Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 05:52 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_aac4628f267fbd7e4520ab45963e9f58_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_aac4628f267fbd7e4520ab45963e9f58_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_aac4628f267fbd7e4520ab45963e9f58_mafia_JC.exe
-
Size
486KB
-
MD5
aac4628f267fbd7e4520ab45963e9f58
-
SHA1
25e5b290023dad7d2fa89b6a53ddf44521aef661
-
SHA256
657f0b9f03c87e562d45bdf471be7d935df0b49c84460280132d5251eefee432
-
SHA512
3b53d76b797e74b73a8f3cd35966ac319430292f702cb0d6ab7c38b1999b3151d946e4e18f1a80b359f3f30c5590621ba62958a9686feebfa5723d6c8573b08c
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7Et8k7+xLN7dKRvJJ6IrX4LrKTvXCwdZVsH3j:/U5rCOTeiDEu5N0vJJ6I74iSIZKNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3736 8925.tmp 5036 8A00.tmp 2568 8B0A.tmp 3116 8BD5.tmp 1600 8D1D.tmp 1204 8DC9.tmp 1616 8E94.tmp 3348 8F5F.tmp 4348 8FFB.tmp 1316 90A7.tmp 3252 9163.tmp 620 922E.tmp 756 92CA.tmp 1344 9395.tmp 2272 9441.tmp 3620 94CE.tmp 1580 9579.tmp 3384 95F6.tmp 2540 9683.tmp 4912 971F.tmp 4492 97DB.tmp 2796 9952.tmp 1048 99EE.tmp 4120 9A6B.tmp 2860 9B17.tmp 1312 9BD2.tmp 4180 9C8E.tmp 2148 9D2A.tmp 2692 9DD6.tmp 3124 9E92.tmp 4168 9F5D.tmp 2780 A047.tmp 4480 A122.tmp 1304 A19F.tmp 1728 A21C.tmp 1640 A2A8.tmp 4356 A316.tmp 1936 A3B2.tmp 1600 A43F.tmp 3964 A4CB.tmp 3408 A577.tmp 4512 A623.tmp 1616 A6BF.tmp 4064 A76B.tmp 3348 A807.tmp 1292 A875.tmp 2884 A8E2.tmp 2872 A97E.tmp 2392 AA1B.tmp 620 AA88.tmp 4308 AB15.tmp 4464 AB92.tmp 212 AC2E.tmp 4632 ACDA.tmp 1896 AD57.tmp 2268 AE03.tmp 4300 AE80.tmp 3928 AF0C.tmp 892 AF99.tmp 2176 B035.tmp 2712 B0B2.tmp 3724 B13F.tmp 4564 B1BC.tmp 1804 B239.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 372 wrote to memory of 3736 372 2023-08-26_aac4628f267fbd7e4520ab45963e9f58_mafia_JC.exe 86 PID 372 wrote to memory of 3736 372 2023-08-26_aac4628f267fbd7e4520ab45963e9f58_mafia_JC.exe 86 PID 372 wrote to memory of 3736 372 2023-08-26_aac4628f267fbd7e4520ab45963e9f58_mafia_JC.exe 86 PID 3736 wrote to memory of 5036 3736 8925.tmp 87 PID 3736 wrote to memory of 5036 3736 8925.tmp 87 PID 3736 wrote to memory of 5036 3736 8925.tmp 87 PID 5036 wrote to memory of 2568 5036 8A00.tmp 88 PID 5036 wrote to memory of 2568 5036 8A00.tmp 88 PID 5036 wrote to memory of 2568 5036 8A00.tmp 88 PID 2568 wrote to memory of 3116 2568 8B0A.tmp 89 PID 2568 wrote to memory of 3116 2568 8B0A.tmp 89 PID 2568 wrote to memory of 3116 2568 8B0A.tmp 89 PID 3116 wrote to memory of 1600 3116 8BD5.tmp 90 PID 3116 wrote to memory of 1600 3116 8BD5.tmp 90 PID 3116 wrote to memory of 1600 3116 8BD5.tmp 90 PID 1600 wrote to memory of 1204 1600 8D1D.tmp 91 PID 1600 wrote to memory of 1204 1600 8D1D.tmp 91 PID 1600 wrote to memory of 1204 1600 8D1D.tmp 91 PID 1204 wrote to memory of 1616 1204 8DC9.tmp 92 PID 1204 wrote to memory of 1616 1204 8DC9.tmp 92 PID 1204 wrote to memory of 1616 1204 8DC9.tmp 92 PID 1616 wrote to memory of 3348 1616 8E94.tmp 93 PID 1616 wrote to memory of 3348 1616 8E94.tmp 93 PID 1616 wrote to memory of 3348 1616 8E94.tmp 93 PID 3348 wrote to memory of 4348 3348 8F5F.tmp 94 PID 3348 wrote to memory of 4348 3348 8F5F.tmp 94 PID 3348 wrote to memory of 4348 3348 8F5F.tmp 94 PID 4348 wrote to memory of 1316 4348 8FFB.tmp 95 PID 4348 wrote to memory of 1316 4348 8FFB.tmp 95 PID 4348 wrote to memory of 1316 4348 8FFB.tmp 95 PID 1316 wrote to memory of 3252 1316 90A7.tmp 96 PID 1316 wrote to memory of 3252 1316 90A7.tmp 96 PID 1316 wrote to memory of 3252 1316 90A7.tmp 96 PID 3252 wrote to memory of 620 3252 9163.tmp 97 PID 3252 wrote to memory of 620 3252 9163.tmp 97 PID 3252 wrote to memory of 620 3252 9163.tmp 97 PID 620 wrote to memory of 756 620 922E.tmp 98 PID 620 wrote to memory of 756 620 922E.tmp 98 PID 620 wrote to memory of 756 620 922E.tmp 98 PID 756 wrote to memory of 1344 756 92CA.tmp 99 PID 756 wrote to memory of 1344 756 92CA.tmp 99 PID 756 wrote to memory of 1344 756 92CA.tmp 99 PID 1344 wrote to memory of 2272 1344 9395.tmp 100 PID 1344 wrote to memory of 2272 1344 9395.tmp 100 PID 1344 wrote to memory of 2272 1344 9395.tmp 100 PID 2272 wrote to memory of 3620 2272 9441.tmp 101 PID 2272 wrote to memory of 3620 2272 9441.tmp 101 PID 2272 wrote to memory of 3620 2272 9441.tmp 101 PID 3620 wrote to memory of 1580 3620 94CE.tmp 102 PID 3620 wrote to memory of 1580 3620 94CE.tmp 102 PID 3620 wrote to memory of 1580 3620 94CE.tmp 102 PID 1580 wrote to memory of 3384 1580 9579.tmp 103 PID 1580 wrote to memory of 3384 1580 9579.tmp 103 PID 1580 wrote to memory of 3384 1580 9579.tmp 103 PID 3384 wrote to memory of 2540 3384 95F6.tmp 104 PID 3384 wrote to memory of 2540 3384 95F6.tmp 104 PID 3384 wrote to memory of 2540 3384 95F6.tmp 104 PID 2540 wrote to memory of 4912 2540 9683.tmp 106 PID 2540 wrote to memory of 4912 2540 9683.tmp 106 PID 2540 wrote to memory of 4912 2540 9683.tmp 106 PID 4912 wrote to memory of 4492 4912 971F.tmp 109 PID 4912 wrote to memory of 4492 4912 971F.tmp 109 PID 4912 wrote to memory of 4492 4912 971F.tmp 109 PID 4492 wrote to memory of 2796 4492 97DB.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_aac4628f267fbd7e4520ab45963e9f58_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_aac4628f267fbd7e4520ab45963e9f58_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\8925.tmp"C:\Users\Admin\AppData\Local\Temp\8925.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\8A00.tmp"C:\Users\Admin\AppData\Local\Temp\8A00.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\8B0A.tmp"C:\Users\Admin\AppData\Local\Temp\8B0A.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\8BD5.tmp"C:\Users\Admin\AppData\Local\Temp\8BD5.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\8D1D.tmp"C:\Users\Admin\AppData\Local\Temp\8D1D.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\8DC9.tmp"C:\Users\Admin\AppData\Local\Temp\8DC9.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\8E94.tmp"C:\Users\Admin\AppData\Local\Temp\8E94.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\8FFB.tmp"C:\Users\Admin\AppData\Local\Temp\8FFB.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\90A7.tmp"C:\Users\Admin\AppData\Local\Temp\90A7.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\9163.tmp"C:\Users\Admin\AppData\Local\Temp\9163.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\922E.tmp"C:\Users\Admin\AppData\Local\Temp\922E.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\92CA.tmp"C:\Users\Admin\AppData\Local\Temp\92CA.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\9395.tmp"C:\Users\Admin\AppData\Local\Temp\9395.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\9441.tmp"C:\Users\Admin\AppData\Local\Temp\9441.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\94CE.tmp"C:\Users\Admin\AppData\Local\Temp\94CE.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\9579.tmp"C:\Users\Admin\AppData\Local\Temp\9579.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\95F6.tmp"C:\Users\Admin\AppData\Local\Temp\95F6.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\9683.tmp"C:\Users\Admin\AppData\Local\Temp\9683.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\971F.tmp"C:\Users\Admin\AppData\Local\Temp\971F.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\97DB.tmp"C:\Users\Admin\AppData\Local\Temp\97DB.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\9952.tmp"C:\Users\Admin\AppData\Local\Temp\9952.tmp"23⤵
- Executes dropped EXE
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\99EE.tmp"C:\Users\Admin\AppData\Local\Temp\99EE.tmp"24⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\9A6B.tmp"C:\Users\Admin\AppData\Local\Temp\9A6B.tmp"25⤵
- Executes dropped EXE
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\9B17.tmp"C:\Users\Admin\AppData\Local\Temp\9B17.tmp"26⤵
- Executes dropped EXE
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"27⤵
- Executes dropped EXE
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\9C8E.tmp"C:\Users\Admin\AppData\Local\Temp\9C8E.tmp"28⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\9D2A.tmp"C:\Users\Admin\AppData\Local\Temp\9D2A.tmp"29⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\9DD6.tmp"C:\Users\Admin\AppData\Local\Temp\9DD6.tmp"30⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\9E92.tmp"C:\Users\Admin\AppData\Local\Temp\9E92.tmp"31⤵
- Executes dropped EXE
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\9F5D.tmp"C:\Users\Admin\AppData\Local\Temp\9F5D.tmp"32⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\A047.tmp"C:\Users\Admin\AppData\Local\Temp\A047.tmp"33⤵
- Executes dropped EXE
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\A122.tmp"C:\Users\Admin\AppData\Local\Temp\A122.tmp"34⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\A19F.tmp"C:\Users\Admin\AppData\Local\Temp\A19F.tmp"35⤵
- Executes dropped EXE
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\A21C.tmp"C:\Users\Admin\AppData\Local\Temp\A21C.tmp"36⤵
- Executes dropped EXE
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\A2A8.tmp"C:\Users\Admin\AppData\Local\Temp\A2A8.tmp"37⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\A316.tmp"C:\Users\Admin\AppData\Local\Temp\A316.tmp"38⤵
- Executes dropped EXE
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\A3B2.tmp"C:\Users\Admin\AppData\Local\Temp\A3B2.tmp"39⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\A43F.tmp"C:\Users\Admin\AppData\Local\Temp\A43F.tmp"40⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"C:\Users\Admin\AppData\Local\Temp\A4CB.tmp"41⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\A577.tmp"C:\Users\Admin\AppData\Local\Temp\A577.tmp"42⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\A623.tmp"C:\Users\Admin\AppData\Local\Temp\A623.tmp"43⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"44⤵
- Executes dropped EXE
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\A76B.tmp"C:\Users\Admin\AppData\Local\Temp\A76B.tmp"45⤵
- Executes dropped EXE
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\A807.tmp"C:\Users\Admin\AppData\Local\Temp\A807.tmp"46⤵
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\A875.tmp"C:\Users\Admin\AppData\Local\Temp\A875.tmp"47⤵
- Executes dropped EXE
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\A8E2.tmp"C:\Users\Admin\AppData\Local\Temp\A8E2.tmp"48⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\A97E.tmp"C:\Users\Admin\AppData\Local\Temp\A97E.tmp"49⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\AA1B.tmp"C:\Users\Admin\AppData\Local\Temp\AA1B.tmp"50⤵
- Executes dropped EXE
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\AA88.tmp"C:\Users\Admin\AppData\Local\Temp\AA88.tmp"51⤵
- Executes dropped EXE
PID:620 -
C:\Users\Admin\AppData\Local\Temp\AB15.tmp"C:\Users\Admin\AppData\Local\Temp\AB15.tmp"52⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\AB92.tmp"C:\Users\Admin\AppData\Local\Temp\AB92.tmp"53⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"C:\Users\Admin\AppData\Local\Temp\AC2E.tmp"54⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\ACDA.tmp"C:\Users\Admin\AppData\Local\Temp\ACDA.tmp"55⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\AD57.tmp"C:\Users\Admin\AppData\Local\Temp\AD57.tmp"56⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\AE03.tmp"C:\Users\Admin\AppData\Local\Temp\AE03.tmp"57⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\AE80.tmp"C:\Users\Admin\AppData\Local\Temp\AE80.tmp"58⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\AF0C.tmp"C:\Users\Admin\AppData\Local\Temp\AF0C.tmp"59⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\AF99.tmp"C:\Users\Admin\AppData\Local\Temp\AF99.tmp"60⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\B035.tmp"C:\Users\Admin\AppData\Local\Temp\B035.tmp"61⤵
- Executes dropped EXE
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\B0B2.tmp"C:\Users\Admin\AppData\Local\Temp\B0B2.tmp"62⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\B13F.tmp"C:\Users\Admin\AppData\Local\Temp\B13F.tmp"63⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"64⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\B239.tmp"C:\Users\Admin\AppData\Local\Temp\B239.tmp"65⤵
- Executes dropped EXE
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"66⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\B362.tmp"C:\Users\Admin\AppData\Local\Temp\B362.tmp"67⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"68⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\B43C.tmp"C:\Users\Admin\AppData\Local\Temp\B43C.tmp"69⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\B4AA.tmp"C:\Users\Admin\AppData\Local\Temp\B4AA.tmp"70⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\B517.tmp"C:\Users\Admin\AppData\Local\Temp\B517.tmp"71⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"C:\Users\Admin\AppData\Local\Temp\B5A4.tmp"72⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\B602.tmp"C:\Users\Admin\AppData\Local\Temp\B602.tmp"73⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\B68E.tmp"C:\Users\Admin\AppData\Local\Temp\B68E.tmp"74⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\B73A.tmp"C:\Users\Admin\AppData\Local\Temp\B73A.tmp"75⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"76⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\C350.tmp"C:\Users\Admin\AppData\Local\Temp\C350.tmp"77⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\C3DC.tmp"C:\Users\Admin\AppData\Local\Temp\C3DC.tmp"78⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\CC68.tmp"C:\Users\Admin\AppData\Local\Temp\CC68.tmp"79⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\D31F.tmp"C:\Users\Admin\AppData\Local\Temp\D31F.tmp"80⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\D92A.tmp"C:\Users\Admin\AppData\Local\Temp\D92A.tmp"81⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\DA43.tmp"C:\Users\Admin\AppData\Local\Temp\DA43.tmp"82⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"83⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\E000.tmp"C:\Users\Admin\AppData\Local\Temp\E000.tmp"84⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\E157.tmp"C:\Users\Admin\AppData\Local\Temp\E157.tmp"85⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"C:\Users\Admin\AppData\Local\Temp\E4F1.tmp"86⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\EBF6.tmp"C:\Users\Admin\AppData\Local\Temp\EBF6.tmp"87⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\F26E.tmp"C:\Users\Admin\AppData\Local\Temp\F26E.tmp"88⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\F50E.tmp"C:\Users\Admin\AppData\Local\Temp\F50E.tmp"89⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\F608.tmp"C:\Users\Admin\AppData\Local\Temp\F608.tmp"90⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"91⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\C9D.tmp"C:\Users\Admin\AppData\Local\Temp\C9D.tmp"92⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\E05.tmp"C:\Users\Admin\AppData\Local\Temp\E05.tmp"93⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\F3D.tmp"C:\Users\Admin\AppData\Local\Temp\F3D.tmp"94⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\1057.tmp"C:\Users\Admin\AppData\Local\Temp\1057.tmp"95⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\1577.tmp"C:\Users\Admin\AppData\Local\Temp\1577.tmp"96⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\1836.tmp"C:\Users\Admin\AppData\Local\Temp\1836.tmp"97⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\1CE9.tmp"C:\Users\Admin\AppData\Local\Temp\1CE9.tmp"98⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\2064.tmp"C:\Users\Admin\AppData\Local\Temp\2064.tmp"99⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\25D3.tmp"C:\Users\Admin\AppData\Local\Temp\25D3.tmp"100⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\2B32.tmp"C:\Users\Admin\AppData\Local\Temp\2B32.tmp"101⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\35C1.tmp"C:\Users\Admin\AppData\Local\Temp\35C1.tmp"102⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\37C4.tmp"C:\Users\Admin\AppData\Local\Temp\37C4.tmp"103⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\40AE.tmp"C:\Users\Admin\AppData\Local\Temp\40AE.tmp"104⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\41B7.tmp"C:\Users\Admin\AppData\Local\Temp\41B7.tmp"105⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\435D.tmp"C:\Users\Admin\AppData\Local\Temp\435D.tmp"106⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\4513.tmp"C:\Users\Admin\AppData\Local\Temp\4513.tmp"107⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\464B.tmp"C:\Users\Admin\AppData\Local\Temp\464B.tmp"108⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\47A3.tmp"C:\Users\Admin\AppData\Local\Temp\47A3.tmp"109⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\48BC.tmp"C:\Users\Admin\AppData\Local\Temp\48BC.tmp"110⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\4A04.tmp"C:\Users\Admin\AppData\Local\Temp\4A04.tmp"111⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"112⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\4C75.tmp"C:\Users\Admin\AppData\Local\Temp\4C75.tmp"113⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\4D60.tmp"C:\Users\Admin\AppData\Local\Temp\4D60.tmp"114⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"115⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\4F82.tmp"C:\Users\Admin\AppData\Local\Temp\4F82.tmp"116⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\501F.tmp"C:\Users\Admin\AppData\Local\Temp\501F.tmp"117⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\508C.tmp"C:\Users\Admin\AppData\Local\Temp\508C.tmp"118⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\5196.tmp"C:\Users\Admin\AppData\Local\Temp\5196.tmp"119⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\5213.tmp"C:\Users\Admin\AppData\Local\Temp\5213.tmp"120⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\52BF.tmp"C:\Users\Admin\AppData\Local\Temp\52BF.tmp"121⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\534B.tmp"C:\Users\Admin\AppData\Local\Temp\534B.tmp"122⤵PID:4712
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-