Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
183s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_e59075d768256b7bab4099f254cae8cc_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_e59075d768256b7bab4099f254cae8cc_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_e59075d768256b7bab4099f254cae8cc_mafia_JC.exe
-
Size
486KB
-
MD5
e59075d768256b7bab4099f254cae8cc
-
SHA1
8a69ae1c837d2eaf54597fe73ae6a02a3dbdd9cb
-
SHA256
e39715cae9b5185def1e48bc2058ce20073ed967f6991c4f3035fdf5220abda1
-
SHA512
b68a7b31915bf8733eb82e2333085d599cc3e14e5bb74dbb070a6720caa6e55fb84f8586a1566a0d45f0422950ab1322000053f856b964fe14d89c3d588f9451
-
SSDEEP
12288:/U5rCOTeiDeTNOlOh6241pIBCikrloFsnLqDNZ:/UQOJDeTNOghh0lbL0N
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3532 2B41.tmp 4948 406F.tmp 1868 40EC.tmp 4024 42FF.tmp 4392 438C.tmp 1876 4447.tmp 2944 63F5.tmp 3228 6EF1.tmp 2724 7809.tmp 636 7886.tmp 1624 7971.tmp 4340 7A1D.tmp 4252 8AB7.tmp 2488 8B34.tmp 3520 8BB1.tmp 4616 9E1F.tmp 3684 A64D.tmp 4980 A6CA.tmp 1496 AFC3.tmp 4552 B66A.tmp 3064 C241.tmp 1880 CADD.tmp 3368 CBA8.tmp 4116 CC34.tmp 4208 CCD1.tmp 4772 CD8C.tmp 944 CE48.tmp 376 CF13.tmp 4820 CFFD.tmp 556 D0A9.tmp 2140 D1A3.tmp 3276 D25E.tmp 1400 D2EB.tmp 412 D378.tmp 4148 D3E5.tmp 1840 D452.tmp 3080 D4CF.tmp 4340 D54C.tmp 688 D6B4.tmp 2816 D750.tmp 2972 D81B.tmp 512 D8A8.tmp 100 D906.tmp 2384 D9A2.tmp 2880 DA0F.tmp 2760 DAAB.tmp 1956 DB28.tmp 1960 DBC5.tmp 3236 DC22.tmp 2744 DC9F.tmp 3472 DD3C.tmp 2208 DDC8.tmp 920 DE55.tmp 4568 DEC2.tmp 2560 DF3F.tmp 3948 DFAD.tmp 4092 E068.tmp 3432 E124.tmp 5088 E1DF.tmp 3040 E26C.tmp 4432 E2E9.tmp 1880 E366.tmp 4008 E3E3.tmp 4288 E46F.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4324 wrote to memory of 3532 4324 2023-08-25_e59075d768256b7bab4099f254cae8cc_mafia_JC.exe 88 PID 4324 wrote to memory of 3532 4324 2023-08-25_e59075d768256b7bab4099f254cae8cc_mafia_JC.exe 88 PID 4324 wrote to memory of 3532 4324 2023-08-25_e59075d768256b7bab4099f254cae8cc_mafia_JC.exe 88 PID 3532 wrote to memory of 4948 3532 2B41.tmp 89 PID 3532 wrote to memory of 4948 3532 2B41.tmp 89 PID 3532 wrote to memory of 4948 3532 2B41.tmp 89 PID 4948 wrote to memory of 1868 4948 406F.tmp 90 PID 4948 wrote to memory of 1868 4948 406F.tmp 90 PID 4948 wrote to memory of 1868 4948 406F.tmp 90 PID 1868 wrote to memory of 4024 1868 40EC.tmp 91 PID 1868 wrote to memory of 4024 1868 40EC.tmp 91 PID 1868 wrote to memory of 4024 1868 40EC.tmp 91 PID 4024 wrote to memory of 4392 4024 42FF.tmp 92 PID 4024 wrote to memory of 4392 4024 42FF.tmp 92 PID 4024 wrote to memory of 4392 4024 42FF.tmp 92 PID 4392 wrote to memory of 1876 4392 438C.tmp 93 PID 4392 wrote to memory of 1876 4392 438C.tmp 93 PID 4392 wrote to memory of 1876 4392 438C.tmp 93 PID 1876 wrote to memory of 2944 1876 4447.tmp 94 PID 1876 wrote to memory of 2944 1876 4447.tmp 94 PID 1876 wrote to memory of 2944 1876 4447.tmp 94 PID 2944 wrote to memory of 3228 2944 63F5.tmp 95 PID 2944 wrote to memory of 3228 2944 63F5.tmp 95 PID 2944 wrote to memory of 3228 2944 63F5.tmp 95 PID 3228 wrote to memory of 2724 3228 6EF1.tmp 97 PID 3228 wrote to memory of 2724 3228 6EF1.tmp 97 PID 3228 wrote to memory of 2724 3228 6EF1.tmp 97 PID 2724 wrote to memory of 636 2724 7809.tmp 98 PID 2724 wrote to memory of 636 2724 7809.tmp 98 PID 2724 wrote to memory of 636 2724 7809.tmp 98 PID 636 wrote to memory of 1624 636 7886.tmp 99 PID 636 wrote to memory of 1624 636 7886.tmp 99 PID 636 wrote to memory of 1624 636 7886.tmp 99 PID 1624 wrote to memory of 4340 1624 7971.tmp 100 PID 1624 wrote to memory of 4340 1624 7971.tmp 100 PID 1624 wrote to memory of 4340 1624 7971.tmp 100 PID 4340 wrote to memory of 4252 4340 7A1D.tmp 102 PID 4340 wrote to memory of 4252 4340 7A1D.tmp 102 PID 4340 wrote to memory of 4252 4340 7A1D.tmp 102 PID 4252 wrote to memory of 2488 4252 8AB7.tmp 103 PID 4252 wrote to memory of 2488 4252 8AB7.tmp 103 PID 4252 wrote to memory of 2488 4252 8AB7.tmp 103 PID 2488 wrote to memory of 3520 2488 8B34.tmp 104 PID 2488 wrote to memory of 3520 2488 8B34.tmp 104 PID 2488 wrote to memory of 3520 2488 8B34.tmp 104 PID 3520 wrote to memory of 4616 3520 8BB1.tmp 108 PID 3520 wrote to memory of 4616 3520 8BB1.tmp 108 PID 3520 wrote to memory of 4616 3520 8BB1.tmp 108 PID 4616 wrote to memory of 3684 4616 9E1F.tmp 109 PID 4616 wrote to memory of 3684 4616 9E1F.tmp 109 PID 4616 wrote to memory of 3684 4616 9E1F.tmp 109 PID 3684 wrote to memory of 4980 3684 A64D.tmp 110 PID 3684 wrote to memory of 4980 3684 A64D.tmp 110 PID 3684 wrote to memory of 4980 3684 A64D.tmp 110 PID 4980 wrote to memory of 1496 4980 A6CA.tmp 111 PID 4980 wrote to memory of 1496 4980 A6CA.tmp 111 PID 4980 wrote to memory of 1496 4980 A6CA.tmp 111 PID 1496 wrote to memory of 4552 1496 AFC3.tmp 113 PID 1496 wrote to memory of 4552 1496 AFC3.tmp 113 PID 1496 wrote to memory of 4552 1496 AFC3.tmp 113 PID 4552 wrote to memory of 3064 4552 B66A.tmp 114 PID 4552 wrote to memory of 3064 4552 B66A.tmp 114 PID 4552 wrote to memory of 3064 4552 B66A.tmp 114 PID 4436 wrote to memory of 1880 4436 C9C3.tmp 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_e59075d768256b7bab4099f254cae8cc_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_e59075d768256b7bab4099f254cae8cc_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\2B41.tmp"C:\Users\Admin\AppData\Local\Temp\2B41.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\406F.tmp"C:\Users\Admin\AppData\Local\Temp\406F.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\40EC.tmp"C:\Users\Admin\AppData\Local\Temp\40EC.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\42FF.tmp"C:\Users\Admin\AppData\Local\Temp\42FF.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\438C.tmp"C:\Users\Admin\AppData\Local\Temp\438C.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\4447.tmp"C:\Users\Admin\AppData\Local\Temp\4447.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\63F5.tmp"C:\Users\Admin\AppData\Local\Temp\63F5.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\6EF1.tmp"C:\Users\Admin\AppData\Local\Temp\6EF1.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\7809.tmp"C:\Users\Admin\AppData\Local\Temp\7809.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\7886.tmp"C:\Users\Admin\AppData\Local\Temp\7886.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\7971.tmp"C:\Users\Admin\AppData\Local\Temp\7971.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"C:\Users\Admin\AppData\Local\Temp\7A1D.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\8AB7.tmp"C:\Users\Admin\AppData\Local\Temp\8AB7.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\8B34.tmp"C:\Users\Admin\AppData\Local\Temp\8B34.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\8BB1.tmp"C:\Users\Admin\AppData\Local\Temp\8BB1.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\9E1F.tmp"C:\Users\Admin\AppData\Local\Temp\9E1F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\A64D.tmp"C:\Users\Admin\AppData\Local\Temp\A64D.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\A6CA.tmp"C:\Users\Admin\AppData\Local\Temp\A6CA.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\AFC3.tmp"C:\Users\Admin\AppData\Local\Temp\AFC3.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\B66A.tmp"C:\Users\Admin\AppData\Local\Temp\B66A.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\C241.tmp"C:\Users\Admin\AppData\Local\Temp\C241.tmp"22⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\C9C3.tmp"C:\Users\Admin\AppData\Local\Temp\C9C3.tmp"23⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\CADD.tmp"C:\Users\Admin\AppData\Local\Temp\CADD.tmp"24⤵
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\CBA8.tmp"C:\Users\Admin\AppData\Local\Temp\CBA8.tmp"25⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\CC34.tmp"C:\Users\Admin\AppData\Local\Temp\CC34.tmp"26⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\CCD1.tmp"C:\Users\Admin\AppData\Local\Temp\CCD1.tmp"27⤵
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\CD8C.tmp"C:\Users\Admin\AppData\Local\Temp\CD8C.tmp"28⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\CE48.tmp"C:\Users\Admin\AppData\Local\Temp\CE48.tmp"29⤵
- Executes dropped EXE
PID:944 -
C:\Users\Admin\AppData\Local\Temp\CF13.tmp"C:\Users\Admin\AppData\Local\Temp\CF13.tmp"30⤵
- Executes dropped EXE
PID:376 -
C:\Users\Admin\AppData\Local\Temp\CFFD.tmp"C:\Users\Admin\AppData\Local\Temp\CFFD.tmp"31⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\D0A9.tmp"C:\Users\Admin\AppData\Local\Temp\D0A9.tmp"32⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\D1A3.tmp"C:\Users\Admin\AppData\Local\Temp\D1A3.tmp"33⤵
- Executes dropped EXE
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\D25E.tmp"C:\Users\Admin\AppData\Local\Temp\D25E.tmp"34⤵
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\D2EB.tmp"C:\Users\Admin\AppData\Local\Temp\D2EB.tmp"35⤵
- Executes dropped EXE
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\D378.tmp"C:\Users\Admin\AppData\Local\Temp\D378.tmp"36⤵
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\D3E5.tmp"C:\Users\Admin\AppData\Local\Temp\D3E5.tmp"37⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\D452.tmp"C:\Users\Admin\AppData\Local\Temp\D452.tmp"38⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\D4CF.tmp"C:\Users\Admin\AppData\Local\Temp\D4CF.tmp"39⤵
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\D54C.tmp"C:\Users\Admin\AppData\Local\Temp\D54C.tmp"40⤵
- Executes dropped EXE
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\D6B4.tmp"C:\Users\Admin\AppData\Local\Temp\D6B4.tmp"41⤵
- Executes dropped EXE
PID:688 -
C:\Users\Admin\AppData\Local\Temp\D750.tmp"C:\Users\Admin\AppData\Local\Temp\D750.tmp"42⤵
- Executes dropped EXE
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\D81B.tmp"C:\Users\Admin\AppData\Local\Temp\D81B.tmp"43⤵
- Executes dropped EXE
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\D8A8.tmp"C:\Users\Admin\AppData\Local\Temp\D8A8.tmp"44⤵
- Executes dropped EXE
PID:512 -
C:\Users\Admin\AppData\Local\Temp\D906.tmp"C:\Users\Admin\AppData\Local\Temp\D906.tmp"45⤵
- Executes dropped EXE
PID:100 -
C:\Users\Admin\AppData\Local\Temp\D9A2.tmp"C:\Users\Admin\AppData\Local\Temp\D9A2.tmp"46⤵
- Executes dropped EXE
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\DA0F.tmp"C:\Users\Admin\AppData\Local\Temp\DA0F.tmp"47⤵
- Executes dropped EXE
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\DAAB.tmp"C:\Users\Admin\AppData\Local\Temp\DAAB.tmp"48⤵
- Executes dropped EXE
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\DB28.tmp"C:\Users\Admin\AppData\Local\Temp\DB28.tmp"49⤵
- Executes dropped EXE
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\DBC5.tmp"C:\Users\Admin\AppData\Local\Temp\DBC5.tmp"50⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\DC22.tmp"C:\Users\Admin\AppData\Local\Temp\DC22.tmp"51⤵
- Executes dropped EXE
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\DC9F.tmp"C:\Users\Admin\AppData\Local\Temp\DC9F.tmp"52⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\DD3C.tmp"C:\Users\Admin\AppData\Local\Temp\DD3C.tmp"53⤵
- Executes dropped EXE
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\DDC8.tmp"C:\Users\Admin\AppData\Local\Temp\DDC8.tmp"54⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\DE55.tmp"C:\Users\Admin\AppData\Local\Temp\DE55.tmp"55⤵
- Executes dropped EXE
PID:920 -
C:\Users\Admin\AppData\Local\Temp\DEC2.tmp"C:\Users\Admin\AppData\Local\Temp\DEC2.tmp"56⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\DF3F.tmp"C:\Users\Admin\AppData\Local\Temp\DF3F.tmp"57⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\DFAD.tmp"C:\Users\Admin\AppData\Local\Temp\DFAD.tmp"58⤵
- Executes dropped EXE
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\E068.tmp"C:\Users\Admin\AppData\Local\Temp\E068.tmp"59⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\E124.tmp"C:\Users\Admin\AppData\Local\Temp\E124.tmp"60⤵
- Executes dropped EXE
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\E1DF.tmp"C:\Users\Admin\AppData\Local\Temp\E1DF.tmp"61⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\E26C.tmp"C:\Users\Admin\AppData\Local\Temp\E26C.tmp"62⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\E2E9.tmp"C:\Users\Admin\AppData\Local\Temp\E2E9.tmp"63⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\E366.tmp"C:\Users\Admin\AppData\Local\Temp\E366.tmp"64⤵
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\E3E3.tmp"C:\Users\Admin\AppData\Local\Temp\E3E3.tmp"65⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\E46F.tmp"C:\Users\Admin\AppData\Local\Temp\E46F.tmp"66⤵
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\E51B.tmp"C:\Users\Admin\AppData\Local\Temp\E51B.tmp"67⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\E589.tmp"C:\Users\Admin\AppData\Local\Temp\E589.tmp"68⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\E615.tmp"C:\Users\Admin\AppData\Local\Temp\E615.tmp"69⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\E6D1.tmp"C:\Users\Admin\AppData\Local\Temp\E6D1.tmp"70⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\E74E.tmp"C:\Users\Admin\AppData\Local\Temp\E74E.tmp"71⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\E877.tmp"C:\Users\Admin\AppData\Local\Temp\E877.tmp"72⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\E923.tmp"C:\Users\Admin\AppData\Local\Temp\E923.tmp"73⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\E9BF.tmp"C:\Users\Admin\AppData\Local\Temp\E9BF.tmp"74⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\EA1D.tmp"C:\Users\Admin\AppData\Local\Temp\EA1D.tmp"75⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\EAA9.tmp"C:\Users\Admin\AppData\Local\Temp\EAA9.tmp"76⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\EB45.tmp"C:\Users\Admin\AppData\Local\Temp\EB45.tmp"77⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\EBC2.tmp"C:\Users\Admin\AppData\Local\Temp\EBC2.tmp"78⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\EC30.tmp"C:\Users\Admin\AppData\Local\Temp\EC30.tmp"79⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\EC8E.tmp"C:\Users\Admin\AppData\Local\Temp\EC8E.tmp"80⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\ED1A.tmp"C:\Users\Admin\AppData\Local\Temp\ED1A.tmp"81⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\EDA7.tmp"C:\Users\Admin\AppData\Local\Temp\EDA7.tmp"82⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\EE14.tmp"C:\Users\Admin\AppData\Local\Temp\EE14.tmp"83⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\EE82.tmp"C:\Users\Admin\AppData\Local\Temp\EE82.tmp"84⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\EEFF.tmp"C:\Users\Admin\AppData\Local\Temp\EEFF.tmp"85⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\EF6C.tmp"C:\Users\Admin\AppData\Local\Temp\EF6C.tmp"86⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\EFE9.tmp"C:\Users\Admin\AppData\Local\Temp\EFE9.tmp"87⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\F056.tmp"C:\Users\Admin\AppData\Local\Temp\F056.tmp"88⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\F0C4.tmp"C:\Users\Admin\AppData\Local\Temp\F0C4.tmp"89⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\F160.tmp"C:\Users\Admin\AppData\Local\Temp\F160.tmp"90⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\F1DD.tmp"C:\Users\Admin\AppData\Local\Temp\F1DD.tmp"91⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\F24A.tmp"C:\Users\Admin\AppData\Local\Temp\F24A.tmp"92⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\F2D7.tmp"C:\Users\Admin\AppData\Local\Temp\F2D7.tmp"93⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\F364.tmp"C:\Users\Admin\AppData\Local\Temp\F364.tmp"94⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\F40F.tmp"C:\Users\Admin\AppData\Local\Temp\F40F.tmp"95⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\F48C.tmp"C:\Users\Admin\AppData\Local\Temp\F48C.tmp"96⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\F509.tmp"C:\Users\Admin\AppData\Local\Temp\F509.tmp"97⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\F586.tmp"C:\Users\Admin\AppData\Local\Temp\F586.tmp"98⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\F5F4.tmp"C:\Users\Admin\AppData\Local\Temp\F5F4.tmp"99⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\F661.tmp"C:\Users\Admin\AppData\Local\Temp\F661.tmp"100⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\F6CF.tmp"C:\Users\Admin\AppData\Local\Temp\F6CF.tmp"101⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\F74C.tmp"C:\Users\Admin\AppData\Local\Temp\F74C.tmp"102⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\F7F7.tmp"C:\Users\Admin\AppData\Local\Temp\F7F7.tmp"103⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\F894.tmp"C:\Users\Admin\AppData\Local\Temp\F894.tmp"104⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\F8F1.tmp"C:\Users\Admin\AppData\Local\Temp\F8F1.tmp"105⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\F94F.tmp"C:\Users\Admin\AppData\Local\Temp\F94F.tmp"106⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\F9FB.tmp"C:\Users\Admin\AppData\Local\Temp\F9FB.tmp"107⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\FB72.tmp"C:\Users\Admin\AppData\Local\Temp\FB72.tmp"108⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\FC2E.tmp"C:\Users\Admin\AppData\Local\Temp\FC2E.tmp"109⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\FCF9.tmp"C:\Users\Admin\AppData\Local\Temp\FCF9.tmp"110⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\FE41.tmp"C:\Users\Admin\AppData\Local\Temp\FE41.tmp"111⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\FF4A.tmp"C:\Users\Admin\AppData\Local\Temp\FF4A.tmp"112⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\44.tmp"C:\Users\Admin\AppData\Local\Temp\44.tmp"113⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\1DB.tmp"C:\Users\Admin\AppData\Local\Temp\1DB.tmp"114⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\267.tmp"C:\Users\Admin\AppData\Local\Temp\267.tmp"115⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\2E4.tmp"C:\Users\Admin\AppData\Local\Temp\2E4.tmp"116⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\361.tmp"C:\Users\Admin\AppData\Local\Temp\361.tmp"117⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\44C.tmp"C:\Users\Admin\AppData\Local\Temp\44C.tmp"118⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\4C9.tmp"C:\Users\Admin\AppData\Local\Temp\4C9.tmp"119⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\536.tmp"C:\Users\Admin\AppData\Local\Temp\536.tmp"120⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\5A3.tmp"C:\Users\Admin\AppData\Local\Temp\5A3.tmp"121⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\620.tmp"C:\Users\Admin\AppData\Local\Temp\620.tmp"122⤵PID:3092
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-