Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_58afbe5ec07a237753cc7ec06f4b4973_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_58afbe5ec07a237753cc7ec06f4b4973_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_58afbe5ec07a237753cc7ec06f4b4973_mafia_JC.exe
-
Size
486KB
-
MD5
58afbe5ec07a237753cc7ec06f4b4973
-
SHA1
a62eef0b1d3380371217324e0be2a1de092fd363
-
SHA256
d5b6637e8f49d43d6ce149498cb3c82ae29a01f030eea2070046a9d319f67304
-
SHA512
c086834348ea6a857571fb51e9e622f5bef1b03d09aecd6f486fc9b6d81fa9e9231e25a32e597d69571a4cd1e8ffb6199be6339218b16090e850458329f1786e
-
SSDEEP
6144:Forf3lPvovsgZnqG2C7mOTeiLfD7GAmcn3+jbbuonL/A8kEcPG6roCtnGgsH3dZ:UU5rCOTeiDGAju/bLLoW6xopNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3836 172.tmp 4744 71F.tmp 4480 7BB.tmp 2260 8F4.tmp 2548 990.tmp 2076 B55.tmp 1252 C11.tmp 2912 E91.tmp 3168 F9B.tmp 2676 123B.tmp 4948 1400.tmp 2816 15C5.tmp 4528 16FE.tmp 2000 17D8.tmp 2176 18E2.tmp 4772 1A49.tmp 3252 1B43.tmp 3892 1E31.tmp 2192 1F99.tmp 4484 2016.tmp 2200 20F1.tmp 1644 2248.tmp 576 2594.tmp 4192 2630.tmp 2788 2815.tmp 2212 296C.tmp 4232 2A09.tmp 3672 2AA5.tmp 2872 2B32.tmp 4504 2BCE.tmp 4340 2F77.tmp 1684 31AA.tmp 4632 3302.tmp 508 3479.tmp 1104 369B.tmp 952 3718.tmp 4852 3795.tmp 2308 3803.tmp 1384 3870.tmp 2456 39B8.tmp 216 3A93.tmp 4744 3C0A.tmp 3924 3CF4.tmp 3736 3DEE.tmp 3612 3E8B.tmp 2548 3FC3.tmp 1732 4169.tmp 1252 4253.tmp 3964 431F.tmp 476 43AB.tmp 808 4428.tmp 1332 44F3.tmp 1872 45CE.tmp 892 4699.tmp 3508 4745.tmp 3360 4978.tmp 2000 4B2D.tmp 2944 4BC9.tmp 4372 4C46.tmp 3900 4D40.tmp 3252 4EA8.tmp 4700 4F34.tmp 1680 4FF0.tmp 3952 507C.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 3836 4936 2023-08-26_58afbe5ec07a237753cc7ec06f4b4973_mafia_JC.exe 88 PID 4936 wrote to memory of 3836 4936 2023-08-26_58afbe5ec07a237753cc7ec06f4b4973_mafia_JC.exe 88 PID 4936 wrote to memory of 3836 4936 2023-08-26_58afbe5ec07a237753cc7ec06f4b4973_mafia_JC.exe 88 PID 3836 wrote to memory of 4744 3836 172.tmp 89 PID 3836 wrote to memory of 4744 3836 172.tmp 89 PID 3836 wrote to memory of 4744 3836 172.tmp 89 PID 4744 wrote to memory of 4480 4744 71F.tmp 90 PID 4744 wrote to memory of 4480 4744 71F.tmp 90 PID 4744 wrote to memory of 4480 4744 71F.tmp 90 PID 4480 wrote to memory of 2260 4480 7BB.tmp 91 PID 4480 wrote to memory of 2260 4480 7BB.tmp 91 PID 4480 wrote to memory of 2260 4480 7BB.tmp 91 PID 2260 wrote to memory of 2548 2260 8F4.tmp 92 PID 2260 wrote to memory of 2548 2260 8F4.tmp 92 PID 2260 wrote to memory of 2548 2260 8F4.tmp 92 PID 2548 wrote to memory of 2076 2548 990.tmp 93 PID 2548 wrote to memory of 2076 2548 990.tmp 93 PID 2548 wrote to memory of 2076 2548 990.tmp 93 PID 2076 wrote to memory of 1252 2076 B55.tmp 94 PID 2076 wrote to memory of 1252 2076 B55.tmp 94 PID 2076 wrote to memory of 1252 2076 B55.tmp 94 PID 1252 wrote to memory of 2912 1252 C11.tmp 95 PID 1252 wrote to memory of 2912 1252 C11.tmp 95 PID 1252 wrote to memory of 2912 1252 C11.tmp 95 PID 2912 wrote to memory of 3168 2912 E91.tmp 96 PID 2912 wrote to memory of 3168 2912 E91.tmp 96 PID 2912 wrote to memory of 3168 2912 E91.tmp 96 PID 3168 wrote to memory of 2676 3168 F9B.tmp 97 PID 3168 wrote to memory of 2676 3168 F9B.tmp 97 PID 3168 wrote to memory of 2676 3168 F9B.tmp 97 PID 2676 wrote to memory of 4948 2676 123B.tmp 98 PID 2676 wrote to memory of 4948 2676 123B.tmp 98 PID 2676 wrote to memory of 4948 2676 123B.tmp 98 PID 4948 wrote to memory of 2816 4948 1400.tmp 99 PID 4948 wrote to memory of 2816 4948 1400.tmp 99 PID 4948 wrote to memory of 2816 4948 1400.tmp 99 PID 2816 wrote to memory of 4528 2816 15C5.tmp 100 PID 2816 wrote to memory of 4528 2816 15C5.tmp 100 PID 2816 wrote to memory of 4528 2816 15C5.tmp 100 PID 4528 wrote to memory of 2000 4528 16FE.tmp 101 PID 4528 wrote to memory of 2000 4528 16FE.tmp 101 PID 4528 wrote to memory of 2000 4528 16FE.tmp 101 PID 2000 wrote to memory of 2176 2000 17D8.tmp 102 PID 2000 wrote to memory of 2176 2000 17D8.tmp 102 PID 2000 wrote to memory of 2176 2000 17D8.tmp 102 PID 2176 wrote to memory of 4772 2176 18E2.tmp 103 PID 2176 wrote to memory of 4772 2176 18E2.tmp 103 PID 2176 wrote to memory of 4772 2176 18E2.tmp 103 PID 4772 wrote to memory of 3252 4772 1A49.tmp 104 PID 4772 wrote to memory of 3252 4772 1A49.tmp 104 PID 4772 wrote to memory of 3252 4772 1A49.tmp 104 PID 3252 wrote to memory of 3892 3252 1B43.tmp 105 PID 3252 wrote to memory of 3892 3252 1B43.tmp 105 PID 3252 wrote to memory of 3892 3252 1B43.tmp 105 PID 3892 wrote to memory of 2192 3892 1E31.tmp 106 PID 3892 wrote to memory of 2192 3892 1E31.tmp 106 PID 3892 wrote to memory of 2192 3892 1E31.tmp 106 PID 2192 wrote to memory of 4484 2192 1F99.tmp 107 PID 2192 wrote to memory of 4484 2192 1F99.tmp 107 PID 2192 wrote to memory of 4484 2192 1F99.tmp 107 PID 4484 wrote to memory of 2200 4484 2016.tmp 109 PID 4484 wrote to memory of 2200 4484 2016.tmp 109 PID 4484 wrote to memory of 2200 4484 2016.tmp 109 PID 2200 wrote to memory of 1644 2200 20F1.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_58afbe5ec07a237753cc7ec06f4b4973_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_58afbe5ec07a237753cc7ec06f4b4973_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\172.tmp"C:\Users\Admin\AppData\Local\Temp\172.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\71F.tmp"C:\Users\Admin\AppData\Local\Temp\71F.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\7BB.tmp"C:\Users\Admin\AppData\Local\Temp\7BB.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\8F4.tmp"C:\Users\Admin\AppData\Local\Temp\8F4.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\990.tmp"C:\Users\Admin\AppData\Local\Temp\990.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\B55.tmp"C:\Users\Admin\AppData\Local\Temp\B55.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\C11.tmp"C:\Users\Admin\AppData\Local\Temp\C11.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\E91.tmp"C:\Users\Admin\AppData\Local\Temp\E91.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\F9B.tmp"C:\Users\Admin\AppData\Local\Temp\F9B.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\123B.tmp"C:\Users\Admin\AppData\Local\Temp\123B.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\1400.tmp"C:\Users\Admin\AppData\Local\Temp\1400.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\15C5.tmp"C:\Users\Admin\AppData\Local\Temp\15C5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\16FE.tmp"C:\Users\Admin\AppData\Local\Temp\16FE.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\17D8.tmp"C:\Users\Admin\AppData\Local\Temp\17D8.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\18E2.tmp"C:\Users\Admin\AppData\Local\Temp\18E2.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\1A49.tmp"C:\Users\Admin\AppData\Local\Temp\1A49.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\1B43.tmp"C:\Users\Admin\AppData\Local\Temp\1B43.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\1E31.tmp"C:\Users\Admin\AppData\Local\Temp\1E31.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\1F99.tmp"C:\Users\Admin\AppData\Local\Temp\1F99.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\2016.tmp"C:\Users\Admin\AppData\Local\Temp\2016.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\20F1.tmp"C:\Users\Admin\AppData\Local\Temp\20F1.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\2248.tmp"C:\Users\Admin\AppData\Local\Temp\2248.tmp"23⤵
- Executes dropped EXE
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\2594.tmp"C:\Users\Admin\AppData\Local\Temp\2594.tmp"24⤵
- Executes dropped EXE
PID:576 -
C:\Users\Admin\AppData\Local\Temp\2630.tmp"C:\Users\Admin\AppData\Local\Temp\2630.tmp"25⤵
- Executes dropped EXE
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\2815.tmp"C:\Users\Admin\AppData\Local\Temp\2815.tmp"26⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\296C.tmp"C:\Users\Admin\AppData\Local\Temp\296C.tmp"27⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\2A09.tmp"C:\Users\Admin\AppData\Local\Temp\2A09.tmp"28⤵
- Executes dropped EXE
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\2AA5.tmp"C:\Users\Admin\AppData\Local\Temp\2AA5.tmp"29⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\2B32.tmp"C:\Users\Admin\AppData\Local\Temp\2B32.tmp"30⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\2BCE.tmp"C:\Users\Admin\AppData\Local\Temp\2BCE.tmp"31⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\2F77.tmp"C:\Users\Admin\AppData\Local\Temp\2F77.tmp"32⤵
- Executes dropped EXE
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\31AA.tmp"C:\Users\Admin\AppData\Local\Temp\31AA.tmp"33⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"34⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\3479.tmp"C:\Users\Admin\AppData\Local\Temp\3479.tmp"35⤵
- Executes dropped EXE
PID:508 -
C:\Users\Admin\AppData\Local\Temp\3505.tmp"C:\Users\Admin\AppData\Local\Temp\3505.tmp"36⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\369B.tmp"C:\Users\Admin\AppData\Local\Temp\369B.tmp"37⤵
- Executes dropped EXE
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\3718.tmp"C:\Users\Admin\AppData\Local\Temp\3718.tmp"38⤵
- Executes dropped EXE
PID:952 -
C:\Users\Admin\AppData\Local\Temp\3795.tmp"C:\Users\Admin\AppData\Local\Temp\3795.tmp"39⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\3803.tmp"C:\Users\Admin\AppData\Local\Temp\3803.tmp"40⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\3870.tmp"C:\Users\Admin\AppData\Local\Temp\3870.tmp"41⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\39B8.tmp"C:\Users\Admin\AppData\Local\Temp\39B8.tmp"42⤵
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\3A93.tmp"C:\Users\Admin\AppData\Local\Temp\3A93.tmp"43⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"C:\Users\Admin\AppData\Local\Temp\3C0A.tmp"44⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"45⤵
- Executes dropped EXE
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"C:\Users\Admin\AppData\Local\Temp\3DEE.tmp"46⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\3E8B.tmp"C:\Users\Admin\AppData\Local\Temp\3E8B.tmp"47⤵
- Executes dropped EXE
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\3FC3.tmp"C:\Users\Admin\AppData\Local\Temp\3FC3.tmp"48⤵
- Executes dropped EXE
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\4169.tmp"C:\Users\Admin\AppData\Local\Temp\4169.tmp"49⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\4253.tmp"C:\Users\Admin\AppData\Local\Temp\4253.tmp"50⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\431F.tmp"C:\Users\Admin\AppData\Local\Temp\431F.tmp"51⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\43AB.tmp"C:\Users\Admin\AppData\Local\Temp\43AB.tmp"52⤵
- Executes dropped EXE
PID:476 -
C:\Users\Admin\AppData\Local\Temp\4428.tmp"C:\Users\Admin\AppData\Local\Temp\4428.tmp"53⤵
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\44F3.tmp"C:\Users\Admin\AppData\Local\Temp\44F3.tmp"54⤵
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\45CE.tmp"C:\Users\Admin\AppData\Local\Temp\45CE.tmp"55⤵
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\4699.tmp"C:\Users\Admin\AppData\Local\Temp\4699.tmp"56⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\4745.tmp"C:\Users\Admin\AppData\Local\Temp\4745.tmp"57⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\4978.tmp"C:\Users\Admin\AppData\Local\Temp\4978.tmp"58⤵
- Executes dropped EXE
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\4B2D.tmp"C:\Users\Admin\AppData\Local\Temp\4B2D.tmp"59⤵
- Executes dropped EXE
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"C:\Users\Admin\AppData\Local\Temp\4BC9.tmp"60⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\4C46.tmp"C:\Users\Admin\AppData\Local\Temp\4C46.tmp"61⤵
- Executes dropped EXE
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\4D40.tmp"C:\Users\Admin\AppData\Local\Temp\4D40.tmp"62⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"C:\Users\Admin\AppData\Local\Temp\4EA8.tmp"63⤵
- Executes dropped EXE
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\4F34.tmp"C:\Users\Admin\AppData\Local\Temp\4F34.tmp"64⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"65⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\507C.tmp"C:\Users\Admin\AppData\Local\Temp\507C.tmp"66⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\50F9.tmp"C:\Users\Admin\AppData\Local\Temp\50F9.tmp"67⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\5270.tmp"C:\Users\Admin\AppData\Local\Temp\5270.tmp"68⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\533C.tmp"C:\Users\Admin\AppData\Local\Temp\533C.tmp"69⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\53C8.tmp"C:\Users\Admin\AppData\Local\Temp\53C8.tmp"70⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\5445.tmp"C:\Users\Admin\AppData\Local\Temp\5445.tmp"71⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\54D2.tmp"C:\Users\Admin\AppData\Local\Temp\54D2.tmp"72⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\558D.tmp"C:\Users\Admin\AppData\Local\Temp\558D.tmp"73⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\561A.tmp"C:\Users\Admin\AppData\Local\Temp\561A.tmp"74⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\56A7.tmp"C:\Users\Admin\AppData\Local\Temp\56A7.tmp"75⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\57DF.tmp"C:\Users\Admin\AppData\Local\Temp\57DF.tmp"76⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\586C.tmp"C:\Users\Admin\AppData\Local\Temp\586C.tmp"77⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\58F8.tmp"C:\Users\Admin\AppData\Local\Temp\58F8.tmp"78⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"C:\Users\Admin\AppData\Local\Temp\5ACD.tmp"79⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"80⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\5BE6.tmp"C:\Users\Admin\AppData\Local\Temp\5BE6.tmp"81⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\5C54.tmp"C:\Users\Admin\AppData\Local\Temp\5C54.tmp"82⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"83⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\5D5D.tmp"C:\Users\Admin\AppData\Local\Temp\5D5D.tmp"84⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\5E96.tmp"C:\Users\Admin\AppData\Local\Temp\5E96.tmp"85⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\5F13.tmp"C:\Users\Admin\AppData\Local\Temp\5F13.tmp"86⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"87⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\603C.tmp"C:\Users\Admin\AppData\Local\Temp\603C.tmp"88⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\60B9.tmp"C:\Users\Admin\AppData\Local\Temp\60B9.tmp"89⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\6126.tmp"C:\Users\Admin\AppData\Local\Temp\6126.tmp"90⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\6397.tmp"C:\Users\Admin\AppData\Local\Temp\6397.tmp"91⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\6404.tmp"C:\Users\Admin\AppData\Local\Temp\6404.tmp"92⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\651E.tmp"C:\Users\Admin\AppData\Local\Temp\651E.tmp"93⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\66A4.tmp"C:\Users\Admin\AppData\Local\Temp\66A4.tmp"94⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\6712.tmp"C:\Users\Admin\AppData\Local\Temp\6712.tmp"95⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\67EC.tmp"C:\Users\Admin\AppData\Local\Temp\67EC.tmp"96⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\6935.tmp"C:\Users\Admin\AppData\Local\Temp\6935.tmp"97⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\69D1.tmp"C:\Users\Admin\AppData\Local\Temp\69D1.tmp"98⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\6B38.tmp"C:\Users\Admin\AppData\Local\Temp\6B38.tmp"99⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\6BA6.tmp"C:\Users\Admin\AppData\Local\Temp\6BA6.tmp"100⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\6C13.tmp"C:\Users\Admin\AppData\Local\Temp\6C13.tmp"101⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"102⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"C:\Users\Admin\AppData\Local\Temp\6F4F.tmp"103⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\6FBC.tmp"C:\Users\Admin\AppData\Local\Temp\6FBC.tmp"104⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\702A.tmp"C:\Users\Admin\AppData\Local\Temp\702A.tmp"105⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\7097.tmp"C:\Users\Admin\AppData\Local\Temp\7097.tmp"106⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\7133.tmp"C:\Users\Admin\AppData\Local\Temp\7133.tmp"107⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\71A1.tmp"C:\Users\Admin\AppData\Local\Temp\71A1.tmp"108⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\72D9.tmp"C:\Users\Admin\AppData\Local\Temp\72D9.tmp"109⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\7385.tmp"C:\Users\Admin\AppData\Local\Temp\7385.tmp"110⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\7402.tmp"C:\Users\Admin\AppData\Local\Temp\7402.tmp"111⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\747F.tmp"C:\Users\Admin\AppData\Local\Temp\747F.tmp"112⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\74ED.tmp"C:\Users\Admin\AppData\Local\Temp\74ED.tmp"113⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\75D7.tmp"C:\Users\Admin\AppData\Local\Temp\75D7.tmp"114⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\772F.tmp"C:\Users\Admin\AppData\Local\Temp\772F.tmp"115⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\7838.tmp"C:\Users\Admin\AppData\Local\Temp\7838.tmp"116⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\78A6.tmp"C:\Users\Admin\AppData\Local\Temp\78A6.tmp"117⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\7932.tmp"C:\Users\Admin\AppData\Local\Temp\7932.tmp"118⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\79CF.tmp"C:\Users\Admin\AppData\Local\Temp\79CF.tmp"119⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\7A9A.tmp"C:\Users\Admin\AppData\Local\Temp\7A9A.tmp"120⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\7D59.tmp"C:\Users\Admin\AppData\Local\Temp\7D59.tmp"121⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\7DD6.tmp"C:\Users\Admin\AppData\Local\Temp\7DD6.tmp"122⤵PID:2304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-