Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_dd07d2fab81f84d6ec1ee689873c346f_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_dd07d2fab81f84d6ec1ee689873c346f_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_dd07d2fab81f84d6ec1ee689873c346f_mafia_JC.exe
-
Size
486KB
-
MD5
dd07d2fab81f84d6ec1ee689873c346f
-
SHA1
057d2f2374412f3fa3488c5713de9dec56d5035c
-
SHA256
6f07182bd5cb81c9bf162cb45907eab3422450801ef31c5872bbf25d87b611fe
-
SHA512
dcc6d4ba21db1c959a8e1cecd8e67bfe11d9b4bc91a414e76a950f24584a0d73b0d17e977dfa97449294430776cfb5df042334b95bfbc355cdfc25d5a466881e
-
SSDEEP
12288:UU5rCOTeiD4gwuP/We7TDwD5jK3qc01k+DjNZ:UUQOJDHw2/LT8DH1kCN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4228 B508.tmp 3520 B5C3.tmp 2204 B640.tmp 1440 B6DC.tmp 3276 B769.tmp 1308 B7E6.tmp 2844 B873.tmp 4216 B8E0.tmp 2388 B97C.tmp 1268 BA28.tmp 916 BAB5.tmp 2136 BB61.tmp 3624 BBDE.tmp 532 BC99.tmp 2572 BD35.tmp 1940 BDD2.tmp 4140 BE4F.tmp 4388 BF0A.tmp 5028 BFB6.tmp 3808 C033.tmp 1368 C0CF.tmp 880 C14C.tmp 3716 C1BA.tmp 3012 C340.tmp 2232 C39E.tmp 2084 C4B7.tmp 3128 C544.tmp 1632 C5C1.tmp 1908 C64D.tmp 3332 C6F9.tmp 3916 C7C4.tmp 3388 C861.tmp 3476 C92C.tmp 4588 C999.tmp 2180 CA26.tmp 4536 CAA3.tmp 4016 CB2F.tmp 3908 CBBC.tmp 4628 CC29.tmp 2200 CC97.tmp 5052 CD14.tmp 4316 CD91.tmp 4012 CF08.tmp 3668 CF94.tmp 4884 D011.tmp 536 D09E.tmp 3076 D11B.tmp 2388 D1A8.tmp 1268 D225.tmp 4736 D2B1.tmp 2808 D33E.tmp 3944 D3CB.tmp 3828 D457.tmp 4132 D4F3.tmp 2188 D580.tmp 4580 D61C.tmp 2392 D6B9.tmp 1756 D745.tmp 4168 D7D2.tmp 2704 D8DB.tmp 4624 D958.tmp 5028 D9D5.tmp 2868 DA52.tmp 1164 DAB0.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4228 2180 2023-08-25_dd07d2fab81f84d6ec1ee689873c346f_mafia_JC.exe 86 PID 2180 wrote to memory of 4228 2180 2023-08-25_dd07d2fab81f84d6ec1ee689873c346f_mafia_JC.exe 86 PID 2180 wrote to memory of 4228 2180 2023-08-25_dd07d2fab81f84d6ec1ee689873c346f_mafia_JC.exe 86 PID 4228 wrote to memory of 3520 4228 B508.tmp 87 PID 4228 wrote to memory of 3520 4228 B508.tmp 87 PID 4228 wrote to memory of 3520 4228 B508.tmp 87 PID 3520 wrote to memory of 2204 3520 B5C3.tmp 88 PID 3520 wrote to memory of 2204 3520 B5C3.tmp 88 PID 3520 wrote to memory of 2204 3520 B5C3.tmp 88 PID 2204 wrote to memory of 1440 2204 B640.tmp 89 PID 2204 wrote to memory of 1440 2204 B640.tmp 89 PID 2204 wrote to memory of 1440 2204 B640.tmp 89 PID 1440 wrote to memory of 3276 1440 B6DC.tmp 90 PID 1440 wrote to memory of 3276 1440 B6DC.tmp 90 PID 1440 wrote to memory of 3276 1440 B6DC.tmp 90 PID 3276 wrote to memory of 1308 3276 B769.tmp 91 PID 3276 wrote to memory of 1308 3276 B769.tmp 91 PID 3276 wrote to memory of 1308 3276 B769.tmp 91 PID 1308 wrote to memory of 2844 1308 B7E6.tmp 92 PID 1308 wrote to memory of 2844 1308 B7E6.tmp 92 PID 1308 wrote to memory of 2844 1308 B7E6.tmp 92 PID 2844 wrote to memory of 4216 2844 B873.tmp 93 PID 2844 wrote to memory of 4216 2844 B873.tmp 93 PID 2844 wrote to memory of 4216 2844 B873.tmp 93 PID 4216 wrote to memory of 2388 4216 B8E0.tmp 94 PID 4216 wrote to memory of 2388 4216 B8E0.tmp 94 PID 4216 wrote to memory of 2388 4216 B8E0.tmp 94 PID 2388 wrote to memory of 1268 2388 B97C.tmp 95 PID 2388 wrote to memory of 1268 2388 B97C.tmp 95 PID 2388 wrote to memory of 1268 2388 B97C.tmp 95 PID 1268 wrote to memory of 916 1268 BA28.tmp 96 PID 1268 wrote to memory of 916 1268 BA28.tmp 96 PID 1268 wrote to memory of 916 1268 BA28.tmp 96 PID 916 wrote to memory of 2136 916 BAB5.tmp 97 PID 916 wrote to memory of 2136 916 BAB5.tmp 97 PID 916 wrote to memory of 2136 916 BAB5.tmp 97 PID 2136 wrote to memory of 3624 2136 BB61.tmp 98 PID 2136 wrote to memory of 3624 2136 BB61.tmp 98 PID 2136 wrote to memory of 3624 2136 BB61.tmp 98 PID 3624 wrote to memory of 532 3624 BBDE.tmp 99 PID 3624 wrote to memory of 532 3624 BBDE.tmp 99 PID 3624 wrote to memory of 532 3624 BBDE.tmp 99 PID 532 wrote to memory of 2572 532 BC99.tmp 100 PID 532 wrote to memory of 2572 532 BC99.tmp 100 PID 532 wrote to memory of 2572 532 BC99.tmp 100 PID 2572 wrote to memory of 1940 2572 BD35.tmp 102 PID 2572 wrote to memory of 1940 2572 BD35.tmp 102 PID 2572 wrote to memory of 1940 2572 BD35.tmp 102 PID 1940 wrote to memory of 4140 1940 BDD2.tmp 103 PID 1940 wrote to memory of 4140 1940 BDD2.tmp 103 PID 1940 wrote to memory of 4140 1940 BDD2.tmp 103 PID 4140 wrote to memory of 4388 4140 BE4F.tmp 104 PID 4140 wrote to memory of 4388 4140 BE4F.tmp 104 PID 4140 wrote to memory of 4388 4140 BE4F.tmp 104 PID 4388 wrote to memory of 5028 4388 BF0A.tmp 107 PID 4388 wrote to memory of 5028 4388 BF0A.tmp 107 PID 4388 wrote to memory of 5028 4388 BF0A.tmp 107 PID 5028 wrote to memory of 3808 5028 BFB6.tmp 109 PID 5028 wrote to memory of 3808 5028 BFB6.tmp 109 PID 5028 wrote to memory of 3808 5028 BFB6.tmp 109 PID 3808 wrote to memory of 1368 3808 C033.tmp 110 PID 3808 wrote to memory of 1368 3808 C033.tmp 110 PID 3808 wrote to memory of 1368 3808 C033.tmp 110 PID 1368 wrote to memory of 880 1368 C0CF.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_dd07d2fab81f84d6ec1ee689873c346f_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_dd07d2fab81f84d6ec1ee689873c346f_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\B508.tmp"C:\Users\Admin\AppData\Local\Temp\B508.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\B5C3.tmp"C:\Users\Admin\AppData\Local\Temp\B5C3.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\B640.tmp"C:\Users\Admin\AppData\Local\Temp\B640.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\B769.tmp"C:\Users\Admin\AppData\Local\Temp\B769.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"C:\Users\Admin\AppData\Local\Temp\B7E6.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\B873.tmp"C:\Users\Admin\AppData\Local\Temp\B873.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\B8E0.tmp"C:\Users\Admin\AppData\Local\Temp\B8E0.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\B97C.tmp"C:\Users\Admin\AppData\Local\Temp\B97C.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\BA28.tmp"C:\Users\Admin\AppData\Local\Temp\BA28.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\BAB5.tmp"C:\Users\Admin\AppData\Local\Temp\BAB5.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\BB61.tmp"C:\Users\Admin\AppData\Local\Temp\BB61.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\BC99.tmp"C:\Users\Admin\AppData\Local\Temp\BC99.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\BD35.tmp"C:\Users\Admin\AppData\Local\Temp\BD35.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"C:\Users\Admin\AppData\Local\Temp\BF0A.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\BFB6.tmp"C:\Users\Admin\AppData\Local\Temp\BFB6.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\C033.tmp"C:\Users\Admin\AppData\Local\Temp\C033.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\C0CF.tmp"C:\Users\Admin\AppData\Local\Temp\C0CF.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\C14C.tmp"C:\Users\Admin\AppData\Local\Temp\C14C.tmp"23⤵
- Executes dropped EXE
PID:880 -
C:\Users\Admin\AppData\Local\Temp\C1BA.tmp"C:\Users\Admin\AppData\Local\Temp\C1BA.tmp"24⤵
- Executes dropped EXE
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\C340.tmp"C:\Users\Admin\AppData\Local\Temp\C340.tmp"25⤵
- Executes dropped EXE
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\C39E.tmp"C:\Users\Admin\AppData\Local\Temp\C39E.tmp"26⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"27⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\C544.tmp"C:\Users\Admin\AppData\Local\Temp\C544.tmp"28⤵
- Executes dropped EXE
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"29⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\C64D.tmp"C:\Users\Admin\AppData\Local\Temp\C64D.tmp"30⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"C:\Users\Admin\AppData\Local\Temp\C6F9.tmp"31⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\C7C4.tmp"C:\Users\Admin\AppData\Local\Temp\C7C4.tmp"32⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\C861.tmp"C:\Users\Admin\AppData\Local\Temp\C861.tmp"33⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\C92C.tmp"C:\Users\Admin\AppData\Local\Temp\C92C.tmp"34⤵
- Executes dropped EXE
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\C999.tmp"C:\Users\Admin\AppData\Local\Temp\C999.tmp"35⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\CA26.tmp"C:\Users\Admin\AppData\Local\Temp\CA26.tmp"36⤵
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\CAA3.tmp"C:\Users\Admin\AppData\Local\Temp\CAA3.tmp"37⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"38⤵
- Executes dropped EXE
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"C:\Users\Admin\AppData\Local\Temp\CBBC.tmp"39⤵
- Executes dropped EXE
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\CC29.tmp"C:\Users\Admin\AppData\Local\Temp\CC29.tmp"40⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\CC97.tmp"C:\Users\Admin\AppData\Local\Temp\CC97.tmp"41⤵
- Executes dropped EXE
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\CD14.tmp"C:\Users\Admin\AppData\Local\Temp\CD14.tmp"42⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\CD91.tmp"C:\Users\Admin\AppData\Local\Temp\CD91.tmp"43⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\CF08.tmp"C:\Users\Admin\AppData\Local\Temp\CF08.tmp"44⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\CF94.tmp"C:\Users\Admin\AppData\Local\Temp\CF94.tmp"45⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\D011.tmp"C:\Users\Admin\AppData\Local\Temp\D011.tmp"46⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\D09E.tmp"C:\Users\Admin\AppData\Local\Temp\D09E.tmp"47⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\D11B.tmp"C:\Users\Admin\AppData\Local\Temp\D11B.tmp"48⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"49⤵
- Executes dropped EXE
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\D225.tmp"C:\Users\Admin\AppData\Local\Temp\D225.tmp"50⤵
- Executes dropped EXE
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"C:\Users\Admin\AppData\Local\Temp\D2B1.tmp"51⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\D33E.tmp"C:\Users\Admin\AppData\Local\Temp\D33E.tmp"52⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"53⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\D457.tmp"C:\Users\Admin\AppData\Local\Temp\D457.tmp"54⤵
- Executes dropped EXE
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"C:\Users\Admin\AppData\Local\Temp\D4F3.tmp"55⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\D580.tmp"C:\Users\Admin\AppData\Local\Temp\D580.tmp"56⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\D61C.tmp"C:\Users\Admin\AppData\Local\Temp\D61C.tmp"57⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"58⤵
- Executes dropped EXE
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\D745.tmp"C:\Users\Admin\AppData\Local\Temp\D745.tmp"59⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"60⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"61⤵
- Executes dropped EXE
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\D958.tmp"C:\Users\Admin\AppData\Local\Temp\D958.tmp"62⤵
- Executes dropped EXE
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"63⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\DA52.tmp"C:\Users\Admin\AppData\Local\Temp\DA52.tmp"64⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"C:\Users\Admin\AppData\Local\Temp\DAB0.tmp"65⤵
- Executes dropped EXE
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"66⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"67⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\DC27.tmp"C:\Users\Admin\AppData\Local\Temp\DC27.tmp"68⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"C:\Users\Admin\AppData\Local\Temp\DCB4.tmp"69⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\DD21.tmp"C:\Users\Admin\AppData\Local\Temp\DD21.tmp"70⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"C:\Users\Admin\AppData\Local\Temp\DD7F.tmp"71⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"C:\Users\Admin\AppData\Local\Temp\DDEC.tmp"72⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"73⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\DEF6.tmp"C:\Users\Admin\AppData\Local\Temp\DEF6.tmp"74⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\DF63.tmp"C:\Users\Admin\AppData\Local\Temp\DF63.tmp"75⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\DFD1.tmp"C:\Users\Admin\AppData\Local\Temp\DFD1.tmp"76⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\E02E.tmp"C:\Users\Admin\AppData\Local\Temp\E02E.tmp"77⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"C:\Users\Admin\AppData\Local\Temp\E0AB.tmp"78⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\E128.tmp"C:\Users\Admin\AppData\Local\Temp\E128.tmp"79⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"C:\Users\Admin\AppData\Local\Temp\E1B5.tmp"80⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\E232.tmp"C:\Users\Admin\AppData\Local\Temp\E232.tmp"81⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\E2BF.tmp"C:\Users\Admin\AppData\Local\Temp\E2BF.tmp"82⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\E35B.tmp"C:\Users\Admin\AppData\Local\Temp\E35B.tmp"83⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"84⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\E465.tmp"C:\Users\Admin\AppData\Local\Temp\E465.tmp"85⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\E4E2.tmp"C:\Users\Admin\AppData\Local\Temp\E4E2.tmp"86⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\E54F.tmp"C:\Users\Admin\AppData\Local\Temp\E54F.tmp"87⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"C:\Users\Admin\AppData\Local\Temp\E5BC.tmp"88⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\E659.tmp"C:\Users\Admin\AppData\Local\Temp\E659.tmp"89⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\E6D6.tmp"C:\Users\Admin\AppData\Local\Temp\E6D6.tmp"90⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\E753.tmp"C:\Users\Admin\AppData\Local\Temp\E753.tmp"91⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\E7FE.tmp"C:\Users\Admin\AppData\Local\Temp\E7FE.tmp"92⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\E87B.tmp"C:\Users\Admin\AppData\Local\Temp\E87B.tmp"93⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\E8E9.tmp"C:\Users\Admin\AppData\Local\Temp\E8E9.tmp"94⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\E985.tmp"C:\Users\Admin\AppData\Local\Temp\E985.tmp"95⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\EA12.tmp"C:\Users\Admin\AppData\Local\Temp\EA12.tmp"96⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"C:\Users\Admin\AppData\Local\Temp\EA6F.tmp"97⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\EADD.tmp"C:\Users\Admin\AppData\Local\Temp\EADD.tmp"98⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\EB89.tmp"C:\Users\Admin\AppData\Local\Temp\EB89.tmp"99⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\EBF6.tmp"C:\Users\Admin\AppData\Local\Temp\EBF6.tmp"100⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\EC73.tmp"C:\Users\Admin\AppData\Local\Temp\EC73.tmp"101⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\ECF0.tmp"C:\Users\Admin\AppData\Local\Temp\ECF0.tmp"102⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\ED4E.tmp"C:\Users\Admin\AppData\Local\Temp\ED4E.tmp"103⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"C:\Users\Admin\AppData\Local\Temp\EDCB.tmp"104⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\EE38.tmp"C:\Users\Admin\AppData\Local\Temp\EE38.tmp"105⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"106⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\EF13.tmp"C:\Users\Admin\AppData\Local\Temp\EF13.tmp"107⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\EF80.tmp"C:\Users\Admin\AppData\Local\Temp\EF80.tmp"108⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"109⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\F53D.tmp"C:\Users\Admin\AppData\Local\Temp\F53D.tmp"110⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\F6B4.tmp"C:\Users\Admin\AppData\Local\Temp\F6B4.tmp"111⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\F8E7.tmp"C:\Users\Admin\AppData\Local\Temp\F8E7.tmp"112⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"113⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\FA9C.tmp"C:\Users\Admin\AppData\Local\Temp\FA9C.tmp"114⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\FB77.tmp"C:\Users\Admin\AppData\Local\Temp\FB77.tmp"115⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\FBF4.tmp"C:\Users\Admin\AppData\Local\Temp\FBF4.tmp"116⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"C:\Users\Admin\AppData\Local\Temp\FCAF.tmp"117⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"118⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\FE55.tmp"C:\Users\Admin\AppData\Local\Temp\FE55.tmp"119⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"C:\Users\Admin\AppData\Local\Temp\FF5F.tmp"120⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"C:\Users\Admin\AppData\Local\Temp\FFCC.tmp"121⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\59.tmp"C:\Users\Admin\AppData\Local\Temp\59.tmp"122⤵PID:4240
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-