Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_e8c9082ea1f2279179ea5618fd1b9f82_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_e8c9082ea1f2279179ea5618fd1b9f82_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_e8c9082ea1f2279179ea5618fd1b9f82_mafia_JC.exe
-
Size
486KB
-
MD5
e8c9082ea1f2279179ea5618fd1b9f82
-
SHA1
dcabd498c399b4777b9b7e0ab123c4c7054f1991
-
SHA256
b4258c4737e1c148d167e924465d919d6506e9dd29c7448b4fae6ddeeb31062d
-
SHA512
34e18ee093e5e1f713063ebbc8c1a9835eb382925908871c2bcd676672ea1e7bd968b05cfc435ae4c740c2bf8874577c7dceac48f87a1fa63b199edb5b6953b7
-
SSDEEP
6144:Forf3lPvovsgZnqG2C7mOTeiLfD7/Rw1CmEqjpaNKLNsR8X5bwR3WKAKQYLMVsHT:UU5rCOTeiD8/VwKLNF5bwR3WKA9GJNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4488 E84D.tmp 3040 E975.tmp 2200 EA41.tmp 1144 EB0C.tmp 1624 EBD7.tmp 3652 EC63.tmp 1984 ED6D.tmp 4956 EE09.tmp 3356 EEC5.tmp 1448 EF51.tmp 900 EFDE.tmp 2172 F07A.tmp 1560 F388.tmp 1740 F424.tmp 1812 F4C0.tmp 3244 F55C.tmp 1636 F5D9.tmp 1480 E34.tmp 2568 EC0.tmp 1660 F2E.tmp 2440 266F.tmp 1120 2B32.tmp 4040 36CA.tmp 432 3AD2.tmp 3452 3B3F.tmp 4844 3BFA.tmp 3740 3CE5.tmp 2236 4503.tmp 1196 4C37.tmp 4468 4D11.tmp 4780 4F05.tmp 4840 4FD1.tmp 1364 504E.tmp 1068 6E36.tmp 3752 7153.tmp 1476 71C0.tmp 4456 721E.tmp 3380 727C.tmp 1152 72F9.tmp 2456 8047.tmp 4224 822B.tmp 3660 8289.tmp 4312 8354.tmp 3200 847D.tmp 5108 85A6.tmp 4112 86FE.tmp 1192 87F8.tmp 4820 88D2.tmp 4772 897E.tmp 1080 8A3A.tmp 3580 8B05.tmp 3824 8BA1.tmp 4724 8C3D.tmp 4532 8D28.tmp 1532 8E02.tmp 4040 8EAE.tmp 2960 8F2B.tmp 448 8FB8.tmp 4984 9054.tmp 4412 911F.tmp 2196 91EA.tmp 2144 9248.tmp 1196 92F4.tmp 1624 93FE.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 4488 2196 2023-08-26_e8c9082ea1f2279179ea5618fd1b9f82_mafia_JC.exe 86 PID 2196 wrote to memory of 4488 2196 2023-08-26_e8c9082ea1f2279179ea5618fd1b9f82_mafia_JC.exe 86 PID 2196 wrote to memory of 4488 2196 2023-08-26_e8c9082ea1f2279179ea5618fd1b9f82_mafia_JC.exe 86 PID 4488 wrote to memory of 3040 4488 E84D.tmp 87 PID 4488 wrote to memory of 3040 4488 E84D.tmp 87 PID 4488 wrote to memory of 3040 4488 E84D.tmp 87 PID 3040 wrote to memory of 2200 3040 E975.tmp 88 PID 3040 wrote to memory of 2200 3040 E975.tmp 88 PID 3040 wrote to memory of 2200 3040 E975.tmp 88 PID 2200 wrote to memory of 1144 2200 EA41.tmp 89 PID 2200 wrote to memory of 1144 2200 EA41.tmp 89 PID 2200 wrote to memory of 1144 2200 EA41.tmp 89 PID 1144 wrote to memory of 1624 1144 EB0C.tmp 90 PID 1144 wrote to memory of 1624 1144 EB0C.tmp 90 PID 1144 wrote to memory of 1624 1144 EB0C.tmp 90 PID 1624 wrote to memory of 3652 1624 EBD7.tmp 92 PID 1624 wrote to memory of 3652 1624 EBD7.tmp 92 PID 1624 wrote to memory of 3652 1624 EBD7.tmp 92 PID 3652 wrote to memory of 1984 3652 EC63.tmp 93 PID 3652 wrote to memory of 1984 3652 EC63.tmp 93 PID 3652 wrote to memory of 1984 3652 EC63.tmp 93 PID 1984 wrote to memory of 4956 1984 ED6D.tmp 94 PID 1984 wrote to memory of 4956 1984 ED6D.tmp 94 PID 1984 wrote to memory of 4956 1984 ED6D.tmp 94 PID 4956 wrote to memory of 3356 4956 EE09.tmp 95 PID 4956 wrote to memory of 3356 4956 EE09.tmp 95 PID 4956 wrote to memory of 3356 4956 EE09.tmp 95 PID 3356 wrote to memory of 1448 3356 EEC5.tmp 96 PID 3356 wrote to memory of 1448 3356 EEC5.tmp 96 PID 3356 wrote to memory of 1448 3356 EEC5.tmp 96 PID 1448 wrote to memory of 900 1448 EF51.tmp 97 PID 1448 wrote to memory of 900 1448 EF51.tmp 97 PID 1448 wrote to memory of 900 1448 EF51.tmp 97 PID 900 wrote to memory of 2172 900 EFDE.tmp 98 PID 900 wrote to memory of 2172 900 EFDE.tmp 98 PID 900 wrote to memory of 2172 900 EFDE.tmp 98 PID 2172 wrote to memory of 1560 2172 F07A.tmp 99 PID 2172 wrote to memory of 1560 2172 F07A.tmp 99 PID 2172 wrote to memory of 1560 2172 F07A.tmp 99 PID 1560 wrote to memory of 1740 1560 F388.tmp 100 PID 1560 wrote to memory of 1740 1560 F388.tmp 100 PID 1560 wrote to memory of 1740 1560 F388.tmp 100 PID 1740 wrote to memory of 1812 1740 F424.tmp 101 PID 1740 wrote to memory of 1812 1740 F424.tmp 101 PID 1740 wrote to memory of 1812 1740 F424.tmp 101 PID 1812 wrote to memory of 3244 1812 F4C0.tmp 102 PID 1812 wrote to memory of 3244 1812 F4C0.tmp 102 PID 1812 wrote to memory of 3244 1812 F4C0.tmp 102 PID 3244 wrote to memory of 1636 3244 F55C.tmp 103 PID 3244 wrote to memory of 1636 3244 F55C.tmp 103 PID 3244 wrote to memory of 1636 3244 F55C.tmp 103 PID 1636 wrote to memory of 1480 1636 F5D9.tmp 104 PID 1636 wrote to memory of 1480 1636 F5D9.tmp 104 PID 1636 wrote to memory of 1480 1636 F5D9.tmp 104 PID 1480 wrote to memory of 2568 1480 E34.tmp 105 PID 1480 wrote to memory of 2568 1480 E34.tmp 105 PID 1480 wrote to memory of 2568 1480 E34.tmp 105 PID 2568 wrote to memory of 1660 2568 EC0.tmp 108 PID 2568 wrote to memory of 1660 2568 EC0.tmp 108 PID 2568 wrote to memory of 1660 2568 EC0.tmp 108 PID 1660 wrote to memory of 2440 1660 F2E.tmp 109 PID 1660 wrote to memory of 2440 1660 F2E.tmp 109 PID 1660 wrote to memory of 2440 1660 F2E.tmp 109 PID 2440 wrote to memory of 1120 2440 266F.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_e8c9082ea1f2279179ea5618fd1b9f82_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_e8c9082ea1f2279179ea5618fd1b9f82_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\E84D.tmp"C:\Users\Admin\AppData\Local\Temp\E84D.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\E975.tmp"C:\Users\Admin\AppData\Local\Temp\E975.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\EA41.tmp"C:\Users\Admin\AppData\Local\Temp\EA41.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"C:\Users\Admin\AppData\Local\Temp\EB0C.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"C:\Users\Admin\AppData\Local\Temp\EBD7.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\EC63.tmp"C:\Users\Admin\AppData\Local\Temp\EC63.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\EE09.tmp"C:\Users\Admin\AppData\Local\Temp\EE09.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\EEC5.tmp"C:\Users\Admin\AppData\Local\Temp\EEC5.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\EF51.tmp"C:\Users\Admin\AppData\Local\Temp\EF51.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\EFDE.tmp"C:\Users\Admin\AppData\Local\Temp\EFDE.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\F07A.tmp"C:\Users\Admin\AppData\Local\Temp\F07A.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\F388.tmp"C:\Users\Admin\AppData\Local\Temp\F388.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\F424.tmp"C:\Users\Admin\AppData\Local\Temp\F424.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\F4C0.tmp"C:\Users\Admin\AppData\Local\Temp\F4C0.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\F55C.tmp"C:\Users\Admin\AppData\Local\Temp\F55C.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\F5D9.tmp"C:\Users\Admin\AppData\Local\Temp\F5D9.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\E34.tmp"C:\Users\Admin\AppData\Local\Temp\E34.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\EC0.tmp"C:\Users\Admin\AppData\Local\Temp\EC0.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\F2E.tmp"C:\Users\Admin\AppData\Local\Temp\F2E.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\266F.tmp"C:\Users\Admin\AppData\Local\Temp\266F.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\2B32.tmp"C:\Users\Admin\AppData\Local\Temp\2B32.tmp"23⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\36CA.tmp"C:\Users\Admin\AppData\Local\Temp\36CA.tmp"24⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\3AD2.tmp"C:\Users\Admin\AppData\Local\Temp\3AD2.tmp"25⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"26⤵
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\3BFA.tmp"C:\Users\Admin\AppData\Local\Temp\3BFA.tmp"27⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"28⤵
- Executes dropped EXE
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\4503.tmp"C:\Users\Admin\AppData\Local\Temp\4503.tmp"29⤵
- Executes dropped EXE
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\4C37.tmp"C:\Users\Admin\AppData\Local\Temp\4C37.tmp"30⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\4D11.tmp"C:\Users\Admin\AppData\Local\Temp\4D11.tmp"31⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\4F05.tmp"C:\Users\Admin\AppData\Local\Temp\4F05.tmp"32⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"C:\Users\Admin\AppData\Local\Temp\4FD1.tmp"33⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\504E.tmp"C:\Users\Admin\AppData\Local\Temp\504E.tmp"34⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\6E36.tmp"C:\Users\Admin\AppData\Local\Temp\6E36.tmp"35⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\7153.tmp"C:\Users\Admin\AppData\Local\Temp\7153.tmp"36⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\71C0.tmp"C:\Users\Admin\AppData\Local\Temp\71C0.tmp"37⤵
- Executes dropped EXE
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\721E.tmp"C:\Users\Admin\AppData\Local\Temp\721E.tmp"38⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\727C.tmp"C:\Users\Admin\AppData\Local\Temp\727C.tmp"39⤵
- Executes dropped EXE
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\72F9.tmp"C:\Users\Admin\AppData\Local\Temp\72F9.tmp"40⤵
- Executes dropped EXE
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\8047.tmp"C:\Users\Admin\AppData\Local\Temp\8047.tmp"41⤵
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\822B.tmp"C:\Users\Admin\AppData\Local\Temp\822B.tmp"42⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\8289.tmp"C:\Users\Admin\AppData\Local\Temp\8289.tmp"43⤵
- Executes dropped EXE
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\8354.tmp"C:\Users\Admin\AppData\Local\Temp\8354.tmp"44⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\847D.tmp"C:\Users\Admin\AppData\Local\Temp\847D.tmp"45⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\85A6.tmp"C:\Users\Admin\AppData\Local\Temp\85A6.tmp"46⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\86FE.tmp"C:\Users\Admin\AppData\Local\Temp\86FE.tmp"47⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\87F8.tmp"C:\Users\Admin\AppData\Local\Temp\87F8.tmp"48⤵
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\88D2.tmp"C:\Users\Admin\AppData\Local\Temp\88D2.tmp"49⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\897E.tmp"C:\Users\Admin\AppData\Local\Temp\897E.tmp"50⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\8A3A.tmp"C:\Users\Admin\AppData\Local\Temp\8A3A.tmp"51⤵
- Executes dropped EXE
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\8B05.tmp"C:\Users\Admin\AppData\Local\Temp\8B05.tmp"52⤵
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\8BA1.tmp"C:\Users\Admin\AppData\Local\Temp\8BA1.tmp"53⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\8C3D.tmp"C:\Users\Admin\AppData\Local\Temp\8C3D.tmp"54⤵
- Executes dropped EXE
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\8D28.tmp"C:\Users\Admin\AppData\Local\Temp\8D28.tmp"55⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\8E02.tmp"C:\Users\Admin\AppData\Local\Temp\8E02.tmp"56⤵
- Executes dropped EXE
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\8EAE.tmp"C:\Users\Admin\AppData\Local\Temp\8EAE.tmp"57⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\8F2B.tmp"C:\Users\Admin\AppData\Local\Temp\8F2B.tmp"58⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\8FB8.tmp"C:\Users\Admin\AppData\Local\Temp\8FB8.tmp"59⤵
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\9054.tmp"C:\Users\Admin\AppData\Local\Temp\9054.tmp"60⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\911F.tmp"C:\Users\Admin\AppData\Local\Temp\911F.tmp"61⤵
- Executes dropped EXE
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\91EA.tmp"C:\Users\Admin\AppData\Local\Temp\91EA.tmp"62⤵
- Executes dropped EXE
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\9248.tmp"C:\Users\Admin\AppData\Local\Temp\9248.tmp"63⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\92F4.tmp"C:\Users\Admin\AppData\Local\Temp\92F4.tmp"64⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\93FE.tmp"C:\Users\Admin\AppData\Local\Temp\93FE.tmp"65⤵
- Executes dropped EXE
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\949A.tmp"C:\Users\Admin\AppData\Local\Temp\949A.tmp"66⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\9546.tmp"C:\Users\Admin\AppData\Local\Temp\9546.tmp"67⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\965F.tmp"C:\Users\Admin\AppData\Local\Temp\965F.tmp"68⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\96BD.tmp"C:\Users\Admin\AppData\Local\Temp\96BD.tmp"69⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\973A.tmp"C:\Users\Admin\AppData\Local\Temp\973A.tmp"70⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\9798.tmp"C:\Users\Admin\AppData\Local\Temp\9798.tmp"71⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\9815.tmp"C:\Users\Admin\AppData\Local\Temp\9815.tmp"72⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\9892.tmp"C:\Users\Admin\AppData\Local\Temp\9892.tmp"73⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\993D.tmp"C:\Users\Admin\AppData\Local\Temp\993D.tmp"74⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\99DA.tmp"C:\Users\Admin\AppData\Local\Temp\99DA.tmp"75⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\9A37.tmp"C:\Users\Admin\AppData\Local\Temp\9A37.tmp"76⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\9B51.tmp"C:\Users\Admin\AppData\Local\Temp\9B51.tmp"77⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\9BCE.tmp"C:\Users\Admin\AppData\Local\Temp\9BCE.tmp"78⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\9C4B.tmp"C:\Users\Admin\AppData\Local\Temp\9C4B.tmp"79⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\9CB8.tmp"C:\Users\Admin\AppData\Local\Temp\9CB8.tmp"80⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\9D74.tmp"C:\Users\Admin\AppData\Local\Temp\9D74.tmp"81⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\9DE1.tmp"C:\Users\Admin\AppData\Local\Temp\9DE1.tmp"82⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\9E6E.tmp"C:\Users\Admin\AppData\Local\Temp\9E6E.tmp"83⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\9EFA.tmp"C:\Users\Admin\AppData\Local\Temp\9EFA.tmp"84⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\9F87.tmp"C:\Users\Admin\AppData\Local\Temp\9F87.tmp"85⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\9FE5.tmp"C:\Users\Admin\AppData\Local\Temp\9FE5.tmp"86⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\A052.tmp"C:\Users\Admin\AppData\Local\Temp\A052.tmp"87⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\A0BF.tmp"C:\Users\Admin\AppData\Local\Temp\A0BF.tmp"88⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\A12D.tmp"C:\Users\Admin\AppData\Local\Temp\A12D.tmp"89⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\A19A.tmp"C:\Users\Admin\AppData\Local\Temp\A19A.tmp"90⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\A217.tmp"C:\Users\Admin\AppData\Local\Temp\A217.tmp"91⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\A284.tmp"C:\Users\Admin\AppData\Local\Temp\A284.tmp"92⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\A2F2.tmp"C:\Users\Admin\AppData\Local\Temp\A2F2.tmp"93⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\A36F.tmp"C:\Users\Admin\AppData\Local\Temp\A36F.tmp"94⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\A3CD.tmp"C:\Users\Admin\AppData\Local\Temp\A3CD.tmp"95⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\A42A.tmp"C:\Users\Admin\AppData\Local\Temp\A42A.tmp"96⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\A4B7.tmp"C:\Users\Admin\AppData\Local\Temp\A4B7.tmp"97⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\A718.tmp"C:\Users\Admin\AppData\Local\Temp\A718.tmp"98⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\A8BE.tmp"C:\Users\Admin\AppData\Local\Temp\A8BE.tmp"99⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\A92C.tmp"C:\Users\Admin\AppData\Local\Temp\A92C.tmp"100⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\A9A9.tmp"C:\Users\Admin\AppData\Local\Temp\A9A9.tmp"101⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\AA06.tmp"C:\Users\Admin\AppData\Local\Temp\AA06.tmp"102⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\AB10.tmp"C:\Users\Admin\AppData\Local\Temp\AB10.tmp"103⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\AB9D.tmp"C:\Users\Admin\AppData\Local\Temp\AB9D.tmp"104⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\AC1A.tmp"C:\Users\Admin\AppData\Local\Temp\AC1A.tmp"105⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\B58F.tmp"C:\Users\Admin\AppData\Local\Temp\B58F.tmp"106⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\BBAA.tmp"C:\Users\Admin\AppData\Local\Temp\BBAA.tmp"107⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\C3C8.tmp"C:\Users\Admin\AppData\Local\Temp\C3C8.tmp"108⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\CEE4.tmp"C:\Users\Admin\AppData\Local\Temp\CEE4.tmp"109⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\D2BC.tmp"C:\Users\Admin\AppData\Local\Temp\D2BC.tmp"110⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\D685.tmp"C:\Users\Admin\AppData\Local\Temp\D685.tmp"111⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\D760.tmp"C:\Users\Admin\AppData\Local\Temp\D760.tmp"112⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\D7DD.tmp"C:\Users\Admin\AppData\Local\Temp\D7DD.tmp"113⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\DC9F.tmp"C:\Users\Admin\AppData\Local\Temp\DC9F.tmp"114⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\DD8A.tmp"C:\Users\Admin\AppData\Local\Temp\DD8A.tmp"115⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\E877.tmp"C:\Users\Admin\AppData\Local\Temp\E877.tmp"116⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\EA1D.tmp"C:\Users\Admin\AppData\Local\Temp\EA1D.tmp"117⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\EF8B.tmp"C:\Users\Admin\AppData\Local\Temp\EF8B.tmp"118⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\F75B.tmp"C:\Users\Admin\AppData\Local\Temp\F75B.tmp"119⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\FF99.tmp"C:\Users\Admin\AppData\Local\Temp\FF99.tmp"120⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\287.tmp"C:\Users\Admin\AppData\Local\Temp\287.tmp"121⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\BBE.tmp"C:\Users\Admin\AppData\Local\Temp\BBE.tmp"122⤵PID:432
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-