Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2023, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-23_43770faa104b8d501b7242c478e90cc9_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-23_43770faa104b8d501b7242c478e90cc9_mafia_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-23_43770faa104b8d501b7242c478e90cc9_mafia_JC.exe
-
Size
488KB
-
MD5
43770faa104b8d501b7242c478e90cc9
-
SHA1
6b88f5bc4b6ddb13f76e0470c9df5049b7f6ff6e
-
SHA256
df1fc87fb5e5f0d8364ce89a6ab81810fc4f7a3b015eab0361527f751eec435c
-
SHA512
f1b1d2320fa8f749a51455b43ae469addde61351be53529bdc5ed959a6c9668b188ba92f8478e8f70253fca672f34943aa64a6ecb6f07a2bdc542fe96044a960
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7W6Ztr9p8LodS5RlwThoNx0M4uo46su35lTZb:/U5rCOTeiDWGroLoQblwUB4uocu8CNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4396 C7F3.tmp 1856 D3BB.tmp 4984 D4B5.tmp 2152 D570.tmp 556 D61C.tmp 1124 D6C8.tmp 1396 D7F1.tmp 4520 D8BC.tmp 2544 EA7F.tmp 4796 F5BA.tmp 4144 F7AE.tmp 2324 E5.tmp 3356 A2C.tmp 4700 C40.tmp 4464 D3A.tmp 876 F1E.tmp 3572 FE9.tmp 2576 1141.tmp 2452 11FC.tmp 4500 1AC6.tmp 4760 1EED.tmp 896 23CF.tmp 4480 2B8F.tmp 1352 3227.tmp 4924 33EC.tmp 1012 3747.tmp 2904 3E7B.tmp 1704 4428.tmp 892 4699.tmp 228 47A3.tmp 3376 49A6.tmp 3728 4B2D.tmp 3916 4EF6.tmp 1496 52DE.tmp 1448 537A.tmp 3856 559D.tmp 2188 5639.tmp 1472 57DF.tmp 4528 58C9.tmp 3584 5B79.tmp 1848 5D1F.tmp 4836 5E57.tmp 212 5F03.tmp 3596 5F9F.tmp 4512 601C.tmp 4536 62EB.tmp 556 6378.tmp 3984 6414.tmp 3044 64C0.tmp 4916 655C.tmp 4872 6675.tmp 4520 6702.tmp 656 678F.tmp 4764 683B.tmp 1888 68D7.tmp 4180 6983.tmp 2200 6A00.tmp 224 6A8C.tmp 4056 6B77.tmp 60 6C03.tmp 4820 6C90.tmp 1644 6D3C.tmp 4436 6D9A.tmp 5084 6E07.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4396 4084 2023-08-23_43770faa104b8d501b7242c478e90cc9_mafia_JC.exe 85 PID 4084 wrote to memory of 4396 4084 2023-08-23_43770faa104b8d501b7242c478e90cc9_mafia_JC.exe 85 PID 4084 wrote to memory of 4396 4084 2023-08-23_43770faa104b8d501b7242c478e90cc9_mafia_JC.exe 85 PID 4396 wrote to memory of 1856 4396 C7F3.tmp 86 PID 4396 wrote to memory of 1856 4396 C7F3.tmp 86 PID 4396 wrote to memory of 1856 4396 C7F3.tmp 86 PID 1856 wrote to memory of 4984 1856 D3BB.tmp 87 PID 1856 wrote to memory of 4984 1856 D3BB.tmp 87 PID 1856 wrote to memory of 4984 1856 D3BB.tmp 87 PID 4984 wrote to memory of 2152 4984 D4B5.tmp 88 PID 4984 wrote to memory of 2152 4984 D4B5.tmp 88 PID 4984 wrote to memory of 2152 4984 D4B5.tmp 88 PID 2152 wrote to memory of 556 2152 D570.tmp 89 PID 2152 wrote to memory of 556 2152 D570.tmp 89 PID 2152 wrote to memory of 556 2152 D570.tmp 89 PID 556 wrote to memory of 1124 556 D61C.tmp 90 PID 556 wrote to memory of 1124 556 D61C.tmp 90 PID 556 wrote to memory of 1124 556 D61C.tmp 90 PID 1124 wrote to memory of 1396 1124 D6C8.tmp 91 PID 1124 wrote to memory of 1396 1124 D6C8.tmp 91 PID 1124 wrote to memory of 1396 1124 D6C8.tmp 91 PID 1396 wrote to memory of 4520 1396 D7F1.tmp 92 PID 1396 wrote to memory of 4520 1396 D7F1.tmp 92 PID 1396 wrote to memory of 4520 1396 D7F1.tmp 92 PID 4520 wrote to memory of 2544 4520 D8BC.tmp 93 PID 4520 wrote to memory of 2544 4520 D8BC.tmp 93 PID 4520 wrote to memory of 2544 4520 D8BC.tmp 93 PID 2544 wrote to memory of 4796 2544 EA7F.tmp 95 PID 2544 wrote to memory of 4796 2544 EA7F.tmp 95 PID 2544 wrote to memory of 4796 2544 EA7F.tmp 95 PID 4796 wrote to memory of 4144 4796 F5BA.tmp 96 PID 4796 wrote to memory of 4144 4796 F5BA.tmp 96 PID 4796 wrote to memory of 4144 4796 F5BA.tmp 96 PID 4144 wrote to memory of 2324 4144 F7AE.tmp 97 PID 4144 wrote to memory of 2324 4144 F7AE.tmp 97 PID 4144 wrote to memory of 2324 4144 F7AE.tmp 97 PID 2324 wrote to memory of 3356 2324 E5.tmp 98 PID 2324 wrote to memory of 3356 2324 E5.tmp 98 PID 2324 wrote to memory of 3356 2324 E5.tmp 98 PID 3356 wrote to memory of 4700 3356 A2C.tmp 100 PID 3356 wrote to memory of 4700 3356 A2C.tmp 100 PID 3356 wrote to memory of 4700 3356 A2C.tmp 100 PID 4700 wrote to memory of 4464 4700 C40.tmp 101 PID 4700 wrote to memory of 4464 4700 C40.tmp 101 PID 4700 wrote to memory of 4464 4700 C40.tmp 101 PID 4464 wrote to memory of 876 4464 D3A.tmp 103 PID 4464 wrote to memory of 876 4464 D3A.tmp 103 PID 4464 wrote to memory of 876 4464 D3A.tmp 103 PID 876 wrote to memory of 3572 876 F1E.tmp 105 PID 876 wrote to memory of 3572 876 F1E.tmp 105 PID 876 wrote to memory of 3572 876 F1E.tmp 105 PID 3572 wrote to memory of 2576 3572 FE9.tmp 106 PID 3572 wrote to memory of 2576 3572 FE9.tmp 106 PID 3572 wrote to memory of 2576 3572 FE9.tmp 106 PID 2576 wrote to memory of 2452 2576 1141.tmp 107 PID 2576 wrote to memory of 2452 2576 1141.tmp 107 PID 2576 wrote to memory of 2452 2576 1141.tmp 107 PID 2452 wrote to memory of 4500 2452 11FC.tmp 108 PID 2452 wrote to memory of 4500 2452 11FC.tmp 108 PID 2452 wrote to memory of 4500 2452 11FC.tmp 108 PID 4500 wrote to memory of 4760 4500 1AC6.tmp 109 PID 4500 wrote to memory of 4760 4500 1AC6.tmp 109 PID 4500 wrote to memory of 4760 4500 1AC6.tmp 109 PID 4760 wrote to memory of 896 4760 1EED.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-23_43770faa104b8d501b7242c478e90cc9_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-23_43770faa104b8d501b7242c478e90cc9_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"C:\Users\Admin\AppData\Local\Temp\C7F3.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"C:\Users\Admin\AppData\Local\Temp\D3BB.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\D4B5.tmp"C:\Users\Admin\AppData\Local\Temp\D4B5.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\D570.tmp"C:\Users\Admin\AppData\Local\Temp\D570.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\D61C.tmp"C:\Users\Admin\AppData\Local\Temp\D61C.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"C:\Users\Admin\AppData\Local\Temp\D6C8.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\D7F1.tmp"C:\Users\Admin\AppData\Local\Temp\D7F1.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\EA7F.tmp"C:\Users\Admin\AppData\Local\Temp\EA7F.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\F5BA.tmp"C:\Users\Admin\AppData\Local\Temp\F5BA.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\F7AE.tmp"C:\Users\Admin\AppData\Local\Temp\F7AE.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\E5.tmp"C:\Users\Admin\AppData\Local\Temp\E5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\A2C.tmp"C:\Users\Admin\AppData\Local\Temp\A2C.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\D3A.tmp"C:\Users\Admin\AppData\Local\Temp\D3A.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\F1E.tmp"C:\Users\Admin\AppData\Local\Temp\F1E.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\FE9.tmp"C:\Users\Admin\AppData\Local\Temp\FE9.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\1141.tmp"C:\Users\Admin\AppData\Local\Temp\1141.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\11FC.tmp"C:\Users\Admin\AppData\Local\Temp\11FC.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\1AC6.tmp"C:\Users\Admin\AppData\Local\Temp\1AC6.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\1EED.tmp"C:\Users\Admin\AppData\Local\Temp\1EED.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\23CF.tmp"C:\Users\Admin\AppData\Local\Temp\23CF.tmp"23⤵
- Executes dropped EXE
PID:896 -
C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"24⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\3227.tmp"C:\Users\Admin\AppData\Local\Temp\3227.tmp"25⤵
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"26⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\3747.tmp"C:\Users\Admin\AppData\Local\Temp\3747.tmp"27⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"28⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\4428.tmp"C:\Users\Admin\AppData\Local\Temp\4428.tmp"29⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\4699.tmp"C:\Users\Admin\AppData\Local\Temp\4699.tmp"30⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\47A3.tmp"C:\Users\Admin\AppData\Local\Temp\47A3.tmp"31⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\49A6.tmp"C:\Users\Admin\AppData\Local\Temp\49A6.tmp"32⤵
- Executes dropped EXE
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\4B2D.tmp"C:\Users\Admin\AppData\Local\Temp\4B2D.tmp"33⤵
- Executes dropped EXE
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"34⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\52DE.tmp"C:\Users\Admin\AppData\Local\Temp\52DE.tmp"35⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\537A.tmp"C:\Users\Admin\AppData\Local\Temp\537A.tmp"36⤵
- Executes dropped EXE
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\559D.tmp"C:\Users\Admin\AppData\Local\Temp\559D.tmp"37⤵
- Executes dropped EXE
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\5639.tmp"C:\Users\Admin\AppData\Local\Temp\5639.tmp"38⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\57DF.tmp"C:\Users\Admin\AppData\Local\Temp\57DF.tmp"39⤵
- Executes dropped EXE
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\58C9.tmp"C:\Users\Admin\AppData\Local\Temp\58C9.tmp"40⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\5B79.tmp"C:\Users\Admin\AppData\Local\Temp\5B79.tmp"41⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\5D1F.tmp"C:\Users\Admin\AppData\Local\Temp\5D1F.tmp"42⤵
- Executes dropped EXE
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\5E57.tmp"C:\Users\Admin\AppData\Local\Temp\5E57.tmp"43⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\5F03.tmp"C:\Users\Admin\AppData\Local\Temp\5F03.tmp"44⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"C:\Users\Admin\AppData\Local\Temp\5F9F.tmp"45⤵
- Executes dropped EXE
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\601C.tmp"C:\Users\Admin\AppData\Local\Temp\601C.tmp"46⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\62EB.tmp"C:\Users\Admin\AppData\Local\Temp\62EB.tmp"47⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\6378.tmp"C:\Users\Admin\AppData\Local\Temp\6378.tmp"48⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\6414.tmp"C:\Users\Admin\AppData\Local\Temp\6414.tmp"49⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\64C0.tmp"C:\Users\Admin\AppData\Local\Temp\64C0.tmp"50⤵
- Executes dropped EXE
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\655C.tmp"C:\Users\Admin\AppData\Local\Temp\655C.tmp"51⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\6675.tmp"C:\Users\Admin\AppData\Local\Temp\6675.tmp"52⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\6702.tmp"C:\Users\Admin\AppData\Local\Temp\6702.tmp"53⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\678F.tmp"C:\Users\Admin\AppData\Local\Temp\678F.tmp"54⤵
- Executes dropped EXE
PID:656 -
C:\Users\Admin\AppData\Local\Temp\683B.tmp"C:\Users\Admin\AppData\Local\Temp\683B.tmp"55⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\68D7.tmp"C:\Users\Admin\AppData\Local\Temp\68D7.tmp"56⤵
- Executes dropped EXE
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\6983.tmp"C:\Users\Admin\AppData\Local\Temp\6983.tmp"57⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\6A00.tmp"C:\Users\Admin\AppData\Local\Temp\6A00.tmp"58⤵
- Executes dropped EXE
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\6A8C.tmp"C:\Users\Admin\AppData\Local\Temp\6A8C.tmp"59⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\6B77.tmp"C:\Users\Admin\AppData\Local\Temp\6B77.tmp"60⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\6C03.tmp"C:\Users\Admin\AppData\Local\Temp\6C03.tmp"61⤵
- Executes dropped EXE
PID:60 -
C:\Users\Admin\AppData\Local\Temp\6C90.tmp"C:\Users\Admin\AppData\Local\Temp\6C90.tmp"62⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"C:\Users\Admin\AppData\Local\Temp\6D3C.tmp"63⤵
- Executes dropped EXE
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\6D9A.tmp"C:\Users\Admin\AppData\Local\Temp\6D9A.tmp"64⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\6E07.tmp"C:\Users\Admin\AppData\Local\Temp\6E07.tmp"65⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\6EB3.tmp"C:\Users\Admin\AppData\Local\Temp\6EB3.tmp"66⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"67⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"C:\Users\Admin\AppData\Local\Temp\6FFB.tmp"68⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\70C6.tmp"C:\Users\Admin\AppData\Local\Temp\70C6.tmp"69⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\7162.tmp"C:\Users\Admin\AppData\Local\Temp\7162.tmp"70⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\71FF.tmp"C:\Users\Admin\AppData\Local\Temp\71FF.tmp"71⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\729B.tmp"C:\Users\Admin\AppData\Local\Temp\729B.tmp"72⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\7327.tmp"C:\Users\Admin\AppData\Local\Temp\7327.tmp"73⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\73C4.tmp"C:\Users\Admin\AppData\Local\Temp\73C4.tmp"74⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\7450.tmp"C:\Users\Admin\AppData\Local\Temp\7450.tmp"75⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\74BE.tmp"C:\Users\Admin\AppData\Local\Temp\74BE.tmp"76⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\755A.tmp"C:\Users\Admin\AppData\Local\Temp\755A.tmp"77⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\76C1.tmp"C:\Users\Admin\AppData\Local\Temp\76C1.tmp"78⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\775E.tmp"C:\Users\Admin\AppData\Local\Temp\775E.tmp"79⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\77EA.tmp"C:\Users\Admin\AppData\Local\Temp\77EA.tmp"80⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\7848.tmp"C:\Users\Admin\AppData\Local\Temp\7848.tmp"81⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\78D5.tmp"C:\Users\Admin\AppData\Local\Temp\78D5.tmp"82⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\7961.tmp"C:\Users\Admin\AppData\Local\Temp\7961.tmp"83⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\79FD.tmp"C:\Users\Admin\AppData\Local\Temp\79FD.tmp"84⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\7AB9.tmp"C:\Users\Admin\AppData\Local\Temp\7AB9.tmp"85⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\7C01.tmp"C:\Users\Admin\AppData\Local\Temp\7C01.tmp"86⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"C:\Users\Admin\AppData\Local\Temp\7C6E.tmp"87⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\7CEB.tmp"C:\Users\Admin\AppData\Local\Temp\7CEB.tmp"88⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\7D59.tmp"C:\Users\Admin\AppData\Local\Temp\7D59.tmp"89⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\7E05.tmp"C:\Users\Admin\AppData\Local\Temp\7E05.tmp"90⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\7E82.tmp"C:\Users\Admin\AppData\Local\Temp\7E82.tmp"91⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\7F0E.tmp"C:\Users\Admin\AppData\Local\Temp\7F0E.tmp"92⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\7F9B.tmp"C:\Users\Admin\AppData\Local\Temp\7F9B.tmp"93⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\8018.tmp"C:\Users\Admin\AppData\Local\Temp\8018.tmp"94⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\85A6.tmp"C:\Users\Admin\AppData\Local\Temp\85A6.tmp"95⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\8681.tmp"C:\Users\Admin\AppData\Local\Temp\8681.tmp"96⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\871D.tmp"C:\Users\Admin\AppData\Local\Temp\871D.tmp"97⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\87B9.tmp"C:\Users\Admin\AppData\Local\Temp\87B9.tmp"98⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\8865.tmp"C:\Users\Admin\AppData\Local\Temp\8865.tmp"99⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\88E2.tmp"C:\Users\Admin\AppData\Local\Temp\88E2.tmp"100⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\894F.tmp"C:\Users\Admin\AppData\Local\Temp\894F.tmp"101⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\89DC.tmp"C:\Users\Admin\AppData\Local\Temp\89DC.tmp"102⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\8A78.tmp"C:\Users\Admin\AppData\Local\Temp\8A78.tmp"103⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\8B24.tmp"C:\Users\Admin\AppData\Local\Temp\8B24.tmp"104⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\9093.tmp"C:\Users\Admin\AppData\Local\Temp\9093.tmp"105⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\9100.tmp"C:\Users\Admin\AppData\Local\Temp\9100.tmp"106⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\918D.tmp"C:\Users\Admin\AppData\Local\Temp\918D.tmp"107⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\9239.tmp"C:\Users\Admin\AppData\Local\Temp\9239.tmp"108⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\92B6.tmp"C:\Users\Admin\AppData\Local\Temp\92B6.tmp"109⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\9333.tmp"C:\Users\Admin\AppData\Local\Temp\9333.tmp"110⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\93CF.tmp"C:\Users\Admin\AppData\Local\Temp\93CF.tmp"111⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\947B.tmp"C:\Users\Admin\AppData\Local\Temp\947B.tmp"112⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\9527.tmp"C:\Users\Admin\AppData\Local\Temp\9527.tmp"113⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\95A4.tmp"C:\Users\Admin\AppData\Local\Temp\95A4.tmp"114⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\9640.tmp"C:\Users\Admin\AppData\Local\Temp\9640.tmp"115⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\96CC.tmp"C:\Users\Admin\AppData\Local\Temp\96CC.tmp"116⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\9778.tmp"C:\Users\Admin\AppData\Local\Temp\9778.tmp"117⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\97E6.tmp"C:\Users\Admin\AppData\Local\Temp\97E6.tmp"118⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\9872.tmp"C:\Users\Admin\AppData\Local\Temp\9872.tmp"119⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\990F.tmp"C:\Users\Admin\AppData\Local\Temp\990F.tmp"120⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\99AB.tmp"C:\Users\Admin\AppData\Local\Temp\99AB.tmp"121⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\9A28.tmp"C:\Users\Admin\AppData\Local\Temp\9A28.tmp"122⤵PID:3300
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-