\Users\Admin\AppData\Local\Temp\15A6.tmp"37⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\1671.tmp"C:\Users\Admin\AppData\Local\Temp\1671.tmp"38⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\171D.tmp"C:\Users\Admin\AppData\Local\Temp\171D.tmp"39⤵
- Executes dropped EXE
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\17E8.tmp"C:\Users\Admin\AppData\Local\Temp\17E8.tmp"40⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\18A4.tmp"C:\Users\Admin\AppData\Local\Temp\18A4.tmp"41⤵
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\194F.tmp"C:\Users\Admin\AppData\Local\Temp\194F.tmp"42⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\19DC.tmp"C:\Users\Admin\AppData\Local\Temp\19DC.tmp"43⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\1A98.tmp"C:\Users\Admin\AppData\Local\Temp\1A98.tmp"44⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\1B24.tmp"C:\Users\Admin\AppData\Local\Temp\1B24.tmp"45⤵
- Executes dropped EXE
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\1BD0.tmp"C:\Users\Admin\AppData\Local\Temp\1BD0.tmp"46⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\1C7C.tmp"C:\Users\Admin\AppData\Local\Temp\1C7C.tmp"47⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\1D28.tmp"C:\Users\Admin\AppData\Local\Temp\1D28.tmp"48⤵
- Executes dropped EXE
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\1DD4.tmp"C:\Users\Admin\AppData\Local\Temp\1DD4.tmp"49⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\1E70.tmp"C:\Users\Admin\AppData\Local\Temp\1E70.tmp"50⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"C:\Users\Admin\AppData\Local\Temp\1F0C.tmp"51⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"C:\Users\Admin\AppData\Local\Temp\1FD7.tmp"52⤵
- Executes dropped EXE
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\2064.tmp"C:\Users\Admin\AppData\Local\Temp\2064.tmp"53⤵
- Executes dropped EXE
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\20E1.tmp"C:\Users\Admin\AppData\Local\Temp\20E1.tmp"54⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\218D.tmp"C:\Users\Admin\AppData\Local\Temp\218D.tmp"55⤵
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\2258.tmp"C:\Users\Admin\AppData\Local\Temp\2258.tmp"56⤵
- Executes dropped EXE
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\2333.tmp"C:\Users\Admin\AppData\Local\Temp\2333.tmp"57⤵
- Executes dropped EXE
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\23BF.tmp"C:\Users\Admin\AppData\Local\Temp\23BF.tmp"58⤵
- Executes dropped EXE
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\244C.tmp"C:\Users\Admin\AppData\Local\Temp\244C.tmp"59⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\24C9.tmp"C:\Users\Admin\AppData\Local\Temp\24C9.tmp"60⤵
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\2575.tmp"C:\Users\Admin\AppData\Local\Temp\2575.tmp"61⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\2650.tmp"C:\Users\Admin\AppData\Local\Temp\2650.tmp"62⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\270B.tmp"C:\Users\Admin\AppData\Local\Temp\270B.tmp"63⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\27A7.tmp"C:\Users\Admin\AppData\Local\Temp\27A7.tmp"64⤵
- Executes dropped EXE
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\2863.tmp"C:\Users\Admin\AppData\Local\Temp\2863.tmp"65⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\28EF.tmp"C:\Users\Admin\AppData\Local\Temp\28EF.tmp"66⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\29AB.tmp"C:\Users\Admin\AppData\Local\Temp\29AB.tmp"67⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\2A28.tmp"C:\Users\Admin\AppData\Local\Temp\2A28.tmp"68⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\2AB5.tmp"C:\Users\Admin\AppData\Local\Temp\2AB5.tmp"69⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\2B51.tmp"C:\Users\Admin\AppData\Local\Temp\2B51.tmp"70⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\2BED.tmp"C:\Users\Admin\AppData\Local\Temp\2BED.tmp"71⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\2C6A.tmp"C:\Users\Admin\AppData\Local\Temp\2C6A.tmp"72⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\2D45.tmp"C:\Users\Admin\AppData\Local\Temp\2D45.tmp"73⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\2DE1.tmp"C:\Users\Admin\AppData\Local\Temp\2DE1.tmp"74⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\2EAC.tmp"C:\Users\Admin\AppData\Local\Temp\2EAC.tmp"75⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\2F58.tmp"C:\Users\Admin\AppData\Local\Temp\2F58.tmp"76⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"C:\Users\Admin\AppData\Local\Temp\2FE5.tmp"77⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\3052.tmp"C:\Users\Admin\AppData\Local\Temp\3052.tmp"78⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\310E.tmp"C:\Users\Admin\AppData\Local\Temp\310E.tmp"79⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\31B9.tmp"C:\Users\Admin\AppData\Local\Temp\31B9.tmp"80⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\3246.tmp"C:\Users\Admin\AppData\Local\Temp\3246.tmp"81⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\3311.tmp"C:\Users\Admin\AppData\Local\Temp\3311.tmp"82⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\33AD.tmp"C:\Users\Admin\AppData\Local\Temp\33AD.tmp"83⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\3479.tmp"C:\Users\Admin\AppData\Local\Temp\3479.tmp"84⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\3515.tmp"C:\Users\Admin\AppData\Local\Temp\3515.tmp"85⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\35B1.tmp"C:\Users\Admin\AppData\Local\Temp\35B1.tmp"86⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\365D.tmp"C:\Users\Admin\AppData\Local\Temp\365D.tmp"87⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\36F9.tmp"C:\Users\Admin\AppData\Local\Temp\36F9.tmp"88⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\37B5.tmp"C:\Users\Admin\AppData\Local\Temp\37B5.tmp"89⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\389F.tmp"C:\Users\Admin\AppData\Local\Temp\389F.tmp"90⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\395B.tmp"C:\Users\Admin\AppData\Local\Temp\395B.tmp"91⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\3A06.tmp"C:\Users\Admin\AppData\Local\Temp\3A06.tmp"92⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\3AC2.tmp"C:\Users\Admin\AppData\Local\Temp\3AC2.tmp"93⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\3B5E.tmp"C:\Users\Admin\AppData\Local\Temp\3B5E.tmp"94⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"95⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\3C97.tmp"C:\Users\Admin\AppData\Local\Temp\3C97.tmp"96⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\3D43.tmp"C:\Users\Admin\AppData\Local\Temp\3D43.tmp"97⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\3E0E.tmp"C:\Users\Admin\AppData\Local\Temp\3E0E.tmp"98⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"C:\Users\Admin\AppData\Local\Temp\3EBA.tmp"99⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\3F65.tmp"C:\Users\Admin\AppData\Local\Temp\3F65.tmp"100⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\4021.tmp"C:\Users\Admin\AppData\Local\Temp\4021.tmp"101⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\40BD.tmp"C:\Users\Admin\AppData\Local\Temp\40BD.tmp"102⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\4169.tmp"C:\Users\Admin\AppData\Local\Temp\4169.tmp"103⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\4205.tmp"C:\Users\Admin\AppData\Local\Temp\4205.tmp"104⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\42A2.tmp"C:\Users\Admin\AppData\Local\Temp\42A2.tmp"105⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\431F.tmp"C:\Users\Admin\AppData\Local\Temp\431F.tmp"106⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\43BB.tmp"C:\Users\Admin\AppData\Local\Temp\43BB.tmp"107⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\4457.tmp"C:\Users\Admin\AppData\Local\Temp\4457.tmp"108⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\44F3.tmp"C:\Users\Admin\AppData\Local\Temp\44F3.tmp"109⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\4570.tmp"C:\Users\Admin\AppData\Local\Temp\4570.tmp"110⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\45FD.tmp"C:\Users\Admin\AppData\Local\Temp\45FD.tmp"111⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\46A9.tmp"C:\Users\Admin\AppData\Local\Temp\46A9.tmp"112⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\4774.tmp"C:\Users\Admin\AppData\Local\Temp\4774.tmp"113⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\4810.tmp"C:\Users\Admin\AppData\Local\Temp\4810.tmp"114⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\48CC.tmp"C:\Users\Admin\AppData\Local\Temp\48CC.tmp"115⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\4949.tmp"C:\Users\Admin\AppData\Local\Temp\4949.tmp"116⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\49C6.tmp"C:\Users\Admin\AppData\Local\Temp\49C6.tmp"117⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\4A43.tmp"C:\Users\Admin\AppData\Local\Temp\4A43.tmp"118⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\4ACF.tmp"C:\Users\Admin\AppData\Local\Temp\4ACF.tmp"119⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\4B8B.tmp"C:\Users\Admin\AppData\Local\Temp\4B8B.tmp"120⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\4C37.tmp"C:\Users\Admin\AppData\Local\Temp\4C37.tmp"121⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\4CB4.tmp"C:\Users\Admin\AppData\Local\Temp\4CB4.tmp"122⤵PID:3012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-