Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_463f311629f55abcca1f7054c414218c_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_463f311629f55abcca1f7054c414218c_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_463f311629f55abcca1f7054c414218c_mafia_JC.exe
-
Size
486KB
-
MD5
463f311629f55abcca1f7054c414218c
-
SHA1
855fd447b170fe1d93a5916e6d4e65bf06e9e05f
-
SHA256
e528ded859ba0b9c530090a6b5cd75a9bfb5c436c22a3fd17f14b0dd61ab8f81
-
SHA512
6feb82574cad019005fcfd1801ef863611fb880a43e4172d2ab51baf9defad12d06652cbe0692cda8b7f3c3155ac970c5bb5de02e53c69f9919b07760ffad3f9
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7Eti0uSj8xwWeV9YYKOYTeYEitBGimh0tCHHJ:/U5rCOTeiDEti0mxlI9YmY6KeioTZNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1092 3A64.tmp 3608 3D33.tmp 1832 3E2D.tmp 2440 411B.tmp 2236 434D.tmp 2444 4419.tmp 3564 4541.tmp 4348 4699.tmp 2480 47B2.tmp 3728 487E.tmp 1212 49E5.tmp 4928 4AB0.tmp 4892 4C85.tmp 1344 4E1B.tmp 1372 4EF6.tmp 2500 504E.tmp 5084 5119.tmp 1352 5203.tmp 4352 52DE.tmp 760 536A.tmp 1892 5407.tmp 1172 54D2.tmp 824 560A.tmp 2144 56B6.tmp 1696 581E.tmp 3688 5937.tmp 876 5A31.tmp 4688 5C15.tmp 4896 5CC1.tmp 3940 5D9C.tmp 3648 5E86.tmp 1788 602C.tmp 4920 6107.tmp 4144 6220.tmp 1772 62AD.tmp 1952 631A.tmp 2296 6443.tmp 3796 64EF.tmp 3356 67DD.tmp 4620 6879.tmp 1600 6935.tmp 3004 69F0.tmp 3140 6A7D.tmp 2816 6B38.tmp 2172 6BB5.tmp 3812 6C32.tmp 5072 6CDE.tmp 1912 6DC8.tmp 2960 6E36.tmp 4172 6EC2.tmp 2360 6F5F.tmp 3284 7088.tmp 4700 7114.tmp 1280 723D.tmp 1252 7376.tmp 2688 74CD.tmp 3892 755A.tmp 2224 7625.tmp 776 76A2.tmp 4376 774E.tmp 2444 77BB.tmp 4976 7838.tmp 2284 78A6.tmp 3612 7932.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4040 wrote to memory of 1092 4040 2023-08-26_463f311629f55abcca1f7054c414218c_mafia_JC.exe 87 PID 4040 wrote to memory of 1092 4040 2023-08-26_463f311629f55abcca1f7054c414218c_mafia_JC.exe 87 PID 4040 wrote to memory of 1092 4040 2023-08-26_463f311629f55abcca1f7054c414218c_mafia_JC.exe 87 PID 1092 wrote to memory of 3608 1092 3A64.tmp 88 PID 1092 wrote to memory of 3608 1092 3A64.tmp 88 PID 1092 wrote to memory of 3608 1092 3A64.tmp 88 PID 3608 wrote to memory of 1832 3608 3D33.tmp 89 PID 3608 wrote to memory of 1832 3608 3D33.tmp 89 PID 3608 wrote to memory of 1832 3608 3D33.tmp 89 PID 1832 wrote to memory of 2440 1832 3E2D.tmp 90 PID 1832 wrote to memory of 2440 1832 3E2D.tmp 90 PID 1832 wrote to memory of 2440 1832 3E2D.tmp 90 PID 2440 wrote to memory of 2236 2440 411B.tmp 91 PID 2440 wrote to memory of 2236 2440 411B.tmp 91 PID 2440 wrote to memory of 2236 2440 411B.tmp 91 PID 2236 wrote to memory of 2444 2236 434D.tmp 92 PID 2236 wrote to memory of 2444 2236 434D.tmp 92 PID 2236 wrote to memory of 2444 2236 434D.tmp 92 PID 2444 wrote to memory of 3564 2444 4419.tmp 93 PID 2444 wrote to memory of 3564 2444 4419.tmp 93 PID 2444 wrote to memory of 3564 2444 4419.tmp 93 PID 3564 wrote to memory of 4348 3564 4541.tmp 94 PID 3564 wrote to memory of 4348 3564 4541.tmp 94 PID 3564 wrote to memory of 4348 3564 4541.tmp 94 PID 4348 wrote to memory of 2480 4348 4699.tmp 95 PID 4348 wrote to memory of 2480 4348 4699.tmp 95 PID 4348 wrote to memory of 2480 4348 4699.tmp 95 PID 2480 wrote to memory of 3728 2480 47B2.tmp 96 PID 2480 wrote to memory of 3728 2480 47B2.tmp 96 PID 2480 wrote to memory of 3728 2480 47B2.tmp 96 PID 3728 wrote to memory of 1212 3728 487E.tmp 97 PID 3728 wrote to memory of 1212 3728 487E.tmp 97 PID 3728 wrote to memory of 1212 3728 487E.tmp 97 PID 1212 wrote to memory of 4928 1212 49E5.tmp 98 PID 1212 wrote to memory of 4928 1212 49E5.tmp 98 PID 1212 wrote to memory of 4928 1212 49E5.tmp 98 PID 4928 wrote to memory of 4892 4928 4AB0.tmp 99 PID 4928 wrote to memory of 4892 4928 4AB0.tmp 99 PID 4928 wrote to memory of 4892 4928 4AB0.tmp 99 PID 4892 wrote to memory of 1344 4892 4C85.tmp 100 PID 4892 wrote to memory of 1344 4892 4C85.tmp 100 PID 4892 wrote to memory of 1344 4892 4C85.tmp 100 PID 1344 wrote to memory of 1372 1344 4E1B.tmp 101 PID 1344 wrote to memory of 1372 1344 4E1B.tmp 101 PID 1344 wrote to memory of 1372 1344 4E1B.tmp 101 PID 1372 wrote to memory of 2500 1372 4EF6.tmp 102 PID 1372 wrote to memory of 2500 1372 4EF6.tmp 102 PID 1372 wrote to memory of 2500 1372 4EF6.tmp 102 PID 2500 wrote to memory of 5084 2500 504E.tmp 103 PID 2500 wrote to memory of 5084 2500 504E.tmp 103 PID 2500 wrote to memory of 5084 2500 504E.tmp 103 PID 5084 wrote to memory of 1352 5084 5119.tmp 104 PID 5084 wrote to memory of 1352 5084 5119.tmp 104 PID 5084 wrote to memory of 1352 5084 5119.tmp 104 PID 1352 wrote to memory of 4352 1352 5203.tmp 105 PID 1352 wrote to memory of 4352 1352 5203.tmp 105 PID 1352 wrote to memory of 4352 1352 5203.tmp 105 PID 4352 wrote to memory of 760 4352 52DE.tmp 106 PID 4352 wrote to memory of 760 4352 52DE.tmp 106 PID 4352 wrote to memory of 760 4352 52DE.tmp 106 PID 760 wrote to memory of 1892 760 536A.tmp 107 PID 760 wrote to memory of 1892 760 536A.tmp 107 PID 760 wrote to memory of 1892 760 536A.tmp 107 PID 1892 wrote to memory of 1172 1892 5407.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_463f311629f55abcca1f7054c414218c_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_463f311629f55abcca1f7054c414218c_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\3A64.tmp"C:\Users\Admin\AppData\Local\Temp\3A64.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\3D33.tmp"C:\Users\Admin\AppData\Local\Temp\3D33.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\411B.tmp"C:\Users\Admin\AppData\Local\Temp\411B.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\434D.tmp"C:\Users\Admin\AppData\Local\Temp\434D.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\4419.tmp"C:\Users\Admin\AppData\Local\Temp\4419.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\4541.tmp"C:\Users\Admin\AppData\Local\Temp\4541.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\4699.tmp"C:\Users\Admin\AppData\Local\Temp\4699.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\47B2.tmp"C:\Users\Admin\AppData\Local\Temp\47B2.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\487E.tmp"C:\Users\Admin\AppData\Local\Temp\487E.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\49E5.tmp"C:\Users\Admin\AppData\Local\Temp\49E5.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\4AB0.tmp"C:\Users\Admin\AppData\Local\Temp\4AB0.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\4C85.tmp"C:\Users\Admin\AppData\Local\Temp\4C85.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\4E1B.tmp"C:\Users\Admin\AppData\Local\Temp\4E1B.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"C:\Users\Admin\AppData\Local\Temp\4EF6.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\504E.tmp"C:\Users\Admin\AppData\Local\Temp\504E.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\5119.tmp"C:\Users\Admin\AppData\Local\Temp\5119.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\5203.tmp"C:\Users\Admin\AppData\Local\Temp\5203.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\52DE.tmp"C:\Users\Admin\AppData\Local\Temp\52DE.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\536A.tmp"C:\Users\Admin\AppData\Local\Temp\536A.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\5407.tmp"C:\Users\Admin\AppData\Local\Temp\5407.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\54D2.tmp"C:\Users\Admin\AppData\Local\Temp\54D2.tmp"23⤵
- Executes dropped EXE
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\560A.tmp"C:\Users\Admin\AppData\Local\Temp\560A.tmp"24⤵
- Executes dropped EXE
PID:824 -
C:\Users\Admin\AppData\Local\Temp\56B6.tmp"C:\Users\Admin\AppData\Local\Temp\56B6.tmp"25⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\581E.tmp"C:\Users\Admin\AppData\Local\Temp\581E.tmp"26⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\5937.tmp"C:\Users\Admin\AppData\Local\Temp\5937.tmp"27⤵
- Executes dropped EXE
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\5A31.tmp"C:\Users\Admin\AppData\Local\Temp\5A31.tmp"28⤵
- Executes dropped EXE
PID:876 -
C:\Users\Admin\AppData\Local\Temp\5C15.tmp"C:\Users\Admin\AppData\Local\Temp\5C15.tmp"29⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"C:\Users\Admin\AppData\Local\Temp\5CC1.tmp"30⤵
- Executes dropped EXE
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\5D9C.tmp"C:\Users\Admin\AppData\Local\Temp\5D9C.tmp"31⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\5E86.tmp"C:\Users\Admin\AppData\Local\Temp\5E86.tmp"32⤵
- Executes dropped EXE
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\602C.tmp"C:\Users\Admin\AppData\Local\Temp\602C.tmp"33⤵
- Executes dropped EXE
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\6107.tmp"C:\Users\Admin\AppData\Local\Temp\6107.tmp"34⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\6220.tmp"C:\Users\Admin\AppData\Local\Temp\6220.tmp"35⤵
- Executes dropped EXE
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\62AD.tmp"C:\Users\Admin\AppData\Local\Temp\62AD.tmp"36⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\631A.tmp"C:\Users\Admin\AppData\Local\Temp\631A.tmp"37⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\6443.tmp"C:\Users\Admin\AppData\Local\Temp\6443.tmp"38⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\64EF.tmp"C:\Users\Admin\AppData\Local\Temp\64EF.tmp"39⤵
- Executes dropped EXE
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\67DD.tmp"C:\Users\Admin\AppData\Local\Temp\67DD.tmp"40⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\6879.tmp"C:\Users\Admin\AppData\Local\Temp\6879.tmp"41⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\6935.tmp"C:\Users\Admin\AppData\Local\Temp\6935.tmp"42⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\69F0.tmp"C:\Users\Admin\AppData\Local\Temp\69F0.tmp"43⤵
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\6A7D.tmp"C:\Users\Admin\AppData\Local\Temp\6A7D.tmp"44⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\6B38.tmp"C:\Users\Admin\AppData\Local\Temp\6B38.tmp"45⤵
- Executes dropped EXE
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\6BB5.tmp"C:\Users\Admin\AppData\Local\Temp\6BB5.tmp"46⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\6C32.tmp"C:\Users\Admin\AppData\Local\Temp\6C32.tmp"47⤵
- Executes dropped EXE
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\6CDE.tmp"C:\Users\Admin\AppData\Local\Temp\6CDE.tmp"48⤵
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\6DC8.tmp"C:\Users\Admin\AppData\Local\Temp\6DC8.tmp"49⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\6E36.tmp"C:\Users\Admin\AppData\Local\Temp\6E36.tmp"50⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\6EC2.tmp"C:\Users\Admin\AppData\Local\Temp\6EC2.tmp"51⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"52⤵
- Executes dropped EXE
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\7088.tmp"C:\Users\Admin\AppData\Local\Temp\7088.tmp"53⤵
- Executes dropped EXE
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\7114.tmp"C:\Users\Admin\AppData\Local\Temp\7114.tmp"54⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\7191.tmp"C:\Users\Admin\AppData\Local\Temp\7191.tmp"55⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\723D.tmp"C:\Users\Admin\AppData\Local\Temp\723D.tmp"56⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\7376.tmp"C:\Users\Admin\AppData\Local\Temp\7376.tmp"57⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\74CD.tmp"C:\Users\Admin\AppData\Local\Temp\74CD.tmp"58⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\755A.tmp"C:\Users\Admin\AppData\Local\Temp\755A.tmp"59⤵
- Executes dropped EXE
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\7625.tmp"C:\Users\Admin\AppData\Local\Temp\7625.tmp"60⤵
- Executes dropped EXE
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\76A2.tmp"C:\Users\Admin\AppData\Local\Temp\76A2.tmp"61⤵
- Executes dropped EXE
PID:776 -
C:\Users\Admin\AppData\Local\Temp\774E.tmp"C:\Users\Admin\AppData\Local\Temp\774E.tmp"62⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\77BB.tmp"C:\Users\Admin\AppData\Local\Temp\77BB.tmp"63⤵
- Executes dropped EXE
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\7838.tmp"C:\Users\Admin\AppData\Local\Temp\7838.tmp"64⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\78A6.tmp"C:\Users\Admin\AppData\Local\Temp\78A6.tmp"65⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\7932.tmp"C:\Users\Admin\AppData\Local\Temp\7932.tmp"66⤵
- Executes dropped EXE
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\79BF.tmp"C:\Users\Admin\AppData\Local\Temp\79BF.tmp"67⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\7B36.tmp"C:\Users\Admin\AppData\Local\Temp\7B36.tmp"68⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\7C11.tmp"C:\Users\Admin\AppData\Local\Temp\7C11.tmp"69⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\7C8E.tmp"C:\Users\Admin\AppData\Local\Temp\7C8E.tmp"70⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\7D2A.tmp"C:\Users\Admin\AppData\Local\Temp\7D2A.tmp"71⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\7DE5.tmp"C:\Users\Admin\AppData\Local\Temp\7DE5.tmp"72⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\7E62.tmp"C:\Users\Admin\AppData\Local\Temp\7E62.tmp"73⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\7FD9.tmp"C:\Users\Admin\AppData\Local\Temp\7FD9.tmp"74⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\8066.tmp"C:\Users\Admin\AppData\Local\Temp\8066.tmp"75⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\8102.tmp"C:\Users\Admin\AppData\Local\Temp\8102.tmp"76⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\8170.tmp"C:\Users\Admin\AppData\Local\Temp\8170.tmp"77⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\820C.tmp"C:\Users\Admin\AppData\Local\Temp\820C.tmp"78⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\8289.tmp"C:\Users\Admin\AppData\Local\Temp\8289.tmp"79⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\8316.tmp"C:\Users\Admin\AppData\Local\Temp\8316.tmp"80⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\8383.tmp"C:\Users\Admin\AppData\Local\Temp\8383.tmp"81⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\8400.tmp"C:\Users\Admin\AppData\Local\Temp\8400.tmp"82⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\846D.tmp"C:\Users\Admin\AppData\Local\Temp\846D.tmp"83⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\84EA.tmp"C:\Users\Admin\AppData\Local\Temp\84EA.tmp"84⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\8567.tmp"C:\Users\Admin\AppData\Local\Temp\8567.tmp"85⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\8681.tmp"C:\Users\Admin\AppData\Local\Temp\8681.tmp"86⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\871D.tmp"C:\Users\Admin\AppData\Local\Temp\871D.tmp"87⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\87C9.tmp"C:\Users\Admin\AppData\Local\Temp\87C9.tmp"88⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\8855.tmp"C:\Users\Admin\AppData\Local\Temp\8855.tmp"89⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\88E2.tmp"C:\Users\Admin\AppData\Local\Temp\88E2.tmp"90⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\895F.tmp"C:\Users\Admin\AppData\Local\Temp\895F.tmp"91⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\8CDA.tmp"C:\Users\Admin\AppData\Local\Temp\8CDA.tmp"92⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\8D47.tmp"C:\Users\Admin\AppData\Local\Temp\8D47.tmp"93⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\8DC4.tmp"C:\Users\Admin\AppData\Local\Temp\8DC4.tmp"94⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\8E41.tmp"C:\Users\Admin\AppData\Local\Temp\8E41.tmp"95⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\8F0C.tmp"C:\Users\Admin\AppData\Local\Temp\8F0C.tmp"96⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\8F89.tmp"C:\Users\Admin\AppData\Local\Temp\8F89.tmp"97⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\9093.tmp"C:\Users\Admin\AppData\Local\Temp\9093.tmp"98⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\919C.tmp"C:\Users\Admin\AppData\Local\Temp\919C.tmp"99⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\9219.tmp"C:\Users\Admin\AppData\Local\Temp\9219.tmp"100⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\9287.tmp"C:\Users\Admin\AppData\Local\Temp\9287.tmp"101⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\9313.tmp"C:\Users\Admin\AppData\Local\Temp\9313.tmp"102⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\93B0.tmp"C:\Users\Admin\AppData\Local\Temp\93B0.tmp"103⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\942D.tmp"C:\Users\Admin\AppData\Local\Temp\942D.tmp"104⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\949A.tmp"C:\Users\Admin\AppData\Local\Temp\949A.tmp"105⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\9517.tmp"C:\Users\Admin\AppData\Local\Temp\9517.tmp"106⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\9594.tmp"C:\Users\Admin\AppData\Local\Temp\9594.tmp"107⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\96FB.tmp"C:\Users\Admin\AppData\Local\Temp\96FB.tmp"108⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\97F5.tmp"C:\Users\Admin\AppData\Local\Temp\97F5.tmp"109⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\992E.tmp"C:\Users\Admin\AppData\Local\Temp\992E.tmp"110⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\99AB.tmp"C:\Users\Admin\AppData\Local\Temp\99AB.tmp"111⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\9A37.tmp"C:\Users\Admin\AppData\Local\Temp\9A37.tmp"112⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\9BBE.tmp"C:\Users\Admin\AppData\Local\Temp\9BBE.tmp"113⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\9C4B.tmp"C:\Users\Admin\AppData\Local\Temp\9C4B.tmp"114⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\9CB8.tmp"C:\Users\Admin\AppData\Local\Temp\9CB8.tmp"115⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\9DF1.tmp"C:\Users\Admin\AppData\Local\Temp\9DF1.tmp"116⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\9EDB.tmp"C:\Users\Admin\AppData\Local\Temp\9EDB.tmp"117⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\A071.tmp"C:\Users\Admin\AppData\Local\Temp\A071.tmp"118⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\A0DF.tmp"C:\Users\Admin\AppData\Local\Temp\A0DF.tmp"119⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\A15C.tmp"C:\Users\Admin\AppData\Local\Temp\A15C.tmp"120⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\A1E8.tmp"C:\Users\Admin\AppData\Local\Temp\A1E8.tmp"121⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\A2C3.tmp"C:\Users\Admin\AppData\Local\Temp\A2C3.tmp"122⤵PID:4000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-