Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-27_70672934472ce4b47b1f596c4958cbae_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-27_70672934472ce4b47b1f596c4958cbae_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-27_70672934472ce4b47b1f596c4958cbae_mafia_JC.exe
-
Size
486KB
-
MD5
70672934472ce4b47b1f596c4958cbae
-
SHA1
1d358286b6c559e44f49f4558dcb461271baaa79
-
SHA256
3b786474ef3623fd74d5c9860269d92befe4f2b77630fb611b0219b8701ff2ff
-
SHA512
584cf022c7bac0b1615d75b82dcb46c903094338d6143c4e4b6d0d88bc14196822e18d13eb2650b5b80362d24693580e5ffe93538b1f8ffbb35c671e38ed8cc3
-
SSDEEP
6144:Forf3lPvovsgZnqG2C7mOTeiLfD72ovH1S6HuOw7PtjNdDx0TyrZ3u2k2sH3dZ:UU5rCOTeiDmnOwR7WmR0HNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4464 D7E1.tmp 1256 D8DB.tmp 2868 D9A7.tmp 3980 DA52.tmp 4972 DADF.tmp 1336 DBBA.tmp 3752 DC85.tmp 1772 DD12.tmp 528 DDBD.tmp 4492 DE69.tmp 1724 DF15.tmp 2824 DFB1.tmp 4712 E02E.tmp 1624 EA50.tmp 1432 EB0C.tmp 4808 EBA8.tmp 1876 EC63.tmp 4092 ED0F.tmp 3704 EDCB.tmp 896 EE77.tmp 4532 EF23.tmp 3040 EFFD.tmp 3236 F0C8.tmp 2872 F1C2.tmp 4336 F2BC.tmp 736 F378.tmp 4104 F3F5.tmp 1296 F4B0.tmp 4196 F53D.tmp 3608 F618.tmp 224 F721.tmp 180 F80C.tmp 3368 F879.tmp 4504 F935.tmp 3384 F9A2.tmp 1572 FA00.tmp 3772 FA7D.tmp 3352 FB09.tmp 3036 FB86.tmp 4460 FBF4.tmp 4972 FC71.tmp 2688 FCFD.tmp 3208 FD7A.tmp 3872 FE26.tmp 4964 FEF1.tmp 3752 B.tmp 3288 78.tmp 872 182.tmp 2972 1FF.tmp 2372 308.tmp 684 3B4.tmp 2808 441.tmp 3336 4AE.tmp 452 53B.tmp 4488 5F6.tmp 4712 6B2.tmp 1476 78D.tmp 2880 829.tmp 404 8B5.tmp 4808 932.tmp 5028 9CF.tmp 5032 A9A.tmp 4092 B36.tmp 2136 C7E.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 4464 4564 2023-08-27_70672934472ce4b47b1f596c4958cbae_mafia_JC.exe 83 PID 4564 wrote to memory of 4464 4564 2023-08-27_70672934472ce4b47b1f596c4958cbae_mafia_JC.exe 83 PID 4564 wrote to memory of 4464 4564 2023-08-27_70672934472ce4b47b1f596c4958cbae_mafia_JC.exe 83 PID 4464 wrote to memory of 1256 4464 D7E1.tmp 85 PID 4464 wrote to memory of 1256 4464 D7E1.tmp 85 PID 4464 wrote to memory of 1256 4464 D7E1.tmp 85 PID 1256 wrote to memory of 2868 1256 D8DB.tmp 86 PID 1256 wrote to memory of 2868 1256 D8DB.tmp 86 PID 1256 wrote to memory of 2868 1256 D8DB.tmp 86 PID 2868 wrote to memory of 3980 2868 D9A7.tmp 87 PID 2868 wrote to memory of 3980 2868 D9A7.tmp 87 PID 2868 wrote to memory of 3980 2868 D9A7.tmp 87 PID 3980 wrote to memory of 4972 3980 DA52.tmp 88 PID 3980 wrote to memory of 4972 3980 DA52.tmp 88 PID 3980 wrote to memory of 4972 3980 DA52.tmp 88 PID 4972 wrote to memory of 1336 4972 DADF.tmp 90 PID 4972 wrote to memory of 1336 4972 DADF.tmp 90 PID 4972 wrote to memory of 1336 4972 DADF.tmp 90 PID 1336 wrote to memory of 3752 1336 DBBA.tmp 91 PID 1336 wrote to memory of 3752 1336 DBBA.tmp 91 PID 1336 wrote to memory of 3752 1336 DBBA.tmp 91 PID 3752 wrote to memory of 1772 3752 DC85.tmp 92 PID 3752 wrote to memory of 1772 3752 DC85.tmp 92 PID 3752 wrote to memory of 1772 3752 DC85.tmp 92 PID 1772 wrote to memory of 528 1772 DD12.tmp 93 PID 1772 wrote to memory of 528 1772 DD12.tmp 93 PID 1772 wrote to memory of 528 1772 DD12.tmp 93 PID 528 wrote to memory of 4492 528 DDBD.tmp 94 PID 528 wrote to memory of 4492 528 DDBD.tmp 94 PID 528 wrote to memory of 4492 528 DDBD.tmp 94 PID 4492 wrote to memory of 1724 4492 DE69.tmp 95 PID 4492 wrote to memory of 1724 4492 DE69.tmp 95 PID 4492 wrote to memory of 1724 4492 DE69.tmp 95 PID 1724 wrote to memory of 2824 1724 DF15.tmp 96 PID 1724 wrote to memory of 2824 1724 DF15.tmp 96 PID 1724 wrote to memory of 2824 1724 DF15.tmp 96 PID 2824 wrote to memory of 4712 2824 DFB1.tmp 97 PID 2824 wrote to memory of 4712 2824 DFB1.tmp 97 PID 2824 wrote to memory of 4712 2824 DFB1.tmp 97 PID 4712 wrote to memory of 1624 4712 E02E.tmp 98 PID 4712 wrote to memory of 1624 4712 E02E.tmp 98 PID 4712 wrote to memory of 1624 4712 E02E.tmp 98 PID 1624 wrote to memory of 1432 1624 EA50.tmp 99 PID 1624 wrote to memory of 1432 1624 EA50.tmp 99 PID 1624 wrote to memory of 1432 1624 EA50.tmp 99 PID 1432 wrote to memory of 4808 1432 EB0C.tmp 100 PID 1432 wrote to memory of 4808 1432 EB0C.tmp 100 PID 1432 wrote to memory of 4808 1432 EB0C.tmp 100 PID 4808 wrote to memory of 1876 4808 EBA8.tmp 101 PID 4808 wrote to memory of 1876 4808 EBA8.tmp 101 PID 4808 wrote to memory of 1876 4808 EBA8.tmp 101 PID 1876 wrote to memory of 4092 1876 EC63.tmp 102 PID 1876 wrote to memory of 4092 1876 EC63.tmp 102 PID 1876 wrote to memory of 4092 1876 EC63.tmp 102 PID 4092 wrote to memory of 3704 4092 ED0F.tmp 103 PID 4092 wrote to memory of 3704 4092 ED0F.tmp 103 PID 4092 wrote to memory of 3704 4092 ED0F.tmp 103 PID 3704 wrote to memory of 896 3704 EDCB.tmp 104 PID 3704 wrote to memory of 896 3704 EDCB.tmp 104 PID 3704 wrote to memory of 896 3704 EDCB.tmp 104 PID 896 wrote to memory of 4532 896 EE77.tmp 105 PID 896 wrote to memory of 4532 896 EE77.tmp 105 PID 896 wrote to memory of 4532 896 EE77.tmp 105 PID 4532 wrote to memory of 3040 4532 EF23.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-27_70672934472ce4b47b1f596c4958cbae_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-27_70672934472ce4b47b1f596c4958cbae_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"C:\Users\Admin\AppData\Local\Temp\D7E1.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\D9A7.tmp"C:\Users\Admin\AppData\Local\Temp\D9A7.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\DA52.tmp"C:\Users\Admin\AppData\Local\Temp\DA52.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\DADF.tmp"C:\Users\Admin\AppData\Local\Temp\DADF.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\DC85.tmp"C:\Users\Admin\AppData\Local\Temp\DC85.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\DD12.tmp"C:\Users\Admin\AppData\Local\Temp\DD12.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"C:\Users\Admin\AppData\Local\Temp\DDBD.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\DE69.tmp"C:\Users\Admin\AppData\Local\Temp\DE69.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\DF15.tmp"C:\Users\Admin\AppData\Local\Temp\DF15.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\DFB1.tmp"C:\Users\Admin\AppData\Local\Temp\DFB1.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\E02E.tmp"C:\Users\Admin\AppData\Local\Temp\E02E.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\EA50.tmp"C:\Users\Admin\AppData\Local\Temp\EA50.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\EC63.tmp"C:\Users\Admin\AppData\Local\Temp\EC63.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\ED0F.tmp"C:\Users\Admin\AppData\Local\Temp\ED0F.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\EE77.tmp"C:\Users\Admin\AppData\Local\Temp\EE77.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\EF23.tmp"C:\Users\Admin\AppData\Local\Temp\EF23.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"23⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"24⤵
- Executes dropped EXE
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\F1C2.tmp"C:\Users\Admin\AppData\Local\Temp\F1C2.tmp"25⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\F2BC.tmp"C:\Users\Admin\AppData\Local\Temp\F2BC.tmp"26⤵
- Executes dropped EXE
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\F378.tmp"C:\Users\Admin\AppData\Local\Temp\F378.tmp"27⤵
- Executes dropped EXE
PID:736 -
C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"C:\Users\Admin\AppData\Local\Temp\F3F5.tmp"28⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"29⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\F53D.tmp"C:\Users\Admin\AppData\Local\Temp\F53D.tmp"30⤵
- Executes dropped EXE
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\F618.tmp"C:\Users\Admin\AppData\Local\Temp\F618.tmp"31⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\F721.tmp"C:\Users\Admin\AppData\Local\Temp\F721.tmp"32⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\F80C.tmp"C:\Users\Admin\AppData\Local\Temp\F80C.tmp"33⤵
- Executes dropped EXE
PID:180 -
C:\Users\Admin\AppData\Local\Temp\F879.tmp"C:\Users\Admin\AppData\Local\Temp\F879.tmp"34⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\F935.tmp"C:\Users\Admin\AppData\Local\Temp\F935.tmp"35⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"36⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\FA00.tmp"C:\Users\Admin\AppData\Local\Temp\FA00.tmp"37⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\FA7D.tmp"C:\Users\Admin\AppData\Local\Temp\FA7D.tmp"38⤵
- Executes dropped EXE
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\FB09.tmp"C:\Users\Admin\AppData\Local\Temp\FB09.tmp"39⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\FB86.tmp"C:\Users\Admin\AppData\Local\Temp\FB86.tmp"40⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\FBF4.tmp"C:\Users\Admin\AppData\Local\Temp\FBF4.tmp"41⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\FC71.tmp"C:\Users\Admin\AppData\Local\Temp\FC71.tmp"42⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"43⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\FD7A.tmp"C:\Users\Admin\AppData\Local\Temp\FD7A.tmp"44⤵
- Executes dropped EXE
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\FE26.tmp"C:\Users\Admin\AppData\Local\Temp\FE26.tmp"45⤵
- Executes dropped EXE
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\FEF1.tmp"C:\Users\Admin\AppData\Local\Temp\FEF1.tmp"46⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\B.tmp"C:\Users\Admin\AppData\Local\Temp\B.tmp"47⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\78.tmp"C:\Users\Admin\AppData\Local\Temp\78.tmp"48⤵
- Executes dropped EXE
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\182.tmp"C:\Users\Admin\AppData\Local\Temp\182.tmp"49⤵
- Executes dropped EXE
PID:872 -
C:\Users\Admin\AppData\Local\Temp\1FF.tmp"C:\Users\Admin\AppData\Local\Temp\1FF.tmp"50⤵
- Executes dropped EXE
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\308.tmp"C:\Users\Admin\AppData\Local\Temp\308.tmp"51⤵
- Executes dropped EXE
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\3B4.tmp"C:\Users\Admin\AppData\Local\Temp\3B4.tmp"52⤵
- Executes dropped EXE
PID:684 -
C:\Users\Admin\AppData\Local\Temp\441.tmp"C:\Users\Admin\AppData\Local\Temp\441.tmp"53⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\4AE.tmp"C:\Users\Admin\AppData\Local\Temp\4AE.tmp"54⤵
- Executes dropped EXE
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\53B.tmp"C:\Users\Admin\AppData\Local\Temp\53B.tmp"55⤵
- Executes dropped EXE
PID:452 -
C:\Users\Admin\AppData\Local\Temp\5F6.tmp"C:\Users\Admin\AppData\Local\Temp\5F6.tmp"56⤵
- Executes dropped EXE
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"57⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\78D.tmp"C:\Users\Admin\AppData\Local\Temp\78D.tmp"58⤵
- Executes dropped EXE
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\829.tmp"C:\Users\Admin\AppData\Local\Temp\829.tmp"59⤵
- Executes dropped EXE
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\8B5.tmp"C:\Users\Admin\AppData\Local\Temp\8B5.tmp"60⤵
- Executes dropped EXE
PID:404 -
C:\Users\Admin\AppData\Local\Temp\932.tmp"C:\Users\Admin\AppData\Local\Temp\932.tmp"61⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\9CF.tmp"C:\Users\Admin\AppData\Local\Temp\9CF.tmp"62⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\A9A.tmp"C:\Users\Admin\AppData\Local\Temp\A9A.tmp"63⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\B36.tmp"C:\Users\Admin\AppData\Local\Temp\B36.tmp"64⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\C7E.tmp"C:\Users\Admin\AppData\Local\Temp\C7E.tmp"65⤵
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\D1A.tmp"C:\Users\Admin\AppData\Local\Temp\D1A.tmp"66⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\D97.tmp"C:\Users\Admin\AppData\Local\Temp\D97.tmp"67⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\E14.tmp"C:\Users\Admin\AppData\Local\Temp\E14.tmp"68⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\ED0.tmp"C:\Users\Admin\AppData\Local\Temp\ED0.tmp"69⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\F5D.tmp"C:\Users\Admin\AppData\Local\Temp\F5D.tmp"70⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\FF9.tmp"C:\Users\Admin\AppData\Local\Temp\FF9.tmp"71⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\10A5.tmp"C:\Users\Admin\AppData\Local\Temp\10A5.tmp"72⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\1122.tmp"C:\Users\Admin\AppData\Local\Temp\1122.tmp"73⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\118F.tmp"C:\Users\Admin\AppData\Local\Temp\118F.tmp"74⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\121C.tmp"C:\Users\Admin\AppData\Local\Temp\121C.tmp"75⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\1289.tmp"C:\Users\Admin\AppData\Local\Temp\1289.tmp"76⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\12F6.tmp"C:\Users\Admin\AppData\Local\Temp\12F6.tmp"77⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\1373.tmp"C:\Users\Admin\AppData\Local\Temp\1373.tmp"78⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\1410.tmp"C:\Users\Admin\AppData\Local\Temp\1410.tmp"79⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\148D.tmp"C:\Users\Admin\AppData\Local\Temp\148D.tmp"80⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\1519.tmp"C:\Users\Admin\AppData\Local\Temp\1519.tmp"81⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\1596.tmp"C:\Users\Admin\AppData\Local\Temp\1596.tmp"82⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\1604.tmp"C:\Users\Admin\AppData\Local\Temp\1604.tmp"83⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\16B0.tmp"C:\Users\Admin\AppData\Local\Temp\16B0.tmp"84⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\175B.tmp"C:\Users\Admin\AppData\Local\Temp\175B.tmp"85⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\17D8.tmp"C:\Users\Admin\AppData\Local\Temp\17D8.tmp"86⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\1894.tmp"C:\Users\Admin\AppData\Local\Temp\1894.tmp"87⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\198E.tmp"C:\Users\Admin\AppData\Local\Temp\198E.tmp"88⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\1A2A.tmp"C:\Users\Admin\AppData\Local\Temp\1A2A.tmp"89⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\1A98.tmp"C:\Users\Admin\AppData\Local\Temp\1A98.tmp"90⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\1B15.tmp"C:\Users\Admin\AppData\Local\Temp\1B15.tmp"91⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\1BA1.tmp"C:\Users\Admin\AppData\Local\Temp\1BA1.tmp"92⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\1C3D.tmp"C:\Users\Admin\AppData\Local\Temp\1C3D.tmp"93⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\1CDA.tmp"C:\Users\Admin\AppData\Local\Temp\1CDA.tmp"94⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\1D66.tmp"C:\Users\Admin\AppData\Local\Temp\1D66.tmp"95⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\1DC4.tmp"C:\Users\Admin\AppData\Local\Temp\1DC4.tmp"96⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\1E41.tmp"C:\Users\Admin\AppData\Local\Temp\1E41.tmp"97⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\1EDD.tmp"C:\Users\Admin\AppData\Local\Temp\1EDD.tmp"98⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\1F4B.tmp"C:\Users\Admin\AppData\Local\Temp\1F4B.tmp"99⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"100⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\2045.tmp"C:\Users\Admin\AppData\Local\Temp\2045.tmp"101⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\20E1.tmp"C:\Users\Admin\AppData\Local\Temp\20E1.tmp"102⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\217D.tmp"C:\Users\Admin\AppData\Local\Temp\217D.tmp"103⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\2229.tmp"C:\Users\Admin\AppData\Local\Temp\2229.tmp"104⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\22C5.tmp"C:\Users\Admin\AppData\Local\Temp\22C5.tmp"105⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\2371.tmp"C:\Users\Admin\AppData\Local\Temp\2371.tmp"106⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\23DF.tmp"C:\Users\Admin\AppData\Local\Temp\23DF.tmp"107⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\246B.tmp"C:\Users\Admin\AppData\Local\Temp\246B.tmp"108⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\2517.tmp"C:\Users\Admin\AppData\Local\Temp\2517.tmp"109⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\25A4.tmp"C:\Users\Admin\AppData\Local\Temp\25A4.tmp"110⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\2650.tmp"C:\Users\Admin\AppData\Local\Temp\2650.tmp"111⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\26FB.tmp"C:\Users\Admin\AppData\Local\Temp\26FB.tmp"112⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\2788.tmp"C:\Users\Admin\AppData\Local\Temp\2788.tmp"113⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\2805.tmp"C:\Users\Admin\AppData\Local\Temp\2805.tmp"114⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\28C1.tmp"C:\Users\Admin\AppData\Local\Temp\28C1.tmp"115⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\295D.tmp"C:\Users\Admin\AppData\Local\Temp\295D.tmp"116⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\29F9.tmp"C:\Users\Admin\AppData\Local\Temp\29F9.tmp"117⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2A95.tmp"C:\Users\Admin\AppData\Local\Temp\2A95.tmp"118⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\2B41.tmp"C:\Users\Admin\AppData\Local\Temp\2B41.tmp"119⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"120⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\2CB8.tmp"C:\Users\Admin\AppData\Local\Temp\2CB8.tmp"121⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\2D45.tmp"C:\Users\Admin\AppData\Local\Temp\2D45.tmp"122⤵PID:1812
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-