Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_3c9fa2de454c6fe3abcd26a32ab134e1_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_3c9fa2de454c6fe3abcd26a32ab134e1_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_3c9fa2de454c6fe3abcd26a32ab134e1_mafia_JC.exe
-
Size
486KB
-
MD5
3c9fa2de454c6fe3abcd26a32ab134e1
-
SHA1
dff20d5eb39fee7c4e8cea248d53bce19230cb51
-
SHA256
f14ce6251ff8ba065e170f5282a3466535c5ea75d3894707054a62e6437a9ad3
-
SHA512
8034785e4cfc46976a9077c2a9bfe738e196af6feb20f172982115491bd79fec68c22f2cc659e0827a00a08a2e17764e0ae9052fba353b6aec8d0d9afe01da95
-
SSDEEP
12288:oU5rCOTeiDhR3mYLQVaGqFMBMKFPiQabnllL3J5ONZ:oUQOJDrmYLQVaGqaBMKRidXL3PON
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1120 6A72.tmp 3652 6B1E.tmp 3412 6BE9.tmp 4668 6CB4.tmp 4064 6D60.tmp 4624 7186.tmp 3928 72FD.tmp 3908 7417.tmp 2984 7520.tmp 3504 75FB.tmp 3420 76B6.tmp 3424 7753.tmp 5104 77FF.tmp 2912 78BA.tmp 5080 7995.tmp 1688 7A9E.tmp 3208 7B79.tmp 2096 7C06.tmp 4408 7C83.tmp 1440 7D0F.tmp 4652 7E48.tmp 864 7F52.tmp 2408 806B.tmp 1672 8146.tmp 4924 8211.tmp 2288 82BD.tmp 4948 8388.tmp 2868 8405.tmp 1828 8491.tmp 1240 853D.tmp 4456 85CA.tmp 2560 8656.tmp 772 8702.tmp 2496 878F.tmp 2212 882B.tmp 4476 8889.tmp 4184 8906.tmp 4852 8983.tmp 2668 8A00.tmp 1532 8AFA.tmp 980 8B67.tmp 4300 8BD5.tmp 2984 8C42.tmp 3404 8CBF.tmp 3504 8D2C.tmp 1712 8D9A.tmp 1856 8E26.tmp 4868 8E84.tmp 540 8EF2.tmp 2072 8F4F.tmp 672 8FAD.tmp 2940 900B.tmp 4984 9078.tmp 4652 90D6.tmp 2292 9134.tmp 3112 91B1.tmp 8 921E.tmp 5108 929B.tmp 4100 92F9.tmp 4608 9366.tmp 2364 93E3.tmp 4692 9451.tmp 3588 94CE.tmp 1176 956A.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 1120 5064 2023-08-25_3c9fa2de454c6fe3abcd26a32ab134e1_mafia_JC.exe 88 PID 5064 wrote to memory of 1120 5064 2023-08-25_3c9fa2de454c6fe3abcd26a32ab134e1_mafia_JC.exe 88 PID 5064 wrote to memory of 1120 5064 2023-08-25_3c9fa2de454c6fe3abcd26a32ab134e1_mafia_JC.exe 88 PID 1120 wrote to memory of 3652 1120 6A72.tmp 89 PID 1120 wrote to memory of 3652 1120 6A72.tmp 89 PID 1120 wrote to memory of 3652 1120 6A72.tmp 89 PID 3652 wrote to memory of 3412 3652 6B1E.tmp 90 PID 3652 wrote to memory of 3412 3652 6B1E.tmp 90 PID 3652 wrote to memory of 3412 3652 6B1E.tmp 90 PID 3412 wrote to memory of 4668 3412 6BE9.tmp 91 PID 3412 wrote to memory of 4668 3412 6BE9.tmp 91 PID 3412 wrote to memory of 4668 3412 6BE9.tmp 91 PID 4668 wrote to memory of 4064 4668 6CB4.tmp 92 PID 4668 wrote to memory of 4064 4668 6CB4.tmp 92 PID 4668 wrote to memory of 4064 4668 6CB4.tmp 92 PID 4064 wrote to memory of 4624 4064 6D60.tmp 93 PID 4064 wrote to memory of 4624 4064 6D60.tmp 93 PID 4064 wrote to memory of 4624 4064 6D60.tmp 93 PID 4624 wrote to memory of 3928 4624 7186.tmp 94 PID 4624 wrote to memory of 3928 4624 7186.tmp 94 PID 4624 wrote to memory of 3928 4624 7186.tmp 94 PID 3928 wrote to memory of 3908 3928 72FD.tmp 95 PID 3928 wrote to memory of 3908 3928 72FD.tmp 95 PID 3928 wrote to memory of 3908 3928 72FD.tmp 95 PID 3908 wrote to memory of 2984 3908 7417.tmp 96 PID 3908 wrote to memory of 2984 3908 7417.tmp 96 PID 3908 wrote to memory of 2984 3908 7417.tmp 96 PID 2984 wrote to memory of 3504 2984 7520.tmp 97 PID 2984 wrote to memory of 3504 2984 7520.tmp 97 PID 2984 wrote to memory of 3504 2984 7520.tmp 97 PID 3504 wrote to memory of 3420 3504 75FB.tmp 98 PID 3504 wrote to memory of 3420 3504 75FB.tmp 98 PID 3504 wrote to memory of 3420 3504 75FB.tmp 98 PID 3420 wrote to memory of 3424 3420 76B6.tmp 99 PID 3420 wrote to memory of 3424 3420 76B6.tmp 99 PID 3420 wrote to memory of 3424 3420 76B6.tmp 99 PID 3424 wrote to memory of 5104 3424 7753.tmp 101 PID 3424 wrote to memory of 5104 3424 7753.tmp 101 PID 3424 wrote to memory of 5104 3424 7753.tmp 101 PID 5104 wrote to memory of 2912 5104 77FF.tmp 102 PID 5104 wrote to memory of 2912 5104 77FF.tmp 102 PID 5104 wrote to memory of 2912 5104 77FF.tmp 102 PID 2912 wrote to memory of 5080 2912 78BA.tmp 103 PID 2912 wrote to memory of 5080 2912 78BA.tmp 103 PID 2912 wrote to memory of 5080 2912 78BA.tmp 103 PID 5080 wrote to memory of 1688 5080 7995.tmp 104 PID 5080 wrote to memory of 1688 5080 7995.tmp 104 PID 5080 wrote to memory of 1688 5080 7995.tmp 104 PID 1688 wrote to memory of 3208 1688 7A9E.tmp 106 PID 1688 wrote to memory of 3208 1688 7A9E.tmp 106 PID 1688 wrote to memory of 3208 1688 7A9E.tmp 106 PID 3208 wrote to memory of 2096 3208 7B79.tmp 107 PID 3208 wrote to memory of 2096 3208 7B79.tmp 107 PID 3208 wrote to memory of 2096 3208 7B79.tmp 107 PID 2096 wrote to memory of 4408 2096 7C06.tmp 108 PID 2096 wrote to memory of 4408 2096 7C06.tmp 108 PID 2096 wrote to memory of 4408 2096 7C06.tmp 108 PID 4408 wrote to memory of 1440 4408 7C83.tmp 109 PID 4408 wrote to memory of 1440 4408 7C83.tmp 109 PID 4408 wrote to memory of 1440 4408 7C83.tmp 109 PID 1440 wrote to memory of 4652 1440 7D0F.tmp 110 PID 1440 wrote to memory of 4652 1440 7D0F.tmp 110 PID 1440 wrote to memory of 4652 1440 7D0F.tmp 110 PID 4652 wrote to memory of 864 4652 7E48.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_3c9fa2de454c6fe3abcd26a32ab134e1_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_3c9fa2de454c6fe3abcd26a32ab134e1_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\6A72.tmp"C:\Users\Admin\AppData\Local\Temp\6A72.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\6B1E.tmp"C:\Users\Admin\AppData\Local\Temp\6B1E.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"C:\Users\Admin\AppData\Local\Temp\6BE9.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\6CB4.tmp"C:\Users\Admin\AppData\Local\Temp\6CB4.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\6D60.tmp"C:\Users\Admin\AppData\Local\Temp\6D60.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\7186.tmp"C:\Users\Admin\AppData\Local\Temp\7186.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\72FD.tmp"C:\Users\Admin\AppData\Local\Temp\72FD.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\7417.tmp"C:\Users\Admin\AppData\Local\Temp\7417.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\7520.tmp"C:\Users\Admin\AppData\Local\Temp\7520.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\75FB.tmp"C:\Users\Admin\AppData\Local\Temp\75FB.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\76B6.tmp"C:\Users\Admin\AppData\Local\Temp\76B6.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\7753.tmp"C:\Users\Admin\AppData\Local\Temp\7753.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\77FF.tmp"C:\Users\Admin\AppData\Local\Temp\77FF.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\78BA.tmp"C:\Users\Admin\AppData\Local\Temp\78BA.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\7995.tmp"C:\Users\Admin\AppData\Local\Temp\7995.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\7A9E.tmp"C:\Users\Admin\AppData\Local\Temp\7A9E.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\7B79.tmp"C:\Users\Admin\AppData\Local\Temp\7B79.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\7C06.tmp"C:\Users\Admin\AppData\Local\Temp\7C06.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\7C83.tmp"C:\Users\Admin\AppData\Local\Temp\7C83.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\7D0F.tmp"C:\Users\Admin\AppData\Local\Temp\7D0F.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\7E48.tmp"C:\Users\Admin\AppData\Local\Temp\7E48.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\7F52.tmp"C:\Users\Admin\AppData\Local\Temp\7F52.tmp"23⤵
- Executes dropped EXE
PID:864 -
C:\Users\Admin\AppData\Local\Temp\806B.tmp"C:\Users\Admin\AppData\Local\Temp\806B.tmp"24⤵
- Executes dropped EXE
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\8146.tmp"C:\Users\Admin\AppData\Local\Temp\8146.tmp"25⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\8211.tmp"C:\Users\Admin\AppData\Local\Temp\8211.tmp"26⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\82BD.tmp"C:\Users\Admin\AppData\Local\Temp\82BD.tmp"27⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\8388.tmp"C:\Users\Admin\AppData\Local\Temp\8388.tmp"28⤵
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\8405.tmp"C:\Users\Admin\AppData\Local\Temp\8405.tmp"29⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\8491.tmp"C:\Users\Admin\AppData\Local\Temp\8491.tmp"30⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\853D.tmp"C:\Users\Admin\AppData\Local\Temp\853D.tmp"31⤵
- Executes dropped EXE
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\85CA.tmp"C:\Users\Admin\AppData\Local\Temp\85CA.tmp"32⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\8656.tmp"C:\Users\Admin\AppData\Local\Temp\8656.tmp"33⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\8702.tmp"C:\Users\Admin\AppData\Local\Temp\8702.tmp"34⤵
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\878F.tmp"C:\Users\Admin\AppData\Local\Temp\878F.tmp"35⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\882B.tmp"C:\Users\Admin\AppData\Local\Temp\882B.tmp"36⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\8889.tmp"C:\Users\Admin\AppData\Local\Temp\8889.tmp"37⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\8906.tmp"C:\Users\Admin\AppData\Local\Temp\8906.tmp"38⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\8983.tmp"C:\Users\Admin\AppData\Local\Temp\8983.tmp"39⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\8A00.tmp"C:\Users\Admin\AppData\Local\Temp\8A00.tmp"40⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\8AFA.tmp"C:\Users\Admin\AppData\Local\Temp\8AFA.tmp"41⤵
- Executes dropped EXE
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\8B67.tmp"C:\Users\Admin\AppData\Local\Temp\8B67.tmp"42⤵
- Executes dropped EXE
PID:980 -
C:\Users\Admin\AppData\Local\Temp\8BD5.tmp"C:\Users\Admin\AppData\Local\Temp\8BD5.tmp"43⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\8C42.tmp"C:\Users\Admin\AppData\Local\Temp\8C42.tmp"44⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"C:\Users\Admin\AppData\Local\Temp\8CBF.tmp"45⤵
- Executes dropped EXE
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\8D2C.tmp"C:\Users\Admin\AppData\Local\Temp\8D2C.tmp"46⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\8D9A.tmp"C:\Users\Admin\AppData\Local\Temp\8D9A.tmp"47⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\8E26.tmp"C:\Users\Admin\AppData\Local\Temp\8E26.tmp"48⤵
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\8E84.tmp"C:\Users\Admin\AppData\Local\Temp\8E84.tmp"49⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"50⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\8F4F.tmp"C:\Users\Admin\AppData\Local\Temp\8F4F.tmp"51⤵
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\8FAD.tmp"C:\Users\Admin\AppData\Local\Temp\8FAD.tmp"52⤵
- Executes dropped EXE
PID:672 -
C:\Users\Admin\AppData\Local\Temp\900B.tmp"C:\Users\Admin\AppData\Local\Temp\900B.tmp"53⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\9078.tmp"C:\Users\Admin\AppData\Local\Temp\9078.tmp"54⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\90D6.tmp"C:\Users\Admin\AppData\Local\Temp\90D6.tmp"55⤵
- Executes dropped EXE
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\9134.tmp"C:\Users\Admin\AppData\Local\Temp\9134.tmp"56⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\91B1.tmp"C:\Users\Admin\AppData\Local\Temp\91B1.tmp"57⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\921E.tmp"C:\Users\Admin\AppData\Local\Temp\921E.tmp"58⤵
- Executes dropped EXE
PID:8 -
C:\Users\Admin\AppData\Local\Temp\929B.tmp"C:\Users\Admin\AppData\Local\Temp\929B.tmp"59⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\92F9.tmp"C:\Users\Admin\AppData\Local\Temp\92F9.tmp"60⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\9366.tmp"C:\Users\Admin\AppData\Local\Temp\9366.tmp"61⤵
- Executes dropped EXE
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\93E3.tmp"C:\Users\Admin\AppData\Local\Temp\93E3.tmp"62⤵
- Executes dropped EXE
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\9451.tmp"C:\Users\Admin\AppData\Local\Temp\9451.tmp"63⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\94CE.tmp"C:\Users\Admin\AppData\Local\Temp\94CE.tmp"64⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\956A.tmp"C:\Users\Admin\AppData\Local\Temp\956A.tmp"65⤵
- Executes dropped EXE
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\95D7.tmp"C:\Users\Admin\AppData\Local\Temp\95D7.tmp"66⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\9645.tmp"C:\Users\Admin\AppData\Local\Temp\9645.tmp"67⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\96C2.tmp"C:\Users\Admin\AppData\Local\Temp\96C2.tmp"68⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\971F.tmp"C:\Users\Admin\AppData\Local\Temp\971F.tmp"69⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\979C.tmp"C:\Users\Admin\AppData\Local\Temp\979C.tmp"70⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\980A.tmp"C:\Users\Admin\AppData\Local\Temp\980A.tmp"71⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\9877.tmp"C:\Users\Admin\AppData\Local\Temp\9877.tmp"72⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\9942.tmp"C:\Users\Admin\AppData\Local\Temp\9942.tmp"73⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\99B0.tmp"C:\Users\Admin\AppData\Local\Temp\99B0.tmp"74⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\9A2D.tmp"C:\Users\Admin\AppData\Local\Temp\9A2D.tmp"75⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"C:\Users\Admin\AppData\Local\Temp\9AB9.tmp"76⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\9B65.tmp"C:\Users\Admin\AppData\Local\Temp\9B65.tmp"77⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"78⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"79⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\9D0B.tmp"C:\Users\Admin\AppData\Local\Temp\9D0B.tmp"80⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\9D78.tmp"C:\Users\Admin\AppData\Local\Temp\9D78.tmp"81⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\9DD6.tmp"C:\Users\Admin\AppData\Local\Temp\9DD6.tmp"82⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\9E34.tmp"C:\Users\Admin\AppData\Local\Temp\9E34.tmp"83⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\9E92.tmp"C:\Users\Admin\AppData\Local\Temp\9E92.tmp"84⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"85⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"86⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\A018.tmp"C:\Users\Admin\AppData\Local\Temp\A018.tmp"87⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\A095.tmp"C:\Users\Admin\AppData\Local\Temp\A095.tmp"88⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\A112.tmp"C:\Users\Admin\AppData\Local\Temp\A112.tmp"89⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\A1AE.tmp"C:\Users\Admin\AppData\Local\Temp\A1AE.tmp"90⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\A23B.tmp"C:\Users\Admin\AppData\Local\Temp\A23B.tmp"91⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"92⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\A345.tmp"C:\Users\Admin\AppData\Local\Temp\A345.tmp"93⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"94⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\A45E.tmp"C:\Users\Admin\AppData\Local\Temp\A45E.tmp"95⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"96⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\A690.tmp"C:\Users\Admin\AppData\Local\Temp\A690.tmp"97⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\A70D.tmp"C:\Users\Admin\AppData\Local\Temp\A70D.tmp"98⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\A79A.tmp"C:\Users\Admin\AppData\Local\Temp\A79A.tmp"99⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"100⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\A940.tmp"C:\Users\Admin\AppData\Local\Temp\A940.tmp"101⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"102⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"103⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"C:\Users\Admin\AppData\Local\Temp\ACAB.tmp"104⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\AD18.tmp"C:\Users\Admin\AppData\Local\Temp\AD18.tmp"105⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\ADA5.tmp"C:\Users\Admin\AppData\Local\Temp\ADA5.tmp"106⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\AE32.tmp"C:\Users\Admin\AppData\Local\Temp\AE32.tmp"107⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\AEAF.tmp"C:\Users\Admin\AppData\Local\Temp\AEAF.tmp"108⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\AF2C.tmp"C:\Users\Admin\AppData\Local\Temp\AF2C.tmp"109⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"C:\Users\Admin\AppData\Local\Temp\AFB8.tmp"110⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\B026.tmp"C:\Users\Admin\AppData\Local\Temp\B026.tmp"111⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"112⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\B12F.tmp"C:\Users\Admin\AppData\Local\Temp\B12F.tmp"113⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\B1AC.tmp"C:\Users\Admin\AppData\Local\Temp\B1AC.tmp"114⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\B21A.tmp"C:\Users\Admin\AppData\Local\Temp\B21A.tmp"115⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"116⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\B333.tmp"C:\Users\Admin\AppData\Local\Temp\B333.tmp"117⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\B3B0.tmp"C:\Users\Admin\AppData\Local\Temp\B3B0.tmp"118⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\B42D.tmp"C:\Users\Admin\AppData\Local\Temp\B42D.tmp"119⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\B4C9.tmp"C:\Users\Admin\AppData\Local\Temp\B4C9.tmp"120⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\B815.tmp"C:\Users\Admin\AppData\Local\Temp\B815.tmp"121⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\B8C1.tmp"C:\Users\Admin\AppData\Local\Temp\B8C1.tmp"122⤵PID:1552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-