Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2023, 16:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5ad377a885656b35f73506ed9a48cb7d_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5ad377a885656b35f73506ed9a48cb7d_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
5ad377a885656b35f73506ed9a48cb7d_mafia_JC.exe
-
Size
486KB
-
MD5
5ad377a885656b35f73506ed9a48cb7d
-
SHA1
64e809eaa6e0469ae6cf47ca776152fc32a79301
-
SHA256
9cdafaa09a838bd199e3ad1bf7aa2340ba431faf407d77a336093301b5749871
-
SHA512
1ebf7ed95917ee51027eb711f1ac704246cc5e6e76af1e4e17e3b4c3284f7b00314d68eb91e65effcf2b22644d2575b7bb60c7b0b83089441b76b19186312b41
-
SSDEEP
12288:UU5rCOTeiD2UY7hpoBExJVzFJALvqDs/5QI1wNZ:UUQOJD2p7h26xJJALiDshQfN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5032 267E.tmp 1840 28C1.tmp 4700 298C.tmp 2684 2A66.tmp 224 2B9F.tmp 3600 2CE7.tmp 3052 2E4E.tmp 5108 30DF.tmp 3504 319A.tmp 1100 3265.tmp 1744 3302.tmp 4444 33DC.tmp 2916 3459.tmp 3220 35A1.tmp 2896 36DA.tmp 2044 3795.tmp 2468 3880.tmp 4576 39A9.tmp 4888 3AE1.tmp 1692 3BDB.tmp 4624 3CF4.tmp 2724 3DCF.tmp 4112 3F65.tmp 828 40FC.tmp 1176 41C7.tmp 396 433E.tmp 2408 4486.tmp 2440 468A.tmp 3336 4764.tmp 2164 4810.tmp 4408 48FB.tmp 2500 4BD9.tmp 4396 4F34.tmp 4356 51B5.tmp 3668 5251.tmp 4804 53B9.tmp 3920 54D2.tmp 1152 561A.tmp 1224 5752.tmp 4652 581E.tmp 1164 58BA.tmp 1652 5946.tmp 1556 59F2.tmp 1644 5A8F.tmp 4604 5B89.tmp 2504 5C25.tmp 3580 5CE0.tmp 400 5D7D.tmp 2788 5E28.tmp 688 5EC5.tmp 1992 5F71.tmp 1416 5FEE.tmp 792 608A.tmp 3936 6155.tmp 4236 61E2.tmp 3768 624F.tmp 5060 63B6.tmp 60 65F8.tmp 3232 6906.tmp 4540 6983.tmp 4916 6A2F.tmp 2256 6ABB.tmp 2360 6BB5.tmp 4932 6C61.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4476 wrote to memory of 5032 4476 5ad377a885656b35f73506ed9a48cb7d_mafia_JC.exe 81 PID 4476 wrote to memory of 5032 4476 5ad377a885656b35f73506ed9a48cb7d_mafia_JC.exe 81 PID 4476 wrote to memory of 5032 4476 5ad377a885656b35f73506ed9a48cb7d_mafia_JC.exe 81 PID 5032 wrote to memory of 1840 5032 267E.tmp 82 PID 5032 wrote to memory of 1840 5032 267E.tmp 82 PID 5032 wrote to memory of 1840 5032 267E.tmp 82 PID 1840 wrote to memory of 4700 1840 28C1.tmp 83 PID 1840 wrote to memory of 4700 1840 28C1.tmp 83 PID 1840 wrote to memory of 4700 1840 28C1.tmp 83 PID 4700 wrote to memory of 2684 4700 298C.tmp 84 PID 4700 wrote to memory of 2684 4700 298C.tmp 84 PID 4700 wrote to memory of 2684 4700 298C.tmp 84 PID 2684 wrote to memory of 224 2684 2A66.tmp 85 PID 2684 wrote to memory of 224 2684 2A66.tmp 85 PID 2684 wrote to memory of 224 2684 2A66.tmp 85 PID 224 wrote to memory of 3600 224 2B9F.tmp 86 PID 224 wrote to memory of 3600 224 2B9F.tmp 86 PID 224 wrote to memory of 3600 224 2B9F.tmp 86 PID 3600 wrote to memory of 3052 3600 2CE7.tmp 87 PID 3600 wrote to memory of 3052 3600 2CE7.tmp 87 PID 3600 wrote to memory of 3052 3600 2CE7.tmp 87 PID 3052 wrote to memory of 5108 3052 2E4E.tmp 88 PID 3052 wrote to memory of 5108 3052 2E4E.tmp 88 PID 3052 wrote to memory of 5108 3052 2E4E.tmp 88 PID 5108 wrote to memory of 3504 5108 30DF.tmp 89 PID 5108 wrote to memory of 3504 5108 30DF.tmp 89 PID 5108 wrote to memory of 3504 5108 30DF.tmp 89 PID 3504 wrote to memory of 1100 3504 319A.tmp 90 PID 3504 wrote to memory of 1100 3504 319A.tmp 90 PID 3504 wrote to memory of 1100 3504 319A.tmp 90 PID 1100 wrote to memory of 1744 1100 3265.tmp 91 PID 1100 wrote to memory of 1744 1100 3265.tmp 91 PID 1100 wrote to memory of 1744 1100 3265.tmp 91 PID 1744 wrote to memory of 4444 1744 3302.tmp 92 PID 1744 wrote to memory of 4444 1744 3302.tmp 92 PID 1744 wrote to memory of 4444 1744 3302.tmp 92 PID 4444 wrote to memory of 2916 4444 33DC.tmp 93 PID 4444 wrote to memory of 2916 4444 33DC.tmp 93 PID 4444 wrote to memory of 2916 4444 33DC.tmp 93 PID 2916 wrote to memory of 3220 2916 3459.tmp 94 PID 2916 wrote to memory of 3220 2916 3459.tmp 94 PID 2916 wrote to memory of 3220 2916 3459.tmp 94 PID 3220 wrote to memory of 2896 3220 35A1.tmp 95 PID 3220 wrote to memory of 2896 3220 35A1.tmp 95 PID 3220 wrote to memory of 2896 3220 35A1.tmp 95 PID 2896 wrote to memory of 2044 2896 36DA.tmp 96 PID 2896 wrote to memory of 2044 2896 36DA.tmp 96 PID 2896 wrote to memory of 2044 2896 36DA.tmp 96 PID 2044 wrote to memory of 2468 2044 3795.tmp 97 PID 2044 wrote to memory of 2468 2044 3795.tmp 97 PID 2044 wrote to memory of 2468 2044 3795.tmp 97 PID 2468 wrote to memory of 4576 2468 3880.tmp 98 PID 2468 wrote to memory of 4576 2468 3880.tmp 98 PID 2468 wrote to memory of 4576 2468 3880.tmp 98 PID 4576 wrote to memory of 4888 4576 39A9.tmp 99 PID 4576 wrote to memory of 4888 4576 39A9.tmp 99 PID 4576 wrote to memory of 4888 4576 39A9.tmp 99 PID 4888 wrote to memory of 1692 4888 3AE1.tmp 100 PID 4888 wrote to memory of 1692 4888 3AE1.tmp 100 PID 4888 wrote to memory of 1692 4888 3AE1.tmp 100 PID 1692 wrote to memory of 4624 1692 3BDB.tmp 101 PID 1692 wrote to memory of 4624 1692 3BDB.tmp 101 PID 1692 wrote to memory of 4624 1692 3BDB.tmp 101 PID 4624 wrote to memory of 2724 4624 3CF4.tmp 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ad377a885656b35f73506ed9a48cb7d_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\5ad377a885656b35f73506ed9a48cb7d_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\267E.tmp"C:\Users\Admin\AppData\Local\Temp\267E.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\28C1.tmp"C:\Users\Admin\AppData\Local\Temp\28C1.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\298C.tmp"C:\Users\Admin\AppData\Local\Temp\298C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\2A66.tmp"C:\Users\Admin\AppData\Local\Temp\2A66.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"C:\Users\Admin\AppData\Local\Temp\2B9F.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"C:\Users\Admin\AppData\Local\Temp\2CE7.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"C:\Users\Admin\AppData\Local\Temp\2E4E.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\30DF.tmp"C:\Users\Admin\AppData\Local\Temp\30DF.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\319A.tmp"C:\Users\Admin\AppData\Local\Temp\319A.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\3265.tmp"C:\Users\Admin\AppData\Local\Temp\3265.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\3459.tmp"C:\Users\Admin\AppData\Local\Temp\3459.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\35A1.tmp"C:\Users\Admin\AppData\Local\Temp\35A1.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\36DA.tmp"C:\Users\Admin\AppData\Local\Temp\36DA.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\3795.tmp"C:\Users\Admin\AppData\Local\Temp\3795.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\3880.tmp"C:\Users\Admin\AppData\Local\Temp\3880.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\39A9.tmp"C:\Users\Admin\AppData\Local\Temp\39A9.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\3AE1.tmp"C:\Users\Admin\AppData\Local\Temp\3AE1.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"C:\Users\Admin\AppData\Local\Temp\3BDB.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"C:\Users\Admin\AppData\Local\Temp\3CF4.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\3DCF.tmp"C:\Users\Admin\AppData\Local\Temp\3DCF.tmp"23⤵
- Executes dropped EXE
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\3F65.tmp"C:\Users\Admin\AppData\Local\Temp\3F65.tmp"24⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\40FC.tmp"C:\Users\Admin\AppData\Local\Temp\40FC.tmp"25⤵
- Executes dropped EXE
PID:828 -
C:\Users\Admin\AppData\Local\Temp\41C7.tmp"C:\Users\Admin\AppData\Local\Temp\41C7.tmp"26⤵
- Executes dropped EXE
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\433E.tmp"C:\Users\Admin\AppData\Local\Temp\433E.tmp"27⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\4486.tmp"C:\Users\Admin\AppData\Local\Temp\4486.tmp"28⤵
- Executes dropped EXE
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\468A.tmp"C:\Users\Admin\AppData\Local\Temp\468A.tmp"29⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\4764.tmp"C:\Users\Admin\AppData\Local\Temp\4764.tmp"30⤵
- Executes dropped EXE
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\4810.tmp"C:\Users\Admin\AppData\Local\Temp\4810.tmp"31⤵
- Executes dropped EXE
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\48FB.tmp"C:\Users\Admin\AppData\Local\Temp\48FB.tmp"32⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"33⤵
- Executes dropped EXE
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\4F34.tmp"C:\Users\Admin\AppData\Local\Temp\4F34.tmp"34⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\51B5.tmp"C:\Users\Admin\AppData\Local\Temp\51B5.tmp"35⤵
- Executes dropped EXE
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\5251.tmp"C:\Users\Admin\AppData\Local\Temp\5251.tmp"36⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\53B9.tmp"C:\Users\Admin\AppData\Local\Temp\53B9.tmp"37⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\54D2.tmp"C:\Users\Admin\AppData\Local\Temp\54D2.tmp"38⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\561A.tmp"C:\Users\Admin\AppData\Local\Temp\561A.tmp"39⤵
- Executes dropped EXE
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\5752.tmp"C:\Users\Admin\AppData\Local\Temp\5752.tmp"40⤵
- Executes dropped EXE
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\581E.tmp"C:\Users\Admin\AppData\Local\Temp\581E.tmp"41⤵
- Executes dropped EXE
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\58BA.tmp"C:\Users\Admin\AppData\Local\Temp\58BA.tmp"42⤵
- Executes dropped EXE
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\5946.tmp"C:\Users\Admin\AppData\Local\Temp\5946.tmp"43⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\59F2.tmp"C:\Users\Admin\AppData\Local\Temp\59F2.tmp"44⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\5A8F.tmp"C:\Users\Admin\AppData\Local\Temp\5A8F.tmp"45⤵
- Executes dropped EXE
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\5B89.tmp"C:\Users\Admin\AppData\Local\Temp\5B89.tmp"46⤵
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\5C25.tmp"C:\Users\Admin\AppData\Local\Temp\5C25.tmp"47⤵
- Executes dropped EXE
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"48⤵
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"49⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\5E28.tmp"C:\Users\Admin\AppData\Local\Temp\5E28.tmp"50⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"C:\Users\Admin\AppData\Local\Temp\5EC5.tmp"51⤵
- Executes dropped EXE
PID:688 -
C:\Users\Admin\AppData\Local\Temp\5F71.tmp"C:\Users\Admin\AppData\Local\Temp\5F71.tmp"52⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\5FEE.tmp"C:\Users\Admin\AppData\Local\Temp\5FEE.tmp"53⤵
- Executes dropped EXE
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\608A.tmp"C:\Users\Admin\AppData\Local\Temp\608A.tmp"54⤵
- Executes dropped EXE
PID:792 -
C:\Users\Admin\AppData\Local\Temp\6155.tmp"C:\Users\Admin\AppData\Local\Temp\6155.tmp"55⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\61E2.tmp"C:\Users\Admin\AppData\Local\Temp\61E2.tmp"56⤵
- Executes dropped EXE
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\624F.tmp"C:\Users\Admin\AppData\Local\Temp\624F.tmp"57⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\63B6.tmp"C:\Users\Admin\AppData\Local\Temp\63B6.tmp"58⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\65F8.tmp"C:\Users\Admin\AppData\Local\Temp\65F8.tmp"59⤵
- Executes dropped EXE
PID:60 -
C:\Users\Admin\AppData\Local\Temp\6906.tmp"C:\Users\Admin\AppData\Local\Temp\6906.tmp"60⤵
- Executes dropped EXE
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\6983.tmp"C:\Users\Admin\AppData\Local\Temp\6983.tmp"61⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\6A2F.tmp"C:\Users\Admin\AppData\Local\Temp\6A2F.tmp"62⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\6ABB.tmp"C:\Users\Admin\AppData\Local\Temp\6ABB.tmp"63⤵
- Executes dropped EXE
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\6BB5.tmp"C:\Users\Admin\AppData\Local\Temp\6BB5.tmp"64⤵
- Executes dropped EXE
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\6C61.tmp"C:\Users\Admin\AppData\Local\Temp\6C61.tmp"65⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\6DA9.tmp"C:\Users\Admin\AppData\Local\Temp\6DA9.tmp"66⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\6E84.tmp"C:\Users\Admin\AppData\Local\Temp\6E84.tmp"67⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\6F11.tmp"C:\Users\Admin\AppData\Local\Temp\6F11.tmp"68⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\6FCC.tmp"C:\Users\Admin\AppData\Local\Temp\6FCC.tmp"69⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\7078.tmp"C:\Users\Admin\AppData\Local\Temp\7078.tmp"70⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\7114.tmp"C:\Users\Admin\AppData\Local\Temp\7114.tmp"71⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\71D0.tmp"C:\Users\Admin\AppData\Local\Temp\71D0.tmp"72⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\725C.tmp"C:\Users\Admin\AppData\Local\Temp\725C.tmp"73⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\7318.tmp"C:\Users\Admin\AppData\Local\Temp\7318.tmp"74⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\73B4.tmp"C:\Users\Admin\AppData\Local\Temp\73B4.tmp"75⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\7460.tmp"C:\Users\Admin\AppData\Local\Temp\7460.tmp"76⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\74FC.tmp"C:\Users\Admin\AppData\Local\Temp\74FC.tmp"77⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\7589.tmp"C:\Users\Admin\AppData\Local\Temp\7589.tmp"78⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\75F6.tmp"C:\Users\Admin\AppData\Local\Temp\75F6.tmp"79⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\76A2.tmp"C:\Users\Admin\AppData\Local\Temp\76A2.tmp"80⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\771F.tmp"C:\Users\Admin\AppData\Local\Temp\771F.tmp"81⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\77AC.tmp"C:\Users\Admin\AppData\Local\Temp\77AC.tmp"82⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\7848.tmp"C:\Users\Admin\AppData\Local\Temp\7848.tmp"83⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\78D5.tmp"C:\Users\Admin\AppData\Local\Temp\78D5.tmp"84⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\7971.tmp"C:\Users\Admin\AppData\Local\Temp\7971.tmp"85⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\79FD.tmp"C:\Users\Admin\AppData\Local\Temp\79FD.tmp"86⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\7A8A.tmp"C:\Users\Admin\AppData\Local\Temp\7A8A.tmp"87⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\7B36.tmp"C:\Users\Admin\AppData\Local\Temp\7B36.tmp"88⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\7BB3.tmp"C:\Users\Admin\AppData\Local\Temp\7BB3.tmp"89⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\7C30.tmp"C:\Users\Admin\AppData\Local\Temp\7C30.tmp"90⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\7C9D.tmp"C:\Users\Admin\AppData\Local\Temp\7C9D.tmp"91⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\7D3A.tmp"C:\Users\Admin\AppData\Local\Temp\7D3A.tmp"92⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\7DB7.tmp"C:\Users\Admin\AppData\Local\Temp\7DB7.tmp"93⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\7E24.tmp"C:\Users\Admin\AppData\Local\Temp\7E24.tmp"94⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\7EB1.tmp"C:\Users\Admin\AppData\Local\Temp\7EB1.tmp"95⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\7F2E.tmp"C:\Users\Admin\AppData\Local\Temp\7F2E.tmp"96⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"97⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\8028.tmp"C:\Users\Admin\AppData\Local\Temp\8028.tmp"98⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\80F3.tmp"C:\Users\Admin\AppData\Local\Temp\80F3.tmp"99⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\817F.tmp"C:\Users\Admin\AppData\Local\Temp\817F.tmp"100⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\820C.tmp"C:\Users\Admin\AppData\Local\Temp\820C.tmp"101⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\8299.tmp"C:\Users\Admin\AppData\Local\Temp\8299.tmp"102⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\8344.tmp"C:\Users\Admin\AppData\Local\Temp\8344.tmp"103⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\83D1.tmp"C:\Users\Admin\AppData\Local\Temp\83D1.tmp"104⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\844E.tmp"C:\Users\Admin\AppData\Local\Temp\844E.tmp"105⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\84BB.tmp"C:\Users\Admin\AppData\Local\Temp\84BB.tmp"106⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\8529.tmp"C:\Users\Admin\AppData\Local\Temp\8529.tmp"107⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\85A6.tmp"C:\Users\Admin\AppData\Local\Temp\85A6.tmp"108⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\8623.tmp"C:\Users\Admin\AppData\Local\Temp\8623.tmp"109⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\86BF.tmp"C:\Users\Admin\AppData\Local\Temp\86BF.tmp"110⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\872C.tmp"C:\Users\Admin\AppData\Local\Temp\872C.tmp"111⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\87B9.tmp"C:\Users\Admin\AppData\Local\Temp\87B9.tmp"112⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\8855.tmp"C:\Users\Admin\AppData\Local\Temp\8855.tmp"113⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\88C3.tmp"C:\Users\Admin\AppData\Local\Temp\88C3.tmp"114⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\8940.tmp"C:\Users\Admin\AppData\Local\Temp\8940.tmp"115⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\89EC.tmp"C:\Users\Admin\AppData\Local\Temp\89EC.tmp"116⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\8A69.tmp"C:\Users\Admin\AppData\Local\Temp\8A69.tmp"117⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\8B05.tmp"C:\Users\Admin\AppData\Local\Temp\8B05.tmp"118⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\8B82.tmp"C:\Users\Admin\AppData\Local\Temp\8B82.tmp"119⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\8BFF.tmp"C:\Users\Admin\AppData\Local\Temp\8BFF.tmp"120⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\8C7C.tmp"C:\Users\Admin\AppData\Local\Temp\8C7C.tmp"121⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\8CF9.tmp"C:\Users\Admin\AppData\Local\Temp\8CF9.tmp"122⤵PID:3420
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-