Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/08/2023, 16:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5f656130dfcc3b998ca7e02f5f566792_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5f656130dfcc3b998ca7e02f5f566792_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
5f656130dfcc3b998ca7e02f5f566792_mafia_JC.exe
-
Size
486KB
-
MD5
5f656130dfcc3b998ca7e02f5f566792
-
SHA1
c3c2cd52eaaea28784b470e6f872b2767f57099a
-
SHA256
cdf59b0f437cec1f3728027e347ca668ce62c4a792ba6216ff2e817c6ca3d55e
-
SHA512
8e9013c06d4cfcd65ad22dcc15219e0d622797f05d7d2a01ad118cfb3a2eaccf826e94ef079cddbdc610e954e083eea1b13296f1688e3b704c63cfa2129e149a
-
SSDEEP
12288:/U5rCOTeiD1WmR4c0/HpHO5cG0oHj4vwwR7EuINZ:/UQOJDU24Ju5cGrEIwR79IN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2308 CFA4.tmp 1920 D0CD.tmp 2036 D1B7.tmp 1876 D2FF.tmp 4280 D3F9.tmp 3308 D4D4.tmp 4020 D5DE.tmp 4300 D6B9.tmp 4492 D7B3.tmp 2100 D83F.tmp 1432 D90A.tmp 1872 D9D5.tmp 2948 DBAA.tmp 488 DC75.tmp 4380 DD50.tmp 956 DE79.tmp 2712 DFA2.tmp 2704 E05D.tmp 2188 E148.tmp 644 E222.tmp 4644 E2CE.tmp 4940 E37A.tmp 880 E426.tmp 2752 E510.tmp 2324 E5CC.tmp 688 E697.tmp 1792 E743.tmp 3644 E80E.tmp 4864 E8BA.tmp 3984 E995.tmp 3484 EA7F.tmp 4676 EB2B.tmp 5028 EC06.tmp 456 EC92.tmp 3828 ED5D.tmp 2120 EE38.tmp 1028 EEE4.tmp 1864 EF61.tmp 3800 F0C8.tmp 4904 F211.tmp 4332 F28E.tmp 1716 F339.tmp 1300 F3D6.tmp 4756 F482.tmp 4264 F4EF.tmp 2036 F55C.tmp 2540 F608.tmp 2156 F6B4.tmp 4312 F750.tmp 388 F81B.tmp 1232 F8A8.tmp 384 F964.tmp 4044 FA0F.tmp 4492 FAAC.tmp 3804 FB48.tmp 564 FBD5.tmp 3168 FC80.tmp 4936 FCFD.tmp 2724 FD7A.tmp 324 FDF7.tmp 376 FE74.tmp 2260 FEE2.tmp 656 FF4F.tmp 644 B.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 2308 4000 5f656130dfcc3b998ca7e02f5f566792_mafia_JC.exe 84 PID 4000 wrote to memory of 2308 4000 5f656130dfcc3b998ca7e02f5f566792_mafia_JC.exe 84 PID 4000 wrote to memory of 2308 4000 5f656130dfcc3b998ca7e02f5f566792_mafia_JC.exe 84 PID 2308 wrote to memory of 1920 2308 CFA4.tmp 85 PID 2308 wrote to memory of 1920 2308 CFA4.tmp 85 PID 2308 wrote to memory of 1920 2308 CFA4.tmp 85 PID 1920 wrote to memory of 2036 1920 D0CD.tmp 86 PID 1920 wrote to memory of 2036 1920 D0CD.tmp 86 PID 1920 wrote to memory of 2036 1920 D0CD.tmp 86 PID 2036 wrote to memory of 1876 2036 D1B7.tmp 87 PID 2036 wrote to memory of 1876 2036 D1B7.tmp 87 PID 2036 wrote to memory of 1876 2036 D1B7.tmp 87 PID 1876 wrote to memory of 4280 1876 D2FF.tmp 88 PID 1876 wrote to memory of 4280 1876 D2FF.tmp 88 PID 1876 wrote to memory of 4280 1876 D2FF.tmp 88 PID 4280 wrote to memory of 3308 4280 D3F9.tmp 89 PID 4280 wrote to memory of 3308 4280 D3F9.tmp 89 PID 4280 wrote to memory of 3308 4280 D3F9.tmp 89 PID 3308 wrote to memory of 4020 3308 D4D4.tmp 90 PID 3308 wrote to memory of 4020 3308 D4D4.tmp 90 PID 3308 wrote to memory of 4020 3308 D4D4.tmp 90 PID 4020 wrote to memory of 4300 4020 D5DE.tmp 92 PID 4020 wrote to memory of 4300 4020 D5DE.tmp 92 PID 4020 wrote to memory of 4300 4020 D5DE.tmp 92 PID 4300 wrote to memory of 4492 4300 D6B9.tmp 93 PID 4300 wrote to memory of 4492 4300 D6B9.tmp 93 PID 4300 wrote to memory of 4492 4300 D6B9.tmp 93 PID 4492 wrote to memory of 2100 4492 D7B3.tmp 94 PID 4492 wrote to memory of 2100 4492 D7B3.tmp 94 PID 4492 wrote to memory of 2100 4492 D7B3.tmp 94 PID 2100 wrote to memory of 1432 2100 D83F.tmp 95 PID 2100 wrote to memory of 1432 2100 D83F.tmp 95 PID 2100 wrote to memory of 1432 2100 D83F.tmp 95 PID 1432 wrote to memory of 1872 1432 D90A.tmp 96 PID 1432 wrote to memory of 1872 1432 D90A.tmp 96 PID 1432 wrote to memory of 1872 1432 D90A.tmp 96 PID 1872 wrote to memory of 2948 1872 D9D5.tmp 97 PID 1872 wrote to memory of 2948 1872 D9D5.tmp 97 PID 1872 wrote to memory of 2948 1872 D9D5.tmp 97 PID 2948 wrote to memory of 488 2948 DBAA.tmp 98 PID 2948 wrote to memory of 488 2948 DBAA.tmp 98 PID 2948 wrote to memory of 488 2948 DBAA.tmp 98 PID 488 wrote to memory of 4380 488 DC75.tmp 99 PID 488 wrote to memory of 4380 488 DC75.tmp 99 PID 488 wrote to memory of 4380 488 DC75.tmp 99 PID 4380 wrote to memory of 956 4380 DD50.tmp 100 PID 4380 wrote to memory of 956 4380 DD50.tmp 100 PID 4380 wrote to memory of 956 4380 DD50.tmp 100 PID 956 wrote to memory of 2712 956 DE79.tmp 103 PID 956 wrote to memory of 2712 956 DE79.tmp 103 PID 956 wrote to memory of 2712 956 DE79.tmp 103 PID 2712 wrote to memory of 2704 2712 DFA2.tmp 104 PID 2712 wrote to memory of 2704 2712 DFA2.tmp 104 PID 2712 wrote to memory of 2704 2712 DFA2.tmp 104 PID 2704 wrote to memory of 2188 2704 E05D.tmp 105 PID 2704 wrote to memory of 2188 2704 E05D.tmp 105 PID 2704 wrote to memory of 2188 2704 E05D.tmp 105 PID 2188 wrote to memory of 644 2188 E148.tmp 106 PID 2188 wrote to memory of 644 2188 E148.tmp 106 PID 2188 wrote to memory of 644 2188 E148.tmp 106 PID 644 wrote to memory of 4644 644 E222.tmp 107 PID 644 wrote to memory of 4644 644 E222.tmp 107 PID 644 wrote to memory of 4644 644 E222.tmp 107 PID 4644 wrote to memory of 4940 4644 E2CE.tmp 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f656130dfcc3b998ca7e02f5f566792_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\5f656130dfcc3b998ca7e02f5f566792_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\CFA4.tmp"C:\Users\Admin\AppData\Local\Temp\CFA4.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"C:\Users\Admin\AppData\Local\Temp\D0CD.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"C:\Users\Admin\AppData\Local\Temp\D1B7.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\D2FF.tmp"C:\Users\Admin\AppData\Local\Temp\D2FF.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"C:\Users\Admin\AppData\Local\Temp\D3F9.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"C:\Users\Admin\AppData\Local\Temp\D4D4.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"C:\Users\Admin\AppData\Local\Temp\D6B9.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"C:\Users\Admin\AppData\Local\Temp\D7B3.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\D83F.tmp"C:\Users\Admin\AppData\Local\Temp\D83F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\D90A.tmp"C:\Users\Admin\AppData\Local\Temp\D90A.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"C:\Users\Admin\AppData\Local\Temp\D9D5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"C:\Users\Admin\AppData\Local\Temp\DBAA.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\DC75.tmp"C:\Users\Admin\AppData\Local\Temp\DC75.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Users\Admin\AppData\Local\Temp\DD50.tmp"C:\Users\Admin\AppData\Local\Temp\DD50.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\DE79.tmp"C:\Users\Admin\AppData\Local\Temp\DE79.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\DFA2.tmp"C:\Users\Admin\AppData\Local\Temp\DFA2.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\E05D.tmp"C:\Users\Admin\AppData\Local\Temp\E05D.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\E148.tmp"C:\Users\Admin\AppData\Local\Temp\E148.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\E222.tmp"C:\Users\Admin\AppData\Local\Temp\E222.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"C:\Users\Admin\AppData\Local\Temp\E2CE.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\E37A.tmp"C:\Users\Admin\AppData\Local\Temp\E37A.tmp"23⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\E426.tmp"C:\Users\Admin\AppData\Local\Temp\E426.tmp"24⤵
- Executes dropped EXE
PID:880 -
C:\Users\Admin\AppData\Local\Temp\E510.tmp"C:\Users\Admin\AppData\Local\Temp\E510.tmp"25⤵
- Executes dropped EXE
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\E5CC.tmp"C:\Users\Admin\AppData\Local\Temp\E5CC.tmp"26⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\E697.tmp"C:\Users\Admin\AppData\Local\Temp\E697.tmp"27⤵
- Executes dropped EXE
PID:688 -
C:\Users\Admin\AppData\Local\Temp\E743.tmp"C:\Users\Admin\AppData\Local\Temp\E743.tmp"28⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\E80E.tmp"C:\Users\Admin\AppData\Local\Temp\E80E.tmp"29⤵
- Executes dropped EXE
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"30⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\E995.tmp"C:\Users\Admin\AppData\Local\Temp\E995.tmp"31⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\EA7F.tmp"C:\Users\Admin\AppData\Local\Temp\EA7F.tmp"32⤵
- Executes dropped EXE
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"C:\Users\Admin\AppData\Local\Temp\EB2B.tmp"33⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\EC06.tmp"C:\Users\Admin\AppData\Local\Temp\EC06.tmp"34⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\EC92.tmp"C:\Users\Admin\AppData\Local\Temp\EC92.tmp"35⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"C:\Users\Admin\AppData\Local\Temp\ED5D.tmp"36⤵
- Executes dropped EXE
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\EE38.tmp"C:\Users\Admin\AppData\Local\Temp\EE38.tmp"37⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"C:\Users\Admin\AppData\Local\Temp\EEE4.tmp"38⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\EF61.tmp"C:\Users\Admin\AppData\Local\Temp\EF61.tmp"39⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"C:\Users\Admin\AppData\Local\Temp\F0C8.tmp"40⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\F174.tmp"C:\Users\Admin\AppData\Local\Temp\F174.tmp"41⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\F211.tmp"C:\Users\Admin\AppData\Local\Temp\F211.tmp"42⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\F28E.tmp"C:\Users\Admin\AppData\Local\Temp\F28E.tmp"43⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\F339.tmp"C:\Users\Admin\AppData\Local\Temp\F339.tmp"44⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"C:\Users\Admin\AppData\Local\Temp\F3D6.tmp"45⤵
- Executes dropped EXE
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\F482.tmp"C:\Users\Admin\AppData\Local\Temp\F482.tmp"46⤵
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"C:\Users\Admin\AppData\Local\Temp\F4EF.tmp"47⤵
- Executes dropped EXE
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\F55C.tmp"C:\Users\Admin\AppData\Local\Temp\F55C.tmp"48⤵
- Executes dropped EXE
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\F608.tmp"C:\Users\Admin\AppData\Local\Temp\F608.tmp"49⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\F6B4.tmp"C:\Users\Admin\AppData\Local\Temp\F6B4.tmp"50⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\F750.tmp"C:\Users\Admin\AppData\Local\Temp\F750.tmp"51⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\F81B.tmp"C:\Users\Admin\AppData\Local\Temp\F81B.tmp"52⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\F8A8.tmp"C:\Users\Admin\AppData\Local\Temp\F8A8.tmp"53⤵
- Executes dropped EXE
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\F964.tmp"C:\Users\Admin\AppData\Local\Temp\F964.tmp"54⤵
- Executes dropped EXE
PID:384 -
C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"C:\Users\Admin\AppData\Local\Temp\FA0F.tmp"55⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"C:\Users\Admin\AppData\Local\Temp\FAAC.tmp"56⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\FB48.tmp"C:\Users\Admin\AppData\Local\Temp\FB48.tmp"57⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\FBD5.tmp"C:\Users\Admin\AppData\Local\Temp\FBD5.tmp"58⤵
- Executes dropped EXE
PID:564 -
C:\Users\Admin\AppData\Local\Temp\FC80.tmp"C:\Users\Admin\AppData\Local\Temp\FC80.tmp"59⤵
- Executes dropped EXE
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"C:\Users\Admin\AppData\Local\Temp\FCFD.tmp"60⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\FD7A.tmp"C:\Users\Admin\AppData\Local\Temp\FD7A.tmp"61⤵
- Executes dropped EXE
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"C:\Users\Admin\AppData\Local\Temp\FDF7.tmp"62⤵
- Executes dropped EXE
PID:324 -
C:\Users\Admin\AppData\Local\Temp\FE74.tmp"C:\Users\Admin\AppData\Local\Temp\FE74.tmp"63⤵
- Executes dropped EXE
PID:376 -
C:\Users\Admin\AppData\Local\Temp\FEE2.tmp"C:\Users\Admin\AppData\Local\Temp\FEE2.tmp"64⤵
- Executes dropped EXE
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\FF4F.tmp"C:\Users\Admin\AppData\Local\Temp\FF4F.tmp"65⤵
- Executes dropped EXE
PID:656 -
C:\Users\Admin\AppData\Local\Temp\B.tmp"C:\Users\Admin\AppData\Local\Temp\B.tmp"66⤵
- Executes dropped EXE
PID:644 -
C:\Users\Admin\AppData\Local\Temp\88.tmp"C:\Users\Admin\AppData\Local\Temp\88.tmp"67⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\114.tmp"C:\Users\Admin\AppData\Local\Temp\114.tmp"68⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\1A1.tmp"C:\Users\Admin\AppData\Local\Temp\1A1.tmp"69⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\21E.tmp"C:\Users\Admin\AppData\Local\Temp\21E.tmp"70⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\2AB.tmp"C:\Users\Admin\AppData\Local\Temp\2AB.tmp"71⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\366.tmp"C:\Users\Admin\AppData\Local\Temp\366.tmp"72⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\3E3.tmp"C:\Users\Admin\AppData\Local\Temp\3E3.tmp"73⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\450.tmp"C:\Users\Admin\AppData\Local\Temp\450.tmp"74⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\4CD.tmp"C:\Users\Admin\AppData\Local\Temp\4CD.tmp"75⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\56A.tmp"C:\Users\Admin\AppData\Local\Temp\56A.tmp"76⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\5E7.tmp"C:\Users\Admin\AppData\Local\Temp\5E7.tmp"77⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\6B2.tmp"C:\Users\Admin\AppData\Local\Temp\6B2.tmp"78⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\76D.tmp"C:\Users\Admin\AppData\Local\Temp\76D.tmp"79⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\7EA.tmp"C:\Users\Admin\AppData\Local\Temp\7EA.tmp"80⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\867.tmp"C:\Users\Admin\AppData\Local\Temp\867.tmp"81⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\8D5.tmp"C:\Users\Admin\AppData\Local\Temp\8D5.tmp"82⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\952.tmp"C:\Users\Admin\AppData\Local\Temp\952.tmp"83⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\9DE.tmp"C:\Users\Admin\AppData\Local\Temp\9DE.tmp"84⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\A7B.tmp"C:\Users\Admin\AppData\Local\Temp\A7B.tmp"85⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\AF8.tmp"C:\Users\Admin\AppData\Local\Temp\AF8.tmp"86⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\B84.tmp"C:\Users\Admin\AppData\Local\Temp\B84.tmp"87⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\C20.tmp"C:\Users\Admin\AppData\Local\Temp\C20.tmp"88⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"89⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\D97.tmp"C:\Users\Admin\AppData\Local\Temp\D97.tmp"90⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\E34.tmp"C:\Users\Admin\AppData\Local\Temp\E34.tmp"91⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\EB1.tmp"C:\Users\Admin\AppData\Local\Temp\EB1.tmp"92⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\F6C.tmp"C:\Users\Admin\AppData\Local\Temp\F6C.tmp"93⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\1028.tmp"C:\Users\Admin\AppData\Local\Temp\1028.tmp"94⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\10C4.tmp"C:\Users\Admin\AppData\Local\Temp\10C4.tmp"95⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\117F.tmp"C:\Users\Admin\AppData\Local\Temp\117F.tmp"96⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\122B.tmp"C:\Users\Admin\AppData\Local\Temp\122B.tmp"97⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\12B8.tmp"C:\Users\Admin\AppData\Local\Temp\12B8.tmp"98⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\1354.tmp"C:\Users\Admin\AppData\Local\Temp\1354.tmp"99⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\13E1.tmp"C:\Users\Admin\AppData\Local\Temp\13E1.tmp"100⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\149C.tmp"C:\Users\Admin\AppData\Local\Temp\149C.tmp"101⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\1539.tmp"C:\Users\Admin\AppData\Local\Temp\1539.tmp"102⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\15B6.tmp"C:\Users\Admin\AppData\Local\Temp\15B6.tmp"103⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\1690.tmp"C:\Users\Admin\AppData\Local\Temp\1690.tmp"104⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\170D.tmp"C:\Users\Admin\AppData\Local\Temp\170D.tmp"105⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\17AA.tmp"C:\Users\Admin\AppData\Local\Temp\17AA.tmp"106⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\1827.tmp"C:\Users\Admin\AppData\Local\Temp\1827.tmp"107⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\18C3.tmp"C:\Users\Admin\AppData\Local\Temp\18C3.tmp"108⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\1940.tmp"C:\Users\Admin\AppData\Local\Temp\1940.tmp"109⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\19DC.tmp"C:\Users\Admin\AppData\Local\Temp\19DC.tmp"110⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\1A59.tmp"C:\Users\Admin\AppData\Local\Temp\1A59.tmp"111⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\1B15.tmp"C:\Users\Admin\AppData\Local\Temp\1B15.tmp"112⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\1BD0.tmp"C:\Users\Admin\AppData\Local\Temp\1BD0.tmp"113⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\1C8C.tmp"C:\Users\Admin\AppData\Local\Temp\1C8C.tmp"114⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\1D57.tmp"C:\Users\Admin\AppData\Local\Temp\1D57.tmp"115⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\1DE3.tmp"C:\Users\Admin\AppData\Local\Temp\1DE3.tmp"116⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\1E70.tmp"C:\Users\Admin\AppData\Local\Temp\1E70.tmp"117⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\1EED.tmp"C:\Users\Admin\AppData\Local\Temp\1EED.tmp"118⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"C:\Users\Admin\AppData\Local\Temp\1F7A.tmp"119⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\2025.tmp"C:\Users\Admin\AppData\Local\Temp\2025.tmp"120⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\20D1.tmp"C:\Users\Admin\AppData\Local\Temp\20D1.tmp"121⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\219C.tmp"C:\Users\Admin\AppData\Local\Temp\219C.tmp"122⤵PID:3968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-