Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2023, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_e6a1adf81561aaf64380212ca88fcb0a_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_e6a1adf81561aaf64380212ca88fcb0a_mafia_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_e6a1adf81561aaf64380212ca88fcb0a_mafia_JC.exe
-
Size
487KB
-
MD5
e6a1adf81561aaf64380212ca88fcb0a
-
SHA1
81b0ad80d83b49043c9d0eea5b5cd11e1d7e7410
-
SHA256
b1b51f217e28f43e2478a3c153142410be03f706164ef8af4cf0786d3c3f9270
-
SHA512
5ea46568e16a41d6ba76eb74dc709c9e96bcc4c2a2392d92b5ecb0254cd45a586bbe2d2a49b24d54062efad2bfda42b86d460a5b5052ac48517f3774f610f9a1
-
SSDEEP
6144:qorf3lPvovsgZnqG2C7mOTeiL9DU3DPd7K8ss0x6/lQYjbB/DS8YvAYfm5r84GuP:HU5rCOTeiJdsW6/vBrdYR6r8Xux+mNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3700 C1F8.tmp 1704 C2B4.tmp 3308 C350.tmp 4620 C43A.tmp 3916 C4E6.tmp 1304 C5C1.tmp 4480 C67C.tmp 1636 C738.tmp 3352 C803.tmp 1408 C8BE.tmp 5108 C9A9.tmp 1712 CA45.tmp 4468 CAF1.tmp 3032 CB9D.tmp 2644 CC29.tmp 2780 CDDF.tmp 556 CE9A.tmp 4128 CF46.tmp 4156 D011.tmp 3120 D0CD.tmp 4280 D15A.tmp 4676 D1E6.tmp 4524 D292.tmp 4932 D32E.tmp 4292 D3DA.tmp 4936 D496.tmp 4248 D580.tmp 5076 D63C.tmp 636 D755.tmp 4548 D830.tmp 4472 D8DB.tmp 3464 D9D5.tmp 1284 DAC0.tmp 772 DB6C.tmp 3276 DBF8.tmp 1992 DC85.tmp 2652 DD31.tmp 3264 DDBD.tmp 408 DE4A.tmp 4144 DED7.tmp 4784 DF73.tmp 1044 E000.tmp 5072 E0BB.tmp 3088 E157.tmp 4360 E213.tmp 2744 E2CE.tmp 2024 E36B.tmp 3984 E416.tmp 4584 E4B3.tmp 452 E55F.tmp 5060 E5DC.tmp 236 E668.tmp 4864 E724.tmp 3808 E7DF.tmp 2268 E89B.tmp 3256 E927.tmp 1880 E9D3.tmp 3416 EA50.tmp 4708 EAEC.tmp 752 EB89.tmp 816 EC44.tmp 4104 ECC1.tmp 868 ED6D.tmp 1652 EDEA.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1912 wrote to memory of 3700 1912 2023-08-22_e6a1adf81561aaf64380212ca88fcb0a_mafia_JC.exe 81 PID 1912 wrote to memory of 3700 1912 2023-08-22_e6a1adf81561aaf64380212ca88fcb0a_mafia_JC.exe 81 PID 1912 wrote to memory of 3700 1912 2023-08-22_e6a1adf81561aaf64380212ca88fcb0a_mafia_JC.exe 81 PID 3700 wrote to memory of 1704 3700 C1F8.tmp 82 PID 3700 wrote to memory of 1704 3700 C1F8.tmp 82 PID 3700 wrote to memory of 1704 3700 C1F8.tmp 82 PID 1704 wrote to memory of 3308 1704 C2B4.tmp 83 PID 1704 wrote to memory of 3308 1704 C2B4.tmp 83 PID 1704 wrote to memory of 3308 1704 C2B4.tmp 83 PID 3308 wrote to memory of 4620 3308 C350.tmp 84 PID 3308 wrote to memory of 4620 3308 C350.tmp 84 PID 3308 wrote to memory of 4620 3308 C350.tmp 84 PID 4620 wrote to memory of 3916 4620 C43A.tmp 86 PID 4620 wrote to memory of 3916 4620 C43A.tmp 86 PID 4620 wrote to memory of 3916 4620 C43A.tmp 86 PID 3916 wrote to memory of 1304 3916 C4E6.tmp 87 PID 3916 wrote to memory of 1304 3916 C4E6.tmp 87 PID 3916 wrote to memory of 1304 3916 C4E6.tmp 87 PID 1304 wrote to memory of 4480 1304 C5C1.tmp 88 PID 1304 wrote to memory of 4480 1304 C5C1.tmp 88 PID 1304 wrote to memory of 4480 1304 C5C1.tmp 88 PID 4480 wrote to memory of 1636 4480 C67C.tmp 89 PID 4480 wrote to memory of 1636 4480 C67C.tmp 89 PID 4480 wrote to memory of 1636 4480 C67C.tmp 89 PID 1636 wrote to memory of 3352 1636 C738.tmp 90 PID 1636 wrote to memory of 3352 1636 C738.tmp 90 PID 1636 wrote to memory of 3352 1636 C738.tmp 90 PID 3352 wrote to memory of 1408 3352 C803.tmp 91 PID 3352 wrote to memory of 1408 3352 C803.tmp 91 PID 3352 wrote to memory of 1408 3352 C803.tmp 91 PID 1408 wrote to memory of 5108 1408 C8BE.tmp 92 PID 1408 wrote to memory of 5108 1408 C8BE.tmp 92 PID 1408 wrote to memory of 5108 1408 C8BE.tmp 92 PID 5108 wrote to memory of 1712 5108 C9A9.tmp 93 PID 5108 wrote to memory of 1712 5108 C9A9.tmp 93 PID 5108 wrote to memory of 1712 5108 C9A9.tmp 93 PID 1712 wrote to memory of 4468 1712 CA45.tmp 94 PID 1712 wrote to memory of 4468 1712 CA45.tmp 94 PID 1712 wrote to memory of 4468 1712 CA45.tmp 94 PID 4468 wrote to memory of 3032 4468 CAF1.tmp 95 PID 4468 wrote to memory of 3032 4468 CAF1.tmp 95 PID 4468 wrote to memory of 3032 4468 CAF1.tmp 95 PID 3032 wrote to memory of 2644 3032 CB9D.tmp 96 PID 3032 wrote to memory of 2644 3032 CB9D.tmp 96 PID 3032 wrote to memory of 2644 3032 CB9D.tmp 96 PID 2644 wrote to memory of 2780 2644 CC29.tmp 97 PID 2644 wrote to memory of 2780 2644 CC29.tmp 97 PID 2644 wrote to memory of 2780 2644 CC29.tmp 97 PID 2780 wrote to memory of 556 2780 CDDF.tmp 98 PID 2780 wrote to memory of 556 2780 CDDF.tmp 98 PID 2780 wrote to memory of 556 2780 CDDF.tmp 98 PID 556 wrote to memory of 4128 556 CE9A.tmp 99 PID 556 wrote to memory of 4128 556 CE9A.tmp 99 PID 556 wrote to memory of 4128 556 CE9A.tmp 99 PID 4128 wrote to memory of 4156 4128 CF46.tmp 100 PID 4128 wrote to memory of 4156 4128 CF46.tmp 100 PID 4128 wrote to memory of 4156 4128 CF46.tmp 100 PID 4156 wrote to memory of 3120 4156 D011.tmp 101 PID 4156 wrote to memory of 3120 4156 D011.tmp 101 PID 4156 wrote to memory of 3120 4156 D011.tmp 101 PID 3120 wrote to memory of 4280 3120 D0CD.tmp 102 PID 3120 wrote to memory of 4280 3120 D0CD.tmp 102 PID 3120 wrote to memory of 4280 3120 D0CD.tmp 102 PID 4280 wrote to memory of 4676 4280 D15A.tmp 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-22_e6a1adf81561aaf64380212ca88fcb0a_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-22_e6a1adf81561aaf64380212ca88fcb0a_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\C1F8.tmp"C:\Users\Admin\AppData\Local\Temp\C1F8.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\C2B4.tmp"C:\Users\Admin\AppData\Local\Temp\C2B4.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\C350.tmp"C:\Users\Admin\AppData\Local\Temp\C350.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\C43A.tmp"C:\Users\Admin\AppData\Local\Temp\C43A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\C4E6.tmp"C:\Users\Admin\AppData\Local\Temp\C4E6.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\C67C.tmp"C:\Users\Admin\AppData\Local\Temp\C67C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\C738.tmp"C:\Users\Admin\AppData\Local\Temp\C738.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\C803.tmp"C:\Users\Admin\AppData\Local\Temp\C803.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\C8BE.tmp"C:\Users\Admin\AppData\Local\Temp\C8BE.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\C9A9.tmp"C:\Users\Admin\AppData\Local\Temp\C9A9.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\CA45.tmp"C:\Users\Admin\AppData\Local\Temp\CA45.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\CAF1.tmp"C:\Users\Admin\AppData\Local\Temp\CAF1.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\CC29.tmp"C:\Users\Admin\AppData\Local\Temp\CC29.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\CDDF.tmp"C:\Users\Admin\AppData\Local\Temp\CDDF.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\CE9A.tmp"C:\Users\Admin\AppData\Local\Temp\CE9A.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\CF46.tmp"C:\Users\Admin\AppData\Local\Temp\CF46.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\D011.tmp"C:\Users\Admin\AppData\Local\Temp\D011.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\D15A.tmp"C:\Users\Admin\AppData\Local\Temp\D15A.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"23⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\D292.tmp"C:\Users\Admin\AppData\Local\Temp\D292.tmp"24⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\D32E.tmp"C:\Users\Admin\AppData\Local\Temp\D32E.tmp"25⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\D3DA.tmp"C:\Users\Admin\AppData\Local\Temp\D3DA.tmp"26⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\D496.tmp"C:\Users\Admin\AppData\Local\Temp\D496.tmp"27⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\D580.tmp"C:\Users\Admin\AppData\Local\Temp\D580.tmp"28⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\D63C.tmp"C:\Users\Admin\AppData\Local\Temp\D63C.tmp"29⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\D755.tmp"C:\Users\Admin\AppData\Local\Temp\D755.tmp"30⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\D830.tmp"C:\Users\Admin\AppData\Local\Temp\D830.tmp"31⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"32⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"33⤵
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"C:\Users\Admin\AppData\Local\Temp\DAC0.tmp"34⤵
- Executes dropped EXE
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"35⤵
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"C:\Users\Admin\AppData\Local\Temp\DBF8.tmp"36⤵
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\DC85.tmp"C:\Users\Admin\AppData\Local\Temp\DC85.tmp"37⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\DD31.tmp"C:\Users\Admin\AppData\Local\Temp\DD31.tmp"38⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"39⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"40⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\DED7.tmp"C:\Users\Admin\AppData\Local\Temp\DED7.tmp"41⤵
- Executes dropped EXE
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\DF73.tmp"C:\Users\Admin\AppData\Local\Temp\DF73.tmp"42⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\E000.tmp"C:\Users\Admin\AppData\Local\Temp\E000.tmp"43⤵
- Executes dropped EXE
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"44⤵
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\E157.tmp"C:\Users\Admin\AppData\Local\Temp\E157.tmp"45⤵
- Executes dropped EXE
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\E213.tmp"C:\Users\Admin\AppData\Local\Temp\E213.tmp"46⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"47⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\E36B.tmp"C:\Users\Admin\AppData\Local\Temp\E36B.tmp"48⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\E416.tmp"C:\Users\Admin\AppData\Local\Temp\E416.tmp"49⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"50⤵
- Executes dropped EXE
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\E55F.tmp"C:\Users\Admin\AppData\Local\Temp\E55F.tmp"51⤵
- Executes dropped EXE
PID:452 -
C:\Users\Admin\AppData\Local\Temp\E5DC.tmp"C:\Users\Admin\AppData\Local\Temp\E5DC.tmp"52⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\E668.tmp"C:\Users\Admin\AppData\Local\Temp\E668.tmp"53⤵
- Executes dropped EXE
PID:236 -
C:\Users\Admin\AppData\Local\Temp\E724.tmp"C:\Users\Admin\AppData\Local\Temp\E724.tmp"54⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\E7DF.tmp"C:\Users\Admin\AppData\Local\Temp\E7DF.tmp"55⤵
- Executes dropped EXE
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\E89B.tmp"C:\Users\Admin\AppData\Local\Temp\E89B.tmp"56⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\E927.tmp"C:\Users\Admin\AppData\Local\Temp\E927.tmp"57⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\E9D3.tmp"C:\Users\Admin\AppData\Local\Temp\E9D3.tmp"58⤵
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\EA50.tmp"C:\Users\Admin\AppData\Local\Temp\EA50.tmp"59⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\EAEC.tmp"C:\Users\Admin\AppData\Local\Temp\EAEC.tmp"60⤵
- Executes dropped EXE
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\EB89.tmp"C:\Users\Admin\AppData\Local\Temp\EB89.tmp"61⤵
- Executes dropped EXE
PID:752 -
C:\Users\Admin\AppData\Local\Temp\EC44.tmp"C:\Users\Admin\AppData\Local\Temp\EC44.tmp"62⤵
- Executes dropped EXE
PID:816 -
C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"C:\Users\Admin\AppData\Local\Temp\ECC1.tmp"63⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"64⤵
- Executes dropped EXE
PID:868 -
C:\Users\Admin\AppData\Local\Temp\EDEA.tmp"C:\Users\Admin\AppData\Local\Temp\EDEA.tmp"65⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\EE86.tmp"C:\Users\Admin\AppData\Local\Temp\EE86.tmp"66⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\EF32.tmp"C:\Users\Admin\AppData\Local\Temp\EF32.tmp"67⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"68⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\F09A.tmp"C:\Users\Admin\AppData\Local\Temp\F09A.tmp"69⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\F136.tmp"C:\Users\Admin\AppData\Local\Temp\F136.tmp"70⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"C:\Users\Admin\AppData\Local\Temp\F1E2.tmp"71⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\F26E.tmp"C:\Users\Admin\AppData\Local\Temp\F26E.tmp"72⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\F2DC.tmp"C:\Users\Admin\AppData\Local\Temp\F2DC.tmp"73⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\F388.tmp"C:\Users\Admin\AppData\Local\Temp\F388.tmp"74⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\F424.tmp"C:\Users\Admin\AppData\Local\Temp\F424.tmp"75⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\F4DF.tmp"C:\Users\Admin\AppData\Local\Temp\F4DF.tmp"76⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\F58B.tmp"C:\Users\Admin\AppData\Local\Temp\F58B.tmp"77⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\F637.tmp"C:\Users\Admin\AppData\Local\Temp\F637.tmp"78⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"79⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\F77F.tmp"C:\Users\Admin\AppData\Local\Temp\F77F.tmp"80⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\F83B.tmp"C:\Users\Admin\AppData\Local\Temp\F83B.tmp"81⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\F8D7.tmp"C:\Users\Admin\AppData\Local\Temp\F8D7.tmp"82⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\F954.tmp"C:\Users\Admin\AppData\Local\Temp\F954.tmp"83⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\F9D1.tmp"C:\Users\Admin\AppData\Local\Temp\F9D1.tmp"84⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\FA7D.tmp"C:\Users\Admin\AppData\Local\Temp\FA7D.tmp"85⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\FB09.tmp"C:\Users\Admin\AppData\Local\Temp\FB09.tmp"86⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"87⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\FC61.tmp"C:\Users\Admin\AppData\Local\Temp\FC61.tmp"88⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"89⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\FD7A.tmp"C:\Users\Admin\AppData\Local\Temp\FD7A.tmp"90⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\FE36.tmp"C:\Users\Admin\AppData\Local\Temp\FE36.tmp"91⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\FF01.tmp"C:\Users\Admin\AppData\Local\Temp\FF01.tmp"92⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\FF7E.tmp"C:\Users\Admin\AppData\Local\Temp\FF7E.tmp"93⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\FFFB.tmp"C:\Users\Admin\AppData\Local\Temp\FFFB.tmp"94⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\A7.tmp"C:\Users\Admin\AppData\Local\Temp\A7.tmp"95⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\143.tmp"C:\Users\Admin\AppData\Local\Temp\143.tmp"96⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\1DF.tmp"C:\Users\Admin\AppData\Local\Temp\1DF.tmp"97⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\28B.tmp"C:\Users\Admin\AppData\Local\Temp\28B.tmp"98⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\318.tmp"C:\Users\Admin\AppData\Local\Temp\318.tmp"99⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\395.tmp"C:\Users\Admin\AppData\Local\Temp\395.tmp"100⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\450.tmp"C:\Users\Admin\AppData\Local\Temp\450.tmp"101⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\4ED.tmp"C:\Users\Admin\AppData\Local\Temp\4ED.tmp"102⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\589.tmp"C:\Users\Admin\AppData\Local\Temp\589.tmp"103⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\644.tmp"C:\Users\Admin\AppData\Local\Temp\644.tmp"104⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\710.tmp"C:\Users\Admin\AppData\Local\Temp\710.tmp"105⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\78D.tmp"C:\Users\Admin\AppData\Local\Temp\78D.tmp"106⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\7FA.tmp"C:\Users\Admin\AppData\Local\Temp\7FA.tmp"107⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\887.tmp"C:\Users\Admin\AppData\Local\Temp\887.tmp"108⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\923.tmp"C:\Users\Admin\AppData\Local\Temp\923.tmp"109⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\9BF.tmp"C:\Users\Admin\AppData\Local\Temp\9BF.tmp"110⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\A5B.tmp"C:\Users\Admin\AppData\Local\Temp\A5B.tmp"111⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\B07.tmp"C:\Users\Admin\AppData\Local\Temp\B07.tmp"112⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\BA3.tmp"C:\Users\Admin\AppData\Local\Temp\BA3.tmp"113⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp"114⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\CFB.tmp"C:\Users\Admin\AppData\Local\Temp\CFB.tmp"115⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\DC6.tmp"C:\Users\Admin\AppData\Local\Temp\DC6.tmp"116⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\E72.tmp"C:\Users\Admin\AppData\Local\Temp\E72.tmp"117⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\F1E.tmp"C:\Users\Admin\AppData\Local\Temp\F1E.tmp"118⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\F7C.tmp"C:\Users\Admin\AppData\Local\Temp\F7C.tmp"119⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\1008.tmp"C:\Users\Admin\AppData\Local\Temp\1008.tmp"120⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\10A5.tmp"C:\Users\Admin\AppData\Local\Temp\10A5.tmp"121⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\1151.tmp"C:\Users\Admin\AppData\Local\Temp\1151.tmp"122⤵PID:3304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-