Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 21:12 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_aba8edeae8cee0dff91b5bf87027d3ca_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_aba8edeae8cee0dff91b5bf87027d3ca_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_aba8edeae8cee0dff91b5bf87027d3ca_mafia_JC.exe
-
Size
486KB
-
MD5
aba8edeae8cee0dff91b5bf87027d3ca
-
SHA1
c3aa54b7a9ffca403b3316814a58ced78d54d045
-
SHA256
ed28bb224b88d7a63699698d64dc17a77d3ea05f16cdd9727e547801d1f0d153
-
SHA512
38566cb8904939c1ab6dabeeb21fa1118ad9dd733043d6a2ede22ccee89d0c72ab4b64079585a47c5f4caf215ca392ef7d763a6fb14dc4ac11c3ce1109498a74
-
SSDEEP
12288:/U5rCOTeiD0b6PFP5OYX3SCqypRcQ1uNZ:/UQOJDOgj6kCpN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1520 E232.tmp 4908 E416.tmp 3424 E510.tmp 2772 E659.tmp 2012 F482.tmp 4852 F57C.tmp 3640 F666.tmp 5052 F750.tmp 2884 F80C.tmp 3956 F8C7.tmp 3972 F973.tmp 1464 FA3E.tmp 1516 FAFA.tmp 2656 FBA6.tmp 4484 FC52.tmp 3300 FD0D.tmp 3740 FDB9.tmp 2628 FE74.tmp 3716 FF6E.tmp 3492 59.tmp 4436 114.tmp 2944 1B1.tmp 2876 24D.tmp 724 2D9.tmp 2324 3A5.tmp 3976 441.tmp 5064 4DD.tmp 1320 599.tmp 1444 683.tmp 2516 76D.tmp 2680 848.tmp 4576 952.tmp 4600 9DE.tmp 3192 A7B.tmp 808 B55.tmp 644 C01.tmp 4000 C9D.tmp 3876 D59.tmp 1356 DE6.tmp 3556 E82.tmp 368 F5D.tmp 3844 FF9.tmp 1840 11AE.tmp 536 125A.tmp 3180 1354.tmp 1408 143F.tmp 1084 15A6.tmp 4860 1681.tmp 828 172D.tmp 4908 17D8.tmp 2752 1875.tmp 4160 1930.tmp 4596 19CC.tmp 1672 1A49.tmp 4580 1AF5.tmp 3544 1BB1.tmp 2976 1C3D.tmp 2872 1CBA.tmp 1412 1D57.tmp 3960 1E31.tmp 1264 1EDD.tmp 3212 1F7A.tmp 5024 2035.tmp 2676 21DB.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4132 wrote to memory of 1520 4132 2023-08-25_aba8edeae8cee0dff91b5bf87027d3ca_mafia_JC.exe 83 PID 4132 wrote to memory of 1520 4132 2023-08-25_aba8edeae8cee0dff91b5bf87027d3ca_mafia_JC.exe 83 PID 4132 wrote to memory of 1520 4132 2023-08-25_aba8edeae8cee0dff91b5bf87027d3ca_mafia_JC.exe 83 PID 1520 wrote to memory of 4908 1520 E232.tmp 84 PID 1520 wrote to memory of 4908 1520 E232.tmp 84 PID 1520 wrote to memory of 4908 1520 E232.tmp 84 PID 4908 wrote to memory of 3424 4908 E416.tmp 86 PID 4908 wrote to memory of 3424 4908 E416.tmp 86 PID 4908 wrote to memory of 3424 4908 E416.tmp 86 PID 3424 wrote to memory of 2772 3424 E510.tmp 87 PID 3424 wrote to memory of 2772 3424 E510.tmp 87 PID 3424 wrote to memory of 2772 3424 E510.tmp 87 PID 2772 wrote to memory of 2012 2772 E659.tmp 88 PID 2772 wrote to memory of 2012 2772 E659.tmp 88 PID 2772 wrote to memory of 2012 2772 E659.tmp 88 PID 2012 wrote to memory of 4852 2012 F482.tmp 89 PID 2012 wrote to memory of 4852 2012 F482.tmp 89 PID 2012 wrote to memory of 4852 2012 F482.tmp 89 PID 4852 wrote to memory of 3640 4852 F57C.tmp 90 PID 4852 wrote to memory of 3640 4852 F57C.tmp 90 PID 4852 wrote to memory of 3640 4852 F57C.tmp 90 PID 3640 wrote to memory of 5052 3640 F666.tmp 91 PID 3640 wrote to memory of 5052 3640 F666.tmp 91 PID 3640 wrote to memory of 5052 3640 F666.tmp 91 PID 5052 wrote to memory of 2884 5052 F750.tmp 92 PID 5052 wrote to memory of 2884 5052 F750.tmp 92 PID 5052 wrote to memory of 2884 5052 F750.tmp 92 PID 2884 wrote to memory of 3956 2884 F80C.tmp 93 PID 2884 wrote to memory of 3956 2884 F80C.tmp 93 PID 2884 wrote to memory of 3956 2884 F80C.tmp 93 PID 3956 wrote to memory of 3972 3956 F8C7.tmp 94 PID 3956 wrote to memory of 3972 3956 F8C7.tmp 94 PID 3956 wrote to memory of 3972 3956 F8C7.tmp 94 PID 3972 wrote to memory of 1464 3972 F973.tmp 95 PID 3972 wrote to memory of 1464 3972 F973.tmp 95 PID 3972 wrote to memory of 1464 3972 F973.tmp 95 PID 1464 wrote to memory of 1516 1464 FA3E.tmp 96 PID 1464 wrote to memory of 1516 1464 FA3E.tmp 96 PID 1464 wrote to memory of 1516 1464 FA3E.tmp 96 PID 1516 wrote to memory of 2656 1516 FAFA.tmp 97 PID 1516 wrote to memory of 2656 1516 FAFA.tmp 97 PID 1516 wrote to memory of 2656 1516 FAFA.tmp 97 PID 2656 wrote to memory of 4484 2656 FBA6.tmp 98 PID 2656 wrote to memory of 4484 2656 FBA6.tmp 98 PID 2656 wrote to memory of 4484 2656 FBA6.tmp 98 PID 4484 wrote to memory of 3300 4484 FC52.tmp 99 PID 4484 wrote to memory of 3300 4484 FC52.tmp 99 PID 4484 wrote to memory of 3300 4484 FC52.tmp 99 PID 3300 wrote to memory of 3740 3300 FD0D.tmp 100 PID 3300 wrote to memory of 3740 3300 FD0D.tmp 100 PID 3300 wrote to memory of 3740 3300 FD0D.tmp 100 PID 3740 wrote to memory of 2628 3740 FDB9.tmp 101 PID 3740 wrote to memory of 2628 3740 FDB9.tmp 101 PID 3740 wrote to memory of 2628 3740 FDB9.tmp 101 PID 2628 wrote to memory of 3716 2628 FE74.tmp 102 PID 2628 wrote to memory of 3716 2628 FE74.tmp 102 PID 2628 wrote to memory of 3716 2628 FE74.tmp 102 PID 3716 wrote to memory of 3492 3716 FF6E.tmp 103 PID 3716 wrote to memory of 3492 3716 FF6E.tmp 103 PID 3716 wrote to memory of 3492 3716 FF6E.tmp 103 PID 3492 wrote to memory of 4436 3492 59.tmp 104 PID 3492 wrote to memory of 4436 3492 59.tmp 104 PID 3492 wrote to memory of 4436 3492 59.tmp 104 PID 4436 wrote to memory of 2944 4436 114.tmp 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_aba8edeae8cee0dff91b5bf87027d3ca_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_aba8edeae8cee0dff91b5bf87027d3ca_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\E232.tmp"C:\Users\Admin\AppData\Local\Temp\E232.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\E416.tmp"C:\Users\Admin\AppData\Local\Temp\E416.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\E510.tmp"C:\Users\Admin\AppData\Local\Temp\E510.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\E659.tmp"C:\Users\Admin\AppData\Local\Temp\E659.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\F482.tmp"C:\Users\Admin\AppData\Local\Temp\F482.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\F57C.tmp"C:\Users\Admin\AppData\Local\Temp\F57C.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\F666.tmp"C:\Users\Admin\AppData\Local\Temp\F666.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\F750.tmp"C:\Users\Admin\AppData\Local\Temp\F750.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\F80C.tmp"C:\Users\Admin\AppData\Local\Temp\F80C.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\F8C7.tmp"C:\Users\Admin\AppData\Local\Temp\F8C7.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\F973.tmp"C:\Users\Admin\AppData\Local\Temp\F973.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"C:\Users\Admin\AppData\Local\Temp\FA3E.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"C:\Users\Admin\AppData\Local\Temp\FBA6.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\FD0D.tmp"C:\Users\Admin\AppData\Local\Temp\FD0D.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\FDB9.tmp"C:\Users\Admin\AppData\Local\Temp\FDB9.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\FE74.tmp"C:\Users\Admin\AppData\Local\Temp\FE74.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\FF6E.tmp"C:\Users\Admin\AppData\Local\Temp\FF6E.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\59.tmp"C:\Users\Admin\AppData\Local\Temp\59.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\114.tmp"C:\Users\Admin\AppData\Local\Temp\114.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\1B1.tmp"C:\Users\Admin\AppData\Local\Temp\1B1.tmp"23⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\24D.tmp"C:\Users\Admin\AppData\Local\Temp\24D.tmp"24⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\2D9.tmp"C:\Users\Admin\AppData\Local\Temp\2D9.tmp"25⤵
- Executes dropped EXE
PID:724 -
C:\Users\Admin\AppData\Local\Temp\3A5.tmp"C:\Users\Admin\AppData\Local\Temp\3A5.tmp"26⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\441.tmp"C:\Users\Admin\AppData\Local\Temp\441.tmp"27⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\4DD.tmp"C:\Users\Admin\AppData\Local\Temp\4DD.tmp"28⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\599.tmp"C:\Users\Admin\AppData\Local\Temp\599.tmp"29⤵
- Executes dropped EXE
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\683.tmp"C:\Users\Admin\AppData\Local\Temp\683.tmp"30⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\76D.tmp"C:\Users\Admin\AppData\Local\Temp\76D.tmp"31⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\848.tmp"C:\Users\Admin\AppData\Local\Temp\848.tmp"32⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\952.tmp"C:\Users\Admin\AppData\Local\Temp\952.tmp"33⤵
- Executes dropped EXE
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\9DE.tmp"C:\Users\Admin\AppData\Local\Temp\9DE.tmp"34⤵
- Executes dropped EXE
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\A7B.tmp"C:\Users\Admin\AppData\Local\Temp\A7B.tmp"35⤵
- Executes dropped EXE
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\B55.tmp"C:\Users\Admin\AppData\Local\Temp\B55.tmp"36⤵
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\C01.tmp"C:\Users\Admin\AppData\Local\Temp\C01.tmp"37⤵
- Executes dropped EXE
PID:644 -
C:\Users\Admin\AppData\Local\Temp\C9D.tmp"C:\Users\Admin\AppData\Local\Temp\C9D.tmp"38⤵
- Executes dropped EXE
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\D59.tmp"C:\Users\Admin\AppData\Local\Temp\D59.tmp"39⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\DE6.tmp"C:\Users\Admin\AppData\Local\Temp\DE6.tmp"40⤵
- Executes dropped EXE
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\E82.tmp"C:\Users\Admin\AppData\Local\Temp\E82.tmp"41⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\F5D.tmp"C:\Users\Admin\AppData\Local\Temp\F5D.tmp"42⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\FF9.tmp"C:\Users\Admin\AppData\Local\Temp\FF9.tmp"43⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\11AE.tmp"C:\Users\Admin\AppData\Local\Temp\11AE.tmp"44⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\125A.tmp"C:\Users\Admin\AppData\Local\Temp\125A.tmp"45⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\1354.tmp"C:\Users\Admin\AppData\Local\Temp\1354.tmp"46⤵
- Executes dropped EXE
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\143F.tmp"C:\Users\Admin\AppData\Local\Temp\143F.tmp"47⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\15A6.tmp"C:\Users\Admin\AppData\Local\Temp\15A6.tmp"48⤵
- Executes dropped EXE
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\1681.tmp"C:\Users\Admin\AppData\Local\Temp\1681.tmp"49⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\172D.tmp"C:\Users\Admin\AppData\Local\Temp\172D.tmp"50⤵
- Executes dropped EXE
PID:828 -
C:\Users\Admin\AppData\Local\Temp\17D8.tmp"C:\Users\Admin\AppData\Local\Temp\17D8.tmp"51⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\1875.tmp"C:\Users\Admin\AppData\Local\Temp\1875.tmp"52⤵
- Executes dropped EXE
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\1930.tmp"C:\Users\Admin\AppData\Local\Temp\1930.tmp"53⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\19CC.tmp"C:\Users\Admin\AppData\Local\Temp\19CC.tmp"54⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\1A49.tmp"C:\Users\Admin\AppData\Local\Temp\1A49.tmp"55⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"56⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\1BB1.tmp"C:\Users\Admin\AppData\Local\Temp\1BB1.tmp"57⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\1C3D.tmp"C:\Users\Admin\AppData\Local\Temp\1C3D.tmp"58⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"C:\Users\Admin\AppData\Local\Temp\1CBA.tmp"59⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\1D57.tmp"C:\Users\Admin\AppData\Local\Temp\1D57.tmp"60⤵
- Executes dropped EXE
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\1E31.tmp"C:\Users\Admin\AppData\Local\Temp\1E31.tmp"61⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\1EDD.tmp"C:\Users\Admin\AppData\Local\Temp\1EDD.tmp"62⤵
- Executes dropped EXE
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"63⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\2035.tmp"C:\Users\Admin\AppData\Local\Temp\2035.tmp"64⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\21DB.tmp"C:\Users\Admin\AppData\Local\Temp\21DB.tmp"65⤵
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\2268.tmp"C:\Users\Admin\AppData\Local\Temp\2268.tmp"66⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\22E5.tmp"C:\Users\Admin\AppData\Local\Temp\22E5.tmp"67⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\2362.tmp"C:\Users\Admin\AppData\Local\Temp\2362.tmp"68⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\23EE.tmp"C:\Users\Admin\AppData\Local\Temp\23EE.tmp"69⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\247B.tmp"C:\Users\Admin\AppData\Local\Temp\247B.tmp"70⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\24E8.tmp"C:\Users\Admin\AppData\Local\Temp\24E8.tmp"71⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2556.tmp"C:\Users\Admin\AppData\Local\Temp\2556.tmp"72⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\25F2.tmp"C:\Users\Admin\AppData\Local\Temp\25F2.tmp"73⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\272A.tmp"C:\Users\Admin\AppData\Local\Temp\272A.tmp"74⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\27C7.tmp"C:\Users\Admin\AppData\Local\Temp\27C7.tmp"75⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\2844.tmp"C:\Users\Admin\AppData\Local\Temp\2844.tmp"76⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\28EF.tmp"C:\Users\Admin\AppData\Local\Temp\28EF.tmp"77⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\298C.tmp"C:\Users\Admin\AppData\Local\Temp\298C.tmp"78⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\2A28.tmp"C:\Users\Admin\AppData\Local\Temp\2A28.tmp"79⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"80⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\2B80.tmp"C:\Users\Admin\AppData\Local\Temp\2B80.tmp"81⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"C:\Users\Admin\AppData\Local\Temp\2BFD.tmp"82⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"C:\Users\Admin\AppData\Local\Temp\2C7A.tmp"83⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\2CF7.tmp"C:\Users\Admin\AppData\Local\Temp\2CF7.tmp"84⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\2D93.tmp"C:\Users\Admin\AppData\Local\Temp\2D93.tmp"85⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\2E10.tmp"C:\Users\Admin\AppData\Local\Temp\2E10.tmp"86⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\2E9D.tmp"C:\Users\Admin\AppData\Local\Temp\2E9D.tmp"87⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"88⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"C:\Users\Admin\AppData\Local\Temp\2FA6.tmp"89⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\3042.tmp"C:\Users\Admin\AppData\Local\Temp\3042.tmp"90⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\30CF.tmp"C:\Users\Admin\AppData\Local\Temp\30CF.tmp"91⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\316B.tmp"C:\Users\Admin\AppData\Local\Temp\316B.tmp"92⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\3217.tmp"C:\Users\Admin\AppData\Local\Temp\3217.tmp"93⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\32C3.tmp"C:\Users\Admin\AppData\Local\Temp\32C3.tmp"94⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"95⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"96⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\3479.tmp"C:\Users\Admin\AppData\Local\Temp\3479.tmp"97⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\3505.tmp"C:\Users\Admin\AppData\Local\Temp\3505.tmp"98⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\35A1.tmp"C:\Users\Admin\AppData\Local\Temp\35A1.tmp"99⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3767.tmp"C:\Users\Admin\AppData\Local\Temp\3767.tmp"100⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\3812.tmp"C:\Users\Admin\AppData\Local\Temp\3812.tmp"101⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\388F.tmp"C:\Users\Admin\AppData\Local\Temp\388F.tmp"102⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\393B.tmp"C:\Users\Admin\AppData\Local\Temp\393B.tmp"103⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\39B8.tmp"C:\Users\Admin\AppData\Local\Temp\39B8.tmp"104⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\3C1A.tmp"C:\Users\Admin\AppData\Local\Temp\3C1A.tmp"105⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"106⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\3D52.tmp"C:\Users\Admin\AppData\Local\Temp\3D52.tmp"107⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\3DDF.tmp"C:\Users\Admin\AppData\Local\Temp\3DDF.tmp"108⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"109⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\3FC3.tmp"C:\Users\Admin\AppData\Local\Temp\3FC3.tmp"110⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\4040.tmp"C:\Users\Admin\AppData\Local\Temp\4040.tmp"111⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\4169.tmp"C:\Users\Admin\AppData\Local\Temp\4169.tmp"112⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\4215.tmp"C:\Users\Admin\AppData\Local\Temp\4215.tmp"113⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\42E0.tmp"C:\Users\Admin\AppData\Local\Temp\42E0.tmp"114⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\436D.tmp"C:\Users\Admin\AppData\Local\Temp\436D.tmp"115⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\43F9.tmp"C:\Users\Admin\AppData\Local\Temp\43F9.tmp"116⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\4486.tmp"C:\Users\Admin\AppData\Local\Temp\4486.tmp"117⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\4513.tmp"C:\Users\Admin\AppData\Local\Temp\4513.tmp"118⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\4590.tmp"C:\Users\Admin\AppData\Local\Temp\4590.tmp"119⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\462C.tmp"C:\Users\Admin\AppData\Local\Temp\462C.tmp"120⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\4699.tmp"C:\Users\Admin\AppData\Local\Temp\4699.tmp"121⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\4726.tmp"C:\Users\Admin\AppData\Local\Temp\4726.tmp"122⤵PID:5056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-