Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2023, 18:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1e685a6f4ace850aa4fca973afb00176_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1e685a6f4ace850aa4fca973afb00176_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
1e685a6f4ace850aa4fca973afb00176_mafia_JC.exe
-
Size
486KB
-
MD5
1e685a6f4ace850aa4fca973afb00176
-
SHA1
aede918c1ffe68ac7dd90467a42f586f46964a38
-
SHA256
1f4e4b30139569ca423049850828c7d872834eb54851c6166753787247ac9288
-
SHA512
adbf256fc11eec986ae965f95809fb240de86d8d27349054841818a3943e6362d95399e6be8bc2209ca5ae52b29f473442526916e7fe3a2f627bb4ca7d056b4d
-
SSDEEP
12288:UU5rCOTeiDp0Bygk/6t6ZSZwYJsO8cPNOpQGZNZ:UUQOJD6HBtkSKcVWNZN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2204 FE55.tmp 4092 FF7E.tmp 3292 A7.tmp 4644 1DF.tmp 3712 AA9.tmp 4856 B75.tmp 3728 C7E.tmp 4432 D78.tmp 3720 E53.tmp 3252 F1E.tmp 4680 FCA.tmp 3888 1095.tmp 2044 1151.tmp 812 122B.tmp 2040 12D7.tmp 3076 13A2.tmp 316 14AC.tmp 4728 15D5.tmp 2172 1690.tmp 4208 179A.tmp 1964 1894.tmp 4660 195F.tmp 4712 1A69.tmp 3036 1B82.tmp 2896 1C3D.tmp 5012 1D18.tmp 4284 1DF3.tmp 1592 1EAE.tmp 1252 1FA8.tmp 4036 2093.tmp 5092 22D5.tmp 3344 23CF.tmp 5096 24D9.tmp 3816 25B3.tmp 916 268E.tmp 884 2759.tmp 2952 27F5.tmp 1652 28B1.tmp 3932 293E.tmp 2852 29CA.tmp 1408 2A57.tmp 3964 2B03.tmp 444 2CA9.tmp 2656 2D64.tmp 4632 2DE1.tmp 4360 2E6E.tmp 3000 2F1A.tmp 2724 2FF4.tmp 4328 3081.tmp 4676 311D.tmp 3684 31C9.tmp 4236 3265.tmp 2916 3311.tmp 1328 339E.tmp 1760 343A.tmp 4684 34B7.tmp 2716 35A1.tmp 216 368C.tmp 3724 3728.tmp 1172 37B5.tmp 1312 3870.tmp 1736 38ED.tmp 2280 3999.tmp 2688 3A06.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 488 wrote to memory of 2204 488 1e685a6f4ace850aa4fca973afb00176_mafia_JC.exe 82 PID 488 wrote to memory of 2204 488 1e685a6f4ace850aa4fca973afb00176_mafia_JC.exe 82 PID 488 wrote to memory of 2204 488 1e685a6f4ace850aa4fca973afb00176_mafia_JC.exe 82 PID 2204 wrote to memory of 4092 2204 FE55.tmp 83 PID 2204 wrote to memory of 4092 2204 FE55.tmp 83 PID 2204 wrote to memory of 4092 2204 FE55.tmp 83 PID 4092 wrote to memory of 3292 4092 FF7E.tmp 84 PID 4092 wrote to memory of 3292 4092 FF7E.tmp 84 PID 4092 wrote to memory of 3292 4092 FF7E.tmp 84 PID 3292 wrote to memory of 4644 3292 A7.tmp 85 PID 3292 wrote to memory of 4644 3292 A7.tmp 85 PID 3292 wrote to memory of 4644 3292 A7.tmp 85 PID 4644 wrote to memory of 3712 4644 1DF.tmp 86 PID 4644 wrote to memory of 3712 4644 1DF.tmp 86 PID 4644 wrote to memory of 3712 4644 1DF.tmp 86 PID 3712 wrote to memory of 4856 3712 AA9.tmp 87 PID 3712 wrote to memory of 4856 3712 AA9.tmp 87 PID 3712 wrote to memory of 4856 3712 AA9.tmp 87 PID 4856 wrote to memory of 3728 4856 B75.tmp 88 PID 4856 wrote to memory of 3728 4856 B75.tmp 88 PID 4856 wrote to memory of 3728 4856 B75.tmp 88 PID 3728 wrote to memory of 4432 3728 C7E.tmp 89 PID 3728 wrote to memory of 4432 3728 C7E.tmp 89 PID 3728 wrote to memory of 4432 3728 C7E.tmp 89 PID 4432 wrote to memory of 3720 4432 D78.tmp 91 PID 4432 wrote to memory of 3720 4432 D78.tmp 91 PID 4432 wrote to memory of 3720 4432 D78.tmp 91 PID 3720 wrote to memory of 3252 3720 E53.tmp 92 PID 3720 wrote to memory of 3252 3720 E53.tmp 92 PID 3720 wrote to memory of 3252 3720 E53.tmp 92 PID 3252 wrote to memory of 4680 3252 F1E.tmp 93 PID 3252 wrote to memory of 4680 3252 F1E.tmp 93 PID 3252 wrote to memory of 4680 3252 F1E.tmp 93 PID 4680 wrote to memory of 3888 4680 FCA.tmp 94 PID 4680 wrote to memory of 3888 4680 FCA.tmp 94 PID 4680 wrote to memory of 3888 4680 FCA.tmp 94 PID 3888 wrote to memory of 2044 3888 1095.tmp 95 PID 3888 wrote to memory of 2044 3888 1095.tmp 95 PID 3888 wrote to memory of 2044 3888 1095.tmp 95 PID 2044 wrote to memory of 812 2044 1151.tmp 96 PID 2044 wrote to memory of 812 2044 1151.tmp 96 PID 2044 wrote to memory of 812 2044 1151.tmp 96 PID 812 wrote to memory of 2040 812 122B.tmp 97 PID 812 wrote to memory of 2040 812 122B.tmp 97 PID 812 wrote to memory of 2040 812 122B.tmp 97 PID 2040 wrote to memory of 3076 2040 12D7.tmp 98 PID 2040 wrote to memory of 3076 2040 12D7.tmp 98 PID 2040 wrote to memory of 3076 2040 12D7.tmp 98 PID 3076 wrote to memory of 316 3076 13A2.tmp 99 PID 3076 wrote to memory of 316 3076 13A2.tmp 99 PID 3076 wrote to memory of 316 3076 13A2.tmp 99 PID 316 wrote to memory of 4728 316 14AC.tmp 102 PID 316 wrote to memory of 4728 316 14AC.tmp 102 PID 316 wrote to memory of 4728 316 14AC.tmp 102 PID 4728 wrote to memory of 2172 4728 15D5.tmp 103 PID 4728 wrote to memory of 2172 4728 15D5.tmp 103 PID 4728 wrote to memory of 2172 4728 15D5.tmp 103 PID 2172 wrote to memory of 4208 2172 1690.tmp 104 PID 2172 wrote to memory of 4208 2172 1690.tmp 104 PID 2172 wrote to memory of 4208 2172 1690.tmp 104 PID 4208 wrote to memory of 1964 4208 179A.tmp 105 PID 4208 wrote to memory of 1964 4208 179A.tmp 105 PID 4208 wrote to memory of 1964 4208 179A.tmp 105 PID 1964 wrote to memory of 4660 1964 1894.tmp 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e685a6f4ace850aa4fca973afb00176_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\1e685a6f4ace850aa4fca973afb00176_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Users\Admin\AppData\Local\Temp\FE55.tmp"C:\Users\Admin\AppData\Local\Temp\FE55.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\FF7E.tmp"C:\Users\Admin\AppData\Local\Temp\FF7E.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\A7.tmp"C:\Users\Admin\AppData\Local\Temp\A7.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\1DF.tmp"C:\Users\Admin\AppData\Local\Temp\1DF.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\AA9.tmp"C:\Users\Admin\AppData\Local\Temp\AA9.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\B75.tmp"C:\Users\Admin\AppData\Local\Temp\B75.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\C7E.tmp"C:\Users\Admin\AppData\Local\Temp\C7E.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\D78.tmp"C:\Users\Admin\AppData\Local\Temp\D78.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\E53.tmp"C:\Users\Admin\AppData\Local\Temp\E53.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\F1E.tmp"C:\Users\Admin\AppData\Local\Temp\F1E.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\FCA.tmp"C:\Users\Admin\AppData\Local\Temp\FCA.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\1095.tmp"C:\Users\Admin\AppData\Local\Temp\1095.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\1151.tmp"C:\Users\Admin\AppData\Local\Temp\1151.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\122B.tmp"C:\Users\Admin\AppData\Local\Temp\122B.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\12D7.tmp"C:\Users\Admin\AppData\Local\Temp\12D7.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\13A2.tmp"C:\Users\Admin\AppData\Local\Temp\13A2.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\14AC.tmp"C:\Users\Admin\AppData\Local\Temp\14AC.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\15D5.tmp"C:\Users\Admin\AppData\Local\Temp\15D5.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\1690.tmp"C:\Users\Admin\AppData\Local\Temp\1690.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\179A.tmp"C:\Users\Admin\AppData\Local\Temp\179A.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\1894.tmp"C:\Users\Admin\AppData\Local\Temp\1894.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\195F.tmp"C:\Users\Admin\AppData\Local\Temp\195F.tmp"23⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\1A69.tmp"C:\Users\Admin\AppData\Local\Temp\1A69.tmp"24⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\1B82.tmp"C:\Users\Admin\AppData\Local\Temp\1B82.tmp"25⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\1C3D.tmp"C:\Users\Admin\AppData\Local\Temp\1C3D.tmp"26⤵
- Executes dropped EXE
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\1D18.tmp"C:\Users\Admin\AppData\Local\Temp\1D18.tmp"27⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"C:\Users\Admin\AppData\Local\Temp\1DF3.tmp"28⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\1EAE.tmp"C:\Users\Admin\AppData\Local\Temp\1EAE.tmp"29⤵
- Executes dropped EXE
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\1FA8.tmp"C:\Users\Admin\AppData\Local\Temp\1FA8.tmp"30⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\2093.tmp"C:\Users\Admin\AppData\Local\Temp\2093.tmp"31⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\22D5.tmp"C:\Users\Admin\AppData\Local\Temp\22D5.tmp"32⤵
- Executes dropped EXE
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\23CF.tmp"C:\Users\Admin\AppData\Local\Temp\23CF.tmp"33⤵
- Executes dropped EXE
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\24D9.tmp"C:\Users\Admin\AppData\Local\Temp\24D9.tmp"34⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\25B3.tmp"C:\Users\Admin\AppData\Local\Temp\25B3.tmp"35⤵
- Executes dropped EXE
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\268E.tmp"C:\Users\Admin\AppData\Local\Temp\268E.tmp"36⤵
- Executes dropped EXE
PID:916 -
C:\Users\Admin\AppData\Local\Temp\2759.tmp"C:\Users\Admin\AppData\Local\Temp\2759.tmp"37⤵
- Executes dropped EXE
PID:884 -
C:\Users\Admin\AppData\Local\Temp\27F5.tmp"C:\Users\Admin\AppData\Local\Temp\27F5.tmp"38⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\28B1.tmp"C:\Users\Admin\AppData\Local\Temp\28B1.tmp"39⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\293E.tmp"C:\Users\Admin\AppData\Local\Temp\293E.tmp"40⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\29CA.tmp"C:\Users\Admin\AppData\Local\Temp\29CA.tmp"41⤵
- Executes dropped EXE
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\2A57.tmp"C:\Users\Admin\AppData\Local\Temp\2A57.tmp"42⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\2B03.tmp"C:\Users\Admin\AppData\Local\Temp\2B03.tmp"43⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"C:\Users\Admin\AppData\Local\Temp\2CA9.tmp"44⤵
- Executes dropped EXE
PID:444 -
C:\Users\Admin\AppData\Local\Temp\2D64.tmp"C:\Users\Admin\AppData\Local\Temp\2D64.tmp"45⤵
- Executes dropped EXE
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\2DE1.tmp"C:\Users\Admin\AppData\Local\Temp\2DE1.tmp"46⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"47⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"C:\Users\Admin\AppData\Local\Temp\2F1A.tmp"48⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\2FF4.tmp"C:\Users\Admin\AppData\Local\Temp\2FF4.tmp"49⤵
- Executes dropped EXE
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\3081.tmp"C:\Users\Admin\AppData\Local\Temp\3081.tmp"50⤵
- Executes dropped EXE
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\311D.tmp"C:\Users\Admin\AppData\Local\Temp\311D.tmp"51⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\31C9.tmp"C:\Users\Admin\AppData\Local\Temp\31C9.tmp"52⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\3265.tmp"C:\Users\Admin\AppData\Local\Temp\3265.tmp"53⤵
- Executes dropped EXE
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\3311.tmp"C:\Users\Admin\AppData\Local\Temp\3311.tmp"54⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\339E.tmp"C:\Users\Admin\AppData\Local\Temp\339E.tmp"55⤵
- Executes dropped EXE
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\343A.tmp"C:\Users\Admin\AppData\Local\Temp\343A.tmp"56⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\34B7.tmp"C:\Users\Admin\AppData\Local\Temp\34B7.tmp"57⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\35A1.tmp"C:\Users\Admin\AppData\Local\Temp\35A1.tmp"58⤵
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\368C.tmp"C:\Users\Admin\AppData\Local\Temp\368C.tmp"59⤵
- Executes dropped EXE
PID:216 -
C:\Users\Admin\AppData\Local\Temp\3728.tmp"C:\Users\Admin\AppData\Local\Temp\3728.tmp"60⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\37B5.tmp"C:\Users\Admin\AppData\Local\Temp\37B5.tmp"61⤵
- Executes dropped EXE
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\3870.tmp"C:\Users\Admin\AppData\Local\Temp\3870.tmp"62⤵
- Executes dropped EXE
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\38ED.tmp"C:\Users\Admin\AppData\Local\Temp\38ED.tmp"63⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\3999.tmp"C:\Users\Admin\AppData\Local\Temp\3999.tmp"64⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\3A06.tmp"C:\Users\Admin\AppData\Local\Temp\3A06.tmp"65⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"C:\Users\Admin\AppData\Local\Temp\3AA3.tmp"66⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\3B20.tmp"C:\Users\Admin\AppData\Local\Temp\3B20.tmp"67⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"C:\Users\Admin\AppData\Local\Temp\3BBC.tmp"68⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\3C29.tmp"C:\Users\Admin\AppData\Local\Temp\3C29.tmp"69⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"C:\Users\Admin\AppData\Local\Temp\3CB6.tmp"70⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\3D33.tmp"C:\Users\Admin\AppData\Local\Temp\3D33.tmp"71⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"C:\Users\Admin\AppData\Local\Temp\3DB0.tmp"72⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"C:\Users\Admin\AppData\Local\Temp\3E2D.tmp"73⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"C:\Users\Admin\AppData\Local\Temp\3ED9.tmp"74⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\3F85.tmp"C:\Users\Admin\AppData\Local\Temp\3F85.tmp"75⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\3FF2.tmp"C:\Users\Admin\AppData\Local\Temp\3FF2.tmp"76⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\40EC.tmp"C:\Users\Admin\AppData\Local\Temp\40EC.tmp"77⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\4188.tmp"C:\Users\Admin\AppData\Local\Temp\4188.tmp"78⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\4292.tmp"C:\Users\Admin\AppData\Local\Temp\4292.tmp"79⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\431F.tmp"C:\Users\Admin\AppData\Local\Temp\431F.tmp"80⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\43DA.tmp"C:\Users\Admin\AppData\Local\Temp\43DA.tmp"81⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\4447.tmp"C:\Users\Admin\AppData\Local\Temp\4447.tmp"82⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\44C4.tmp"C:\Users\Admin\AppData\Local\Temp\44C4.tmp"83⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\4551.tmp"C:\Users\Admin\AppData\Local\Temp\4551.tmp"84⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\45ED.tmp"C:\Users\Admin\AppData\Local\Temp\45ED.tmp"85⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\467A.tmp"C:\Users\Admin\AppData\Local\Temp\467A.tmp"86⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\46F7.tmp"C:\Users\Admin\AppData\Local\Temp\46F7.tmp"87⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\47B2.tmp"C:\Users\Admin\AppData\Local\Temp\47B2.tmp"88⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\484F.tmp"C:\Users\Admin\AppData\Local\Temp\484F.tmp"89⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\48EB.tmp"C:\Users\Admin\AppData\Local\Temp\48EB.tmp"90⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\49A6.tmp"C:\Users\Admin\AppData\Local\Temp\49A6.tmp"91⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\4A52.tmp"C:\Users\Admin\AppData\Local\Temp\4A52.tmp"92⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"C:\Users\Admin\AppData\Local\Temp\4B0E.tmp"93⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\4C08.tmp"C:\Users\Admin\AppData\Local\Temp\4C08.tmp"94⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"95⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\4D50.tmp"C:\Users\Admin\AppData\Local\Temp\4D50.tmp"96⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"97⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\4E88.tmp"C:\Users\Admin\AppData\Local\Temp\4E88.tmp"98⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"C:\Users\Admin\AppData\Local\Temp\4FF0.tmp"99⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\507C.tmp"C:\Users\Admin\AppData\Local\Temp\507C.tmp"100⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\5128.tmp"C:\Users\Admin\AppData\Local\Temp\5128.tmp"101⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\51C5.tmp"C:\Users\Admin\AppData\Local\Temp\51C5.tmp"102⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\5280.tmp"C:\Users\Admin\AppData\Local\Temp\5280.tmp"103⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\530D.tmp"C:\Users\Admin\AppData\Local\Temp\530D.tmp"104⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\53B9.tmp"C:\Users\Admin\AppData\Local\Temp\53B9.tmp"105⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\5455.tmp"C:\Users\Admin\AppData\Local\Temp\5455.tmp"106⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\5520.tmp"C:\Users\Admin\AppData\Local\Temp\5520.tmp"107⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\55AD.tmp"C:\Users\Admin\AppData\Local\Temp\55AD.tmp"108⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\562A.tmp"C:\Users\Admin\AppData\Local\Temp\562A.tmp"109⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\56A7.tmp"C:\Users\Admin\AppData\Local\Temp\56A7.tmp"110⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\5752.tmp"C:\Users\Admin\AppData\Local\Temp\5752.tmp"111⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\57EF.tmp"C:\Users\Admin\AppData\Local\Temp\57EF.tmp"112⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\587B.tmp"C:\Users\Admin\AppData\Local\Temp\587B.tmp"113⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\5908.tmp"C:\Users\Admin\AppData\Local\Temp\5908.tmp"114⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\5995.tmp"C:\Users\Admin\AppData\Local\Temp\5995.tmp"115⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\5A40.tmp"C:\Users\Admin\AppData\Local\Temp\5A40.tmp"116⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\5B1B.tmp"C:\Users\Admin\AppData\Local\Temp\5B1B.tmp"117⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"118⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\5C63.tmp"C:\Users\Admin\AppData\Local\Temp\5C63.tmp"119⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\5D00.tmp"C:\Users\Admin\AppData\Local\Temp\5D00.tmp"120⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\5D8C.tmp"C:\Users\Admin\AppData\Local\Temp\5D8C.tmp"121⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\5E38.tmp"C:\Users\Admin\AppData\Local\Temp\5E38.tmp"122⤵PID:4800
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-