Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-27_7a288dce0ef56ac45793b649e4aa0145_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-27_7a288dce0ef56ac45793b649e4aa0145_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-27_7a288dce0ef56ac45793b649e4aa0145_mafia_JC.exe
-
Size
488KB
-
MD5
7a288dce0ef56ac45793b649e4aa0145
-
SHA1
e0732aedcf4c01ef3111cf2337a9f7e546663733
-
SHA256
ab77bf0646276ebe3a92322708c1cefdf58ab591de14a4188873c853aade0b41
-
SHA512
8c61be3c9fa84b90cd7a1c3c50bc6919862c078bedb34f4156de54dddd67713c6fecb89d73709052988abe7d12e82ad7696d3f989afde7ed4b47056f3e5dab6e
-
SSDEEP
12288:/U5rCOTeiD5Zxck78178AEcMNoEled5BZOGk3NZ:/UQOJDqkI12jCL5ffk3N
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2824 B536.tmp 4556 B5F2.tmp 4912 B759.tmp 2904 B863.tmp 1424 B8FF.tmp 1148 B9AB.tmp 2772 BA47.tmp 3544 BAF3.tmp 2708 BB8F.tmp 4028 BC3B.tmp 4396 BD16.tmp 5068 C014.tmp 4364 C0B0.tmp 1680 C14C.tmp 1204 C1D9.tmp 4972 C275.tmp 1096 C331.tmp 1192 C459.tmp 3560 C4F6.tmp 3044 C5B1.tmp 3788 C65D.tmp 2948 C6F9.tmp 4104 C7A5.tmp 3876 C841.tmp 616 CB2F.tmp 3344 CC0A.tmp 2864 CCD5.tmp 3296 CD72.tmp 4260 CE3D.tmp 4400 CFB4.tmp 4680 D060.tmp 5060 D12B.tmp 2824 D205.tmp 5000 D292.tmp 1144 D31F.tmp 2208 D438.tmp 2904 D496.tmp 4768 D68A.tmp 2288 D6F7.tmp 3956 D7D2.tmp 2496 D8BC.tmp 220 D949.tmp 4032 D9F5.tmp 2648 DA91.tmp 2508 DB1E.tmp 1996 DBAA.tmp 4724 DC46.tmp 3392 DCF2.tmp 2260 DD9E.tmp 3600 DF06.tmp 1428 DF92.tmp 4980 E03E.tmp 3000 E0BB.tmp 2776 E157.tmp 3772 E1C5.tmp 4268 E242.tmp 4692 E2EE.tmp 4916 E3F7.tmp 3844 E474.tmp 1308 E501.tmp 4852 E57E.tmp 616 E5DC.tmp 2964 E649.tmp 2864 E6D6.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4680 wrote to memory of 2824 4680 2023-08-27_7a288dce0ef56ac45793b649e4aa0145_mafia_JC.exe 87 PID 4680 wrote to memory of 2824 4680 2023-08-27_7a288dce0ef56ac45793b649e4aa0145_mafia_JC.exe 87 PID 4680 wrote to memory of 2824 4680 2023-08-27_7a288dce0ef56ac45793b649e4aa0145_mafia_JC.exe 87 PID 2824 wrote to memory of 4556 2824 B536.tmp 89 PID 2824 wrote to memory of 4556 2824 B536.tmp 89 PID 2824 wrote to memory of 4556 2824 B536.tmp 89 PID 4556 wrote to memory of 4912 4556 B5F2.tmp 90 PID 4556 wrote to memory of 4912 4556 B5F2.tmp 90 PID 4556 wrote to memory of 4912 4556 B5F2.tmp 90 PID 4912 wrote to memory of 2904 4912 B759.tmp 91 PID 4912 wrote to memory of 2904 4912 B759.tmp 91 PID 4912 wrote to memory of 2904 4912 B759.tmp 91 PID 2904 wrote to memory of 1424 2904 B863.tmp 92 PID 2904 wrote to memory of 1424 2904 B863.tmp 92 PID 2904 wrote to memory of 1424 2904 B863.tmp 92 PID 1424 wrote to memory of 1148 1424 B8FF.tmp 93 PID 1424 wrote to memory of 1148 1424 B8FF.tmp 93 PID 1424 wrote to memory of 1148 1424 B8FF.tmp 93 PID 1148 wrote to memory of 2772 1148 B9AB.tmp 94 PID 1148 wrote to memory of 2772 1148 B9AB.tmp 94 PID 1148 wrote to memory of 2772 1148 B9AB.tmp 94 PID 2772 wrote to memory of 3544 2772 BA47.tmp 95 PID 2772 wrote to memory of 3544 2772 BA47.tmp 95 PID 2772 wrote to memory of 3544 2772 BA47.tmp 95 PID 3544 wrote to memory of 2708 3544 BAF3.tmp 96 PID 3544 wrote to memory of 2708 3544 BAF3.tmp 96 PID 3544 wrote to memory of 2708 3544 BAF3.tmp 96 PID 2708 wrote to memory of 4028 2708 BB8F.tmp 97 PID 2708 wrote to memory of 4028 2708 BB8F.tmp 97 PID 2708 wrote to memory of 4028 2708 BB8F.tmp 97 PID 4028 wrote to memory of 4396 4028 BC3B.tmp 98 PID 4028 wrote to memory of 4396 4028 BC3B.tmp 98 PID 4028 wrote to memory of 4396 4028 BC3B.tmp 98 PID 4396 wrote to memory of 5068 4396 BD16.tmp 99 PID 4396 wrote to memory of 5068 4396 BD16.tmp 99 PID 4396 wrote to memory of 5068 4396 BD16.tmp 99 PID 5068 wrote to memory of 4364 5068 C014.tmp 100 PID 5068 wrote to memory of 4364 5068 C014.tmp 100 PID 5068 wrote to memory of 4364 5068 C014.tmp 100 PID 4364 wrote to memory of 1680 4364 C0B0.tmp 102 PID 4364 wrote to memory of 1680 4364 C0B0.tmp 102 PID 4364 wrote to memory of 1680 4364 C0B0.tmp 102 PID 1680 wrote to memory of 1204 1680 C14C.tmp 103 PID 1680 wrote to memory of 1204 1680 C14C.tmp 103 PID 1680 wrote to memory of 1204 1680 C14C.tmp 103 PID 1204 wrote to memory of 4972 1204 C1D9.tmp 104 PID 1204 wrote to memory of 4972 1204 C1D9.tmp 104 PID 1204 wrote to memory of 4972 1204 C1D9.tmp 104 PID 4972 wrote to memory of 1096 4972 C275.tmp 105 PID 4972 wrote to memory of 1096 4972 C275.tmp 105 PID 4972 wrote to memory of 1096 4972 C275.tmp 105 PID 1096 wrote to memory of 1192 1096 C331.tmp 107 PID 1096 wrote to memory of 1192 1096 C331.tmp 107 PID 1096 wrote to memory of 1192 1096 C331.tmp 107 PID 1192 wrote to memory of 3560 1192 C459.tmp 108 PID 1192 wrote to memory of 3560 1192 C459.tmp 108 PID 1192 wrote to memory of 3560 1192 C459.tmp 108 PID 3560 wrote to memory of 3044 3560 C4F6.tmp 111 PID 3560 wrote to memory of 3044 3560 C4F6.tmp 111 PID 3560 wrote to memory of 3044 3560 C4F6.tmp 111 PID 3044 wrote to memory of 3788 3044 C5B1.tmp 112 PID 3044 wrote to memory of 3788 3044 C5B1.tmp 112 PID 3044 wrote to memory of 3788 3044 C5B1.tmp 112 PID 3788 wrote to memory of 2948 3788 C65D.tmp 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-27_7a288dce0ef56ac45793b649e4aa0145_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-27_7a288dce0ef56ac45793b649e4aa0145_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\B536.tmp"C:\Users\Admin\AppData\Local\Temp\B536.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\B5F2.tmp"C:\Users\Admin\AppData\Local\Temp\B5F2.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\B759.tmp"C:\Users\Admin\AppData\Local\Temp\B759.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\B863.tmp"C:\Users\Admin\AppData\Local\Temp\B863.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\B8FF.tmp"C:\Users\Admin\AppData\Local\Temp\B8FF.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\BA47.tmp"C:\Users\Admin\AppData\Local\Temp\BA47.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\BAF3.tmp"C:\Users\Admin\AppData\Local\Temp\BAF3.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"C:\Users\Admin\AppData\Local\Temp\BB8F.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\BD16.tmp"C:\Users\Admin\AppData\Local\Temp\BD16.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\C014.tmp"C:\Users\Admin\AppData\Local\Temp\C014.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\C0B0.tmp"C:\Users\Admin\AppData\Local\Temp\C0B0.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\C14C.tmp"C:\Users\Admin\AppData\Local\Temp\C14C.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\C275.tmp"C:\Users\Admin\AppData\Local\Temp\C275.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\C331.tmp"C:\Users\Admin\AppData\Local\Temp\C331.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\C459.tmp"C:\Users\Admin\AppData\Local\Temp\C459.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"C:\Users\Admin\AppData\Local\Temp\C4F6.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\C5B1.tmp"C:\Users\Admin\AppData\Local\Temp\C5B1.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\C65D.tmp"C:\Users\Admin\AppData\Local\Temp\C65D.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"23⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\C7A5.tmp"C:\Users\Admin\AppData\Local\Temp\C7A5.tmp"24⤵
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\C841.tmp"C:\Users\Admin\AppData\Local\Temp\C841.tmp"25⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"26⤵
- Executes dropped EXE
PID:616 -
C:\Users\Admin\AppData\Local\Temp\CC0A.tmp"C:\Users\Admin\AppData\Local\Temp\CC0A.tmp"27⤵
- Executes dropped EXE
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\CCD5.tmp"C:\Users\Admin\AppData\Local\Temp\CCD5.tmp"28⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\CD72.tmp"C:\Users\Admin\AppData\Local\Temp\CD72.tmp"29⤵
- Executes dropped EXE
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\CE3D.tmp"C:\Users\Admin\AppData\Local\Temp\CE3D.tmp"30⤵
- Executes dropped EXE
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\CFB4.tmp"C:\Users\Admin\AppData\Local\Temp\CFB4.tmp"31⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\D060.tmp"C:\Users\Admin\AppData\Local\Temp\D060.tmp"32⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\D12B.tmp"C:\Users\Admin\AppData\Local\Temp\D12B.tmp"33⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\D205.tmp"C:\Users\Admin\AppData\Local\Temp\D205.tmp"34⤵
- Executes dropped EXE
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\D292.tmp"C:\Users\Admin\AppData\Local\Temp\D292.tmp"35⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\D31F.tmp"C:\Users\Admin\AppData\Local\Temp\D31F.tmp"36⤵
- Executes dropped EXE
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\D438.tmp"C:\Users\Admin\AppData\Local\Temp\D438.tmp"37⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\D496.tmp"C:\Users\Admin\AppData\Local\Temp\D496.tmp"38⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\D68A.tmp"C:\Users\Admin\AppData\Local\Temp\D68A.tmp"39⤵
- Executes dropped EXE
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"C:\Users\Admin\AppData\Local\Temp\D6F7.tmp"40⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"41⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"C:\Users\Admin\AppData\Local\Temp\D8BC.tmp"42⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\D949.tmp"C:\Users\Admin\AppData\Local\Temp\D949.tmp"43⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"C:\Users\Admin\AppData\Local\Temp\D9F5.tmp"44⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\DA91.tmp"C:\Users\Admin\AppData\Local\Temp\DA91.tmp"45⤵
- Executes dropped EXE
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\DB1E.tmp"C:\Users\Admin\AppData\Local\Temp\DB1E.tmp"46⤵
- Executes dropped EXE
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"47⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\DC46.tmp"C:\Users\Admin\AppData\Local\Temp\DC46.tmp"48⤵
- Executes dropped EXE
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\DCF2.tmp"C:\Users\Admin\AppData\Local\Temp\DCF2.tmp"49⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\DD9E.tmp"C:\Users\Admin\AppData\Local\Temp\DD9E.tmp"50⤵
- Executes dropped EXE
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\DF06.tmp"C:\Users\Admin\AppData\Local\Temp\DF06.tmp"51⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\DF92.tmp"C:\Users\Admin\AppData\Local\Temp\DF92.tmp"52⤵
- Executes dropped EXE
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\E03E.tmp"C:\Users\Admin\AppData\Local\Temp\E03E.tmp"53⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"C:\Users\Admin\AppData\Local\Temp\E0BB.tmp"54⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\E157.tmp"C:\Users\Admin\AppData\Local\Temp\E157.tmp"55⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"C:\Users\Admin\AppData\Local\Temp\E1C5.tmp"56⤵
- Executes dropped EXE
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\E242.tmp"C:\Users\Admin\AppData\Local\Temp\E242.tmp"57⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"C:\Users\Admin\AppData\Local\Temp\E2EE.tmp"58⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\E3F7.tmp"C:\Users\Admin\AppData\Local\Temp\E3F7.tmp"59⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\E474.tmp"C:\Users\Admin\AppData\Local\Temp\E474.tmp"60⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\E501.tmp"C:\Users\Admin\AppData\Local\Temp\E501.tmp"61⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\E57E.tmp"C:\Users\Admin\AppData\Local\Temp\E57E.tmp"62⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\E5DC.tmp"C:\Users\Admin\AppData\Local\Temp\E5DC.tmp"63⤵
- Executes dropped EXE
PID:616 -
C:\Users\Admin\AppData\Local\Temp\E649.tmp"C:\Users\Admin\AppData\Local\Temp\E649.tmp"64⤵
- Executes dropped EXE
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\E6D6.tmp"C:\Users\Admin\AppData\Local\Temp\E6D6.tmp"65⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\E762.tmp"C:\Users\Admin\AppData\Local\Temp\E762.tmp"66⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\E956.tmp"C:\Users\Admin\AppData\Local\Temp\E956.tmp"67⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"68⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\EA41.tmp"C:\Users\Admin\AppData\Local\Temp\EA41.tmp"69⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\EABE.tmp"C:\Users\Admin\AppData\Local\Temp\EABE.tmp"70⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"71⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"C:\Users\Admin\AppData\Local\Temp\EBA8.tmp"72⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\EC15.tmp"C:\Users\Admin\AppData\Local\Temp\EC15.tmp"73⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\EC73.tmp"C:\Users\Admin\AppData\Local\Temp\EC73.tmp"74⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\EDAC.tmp"C:\Users\Admin\AppData\Local\Temp\EDAC.tmp"75⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\EE77.tmp"C:\Users\Admin\AppData\Local\Temp\EE77.tmp"76⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\EEF4.tmp"C:\Users\Admin\AppData\Local\Temp\EEF4.tmp"77⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\EF71.tmp"C:\Users\Admin\AppData\Local\Temp\EF71.tmp"78⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\EFDE.tmp"C:\Users\Admin\AppData\Local\Temp\EFDE.tmp"79⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\F06B.tmp"C:\Users\Admin\AppData\Local\Temp\F06B.tmp"80⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\F0F7.tmp"C:\Users\Admin\AppData\Local\Temp\F0F7.tmp"81⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\F184.tmp"C:\Users\Admin\AppData\Local\Temp\F184.tmp"82⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\F220.tmp"C:\Users\Admin\AppData\Local\Temp\F220.tmp"83⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"C:\Users\Admin\AppData\Local\Temp\F2AD.tmp"84⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\F30B.tmp"C:\Users\Admin\AppData\Local\Temp\F30B.tmp"85⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\F388.tmp"C:\Users\Admin\AppData\Local\Temp\F388.tmp"86⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\F414.tmp"C:\Users\Admin\AppData\Local\Temp\F414.tmp"87⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\F482.tmp"C:\Users\Admin\AppData\Local\Temp\F482.tmp"88⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\F50E.tmp"C:\Users\Admin\AppData\Local\Temp\F50E.tmp"89⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\F5AA.tmp"C:\Users\Admin\AppData\Local\Temp\F5AA.tmp"90⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\F637.tmp"C:\Users\Admin\AppData\Local\Temp\F637.tmp"91⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"C:\Users\Admin\AppData\Local\Temp\F6E3.tmp"92⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\F750.tmp"C:\Users\Admin\AppData\Local\Temp\F750.tmp"93⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\F82B.tmp"C:\Users\Admin\AppData\Local\Temp\F82B.tmp"94⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\F8B8.tmp"C:\Users\Admin\AppData\Local\Temp\F8B8.tmp"95⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\F973.tmp"C:\Users\Admin\AppData\Local\Temp\F973.tmp"96⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"97⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\FABB.tmp"C:\Users\Admin\AppData\Local\Temp\FABB.tmp"98⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\FB29.tmp"C:\Users\Admin\AppData\Local\Temp\FB29.tmp"99⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"C:\Users\Admin\AppData\Local\Temp\FBB5.tmp"100⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"101⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"102⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"C:\Users\Admin\AppData\Local\Temp\FD6B.tmp"103⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"C:\Users\Admin\AppData\Local\Temp\FFDC.tmp"104⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\68.tmp"C:\Users\Admin\AppData\Local\Temp\68.tmp"105⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\E5.tmp"C:\Users\Admin\AppData\Local\Temp\E5.tmp"106⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\182.tmp"C:\Users\Admin\AppData\Local\Temp\182.tmp"107⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\1FF.tmp"C:\Users\Admin\AppData\Local\Temp\1FF.tmp"108⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\28B.tmp"C:\Users\Admin\AppData\Local\Temp\28B.tmp"109⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\318.tmp"C:\Users\Admin\AppData\Local\Temp\318.tmp"110⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\402.tmp"C:\Users\Admin\AppData\Local\Temp\402.tmp"111⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\49F.tmp"C:\Users\Admin\AppData\Local\Temp\49F.tmp"112⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\52B.tmp"C:\Users\Admin\AppData\Local\Temp\52B.tmp"113⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\5C7.tmp"C:\Users\Admin\AppData\Local\Temp\5C7.tmp"114⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\664.tmp"C:\Users\Admin\AppData\Local\Temp\664.tmp"115⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\710.tmp"C:\Users\Admin\AppData\Local\Temp\710.tmp"116⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\7BB.tmp"C:\Users\Admin\AppData\Local\Temp\7BB.tmp"117⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\848.tmp"C:\Users\Admin\AppData\Local\Temp\848.tmp"118⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\932.tmp"C:\Users\Admin\AppData\Local\Temp\932.tmp"119⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\9CF.tmp"C:\Users\Admin\AppData\Local\Temp\9CF.tmp"120⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\A7B.tmp"C:\Users\Admin\AppData\Local\Temp\A7B.tmp"121⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\AF8.tmp"C:\Users\Admin\AppData\Local\Temp\AF8.tmp"122⤵PID:4536
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-