Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_d441420b250e4cc6c676e8d166809320_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_d441420b250e4cc6c676e8d166809320_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_d441420b250e4cc6c676e8d166809320_mafia_JC.exe
-
Size
487KB
-
MD5
d441420b250e4cc6c676e8d166809320
-
SHA1
c8c90c75e4cbde0cbaf98c8b09ad6a898e08f792
-
SHA256
bae41db4f9a92ef044d66b80f4cd71dabd264dcef7de8188952c6eb7a1423be9
-
SHA512
59f08733138058bb397b58c3965e5711706ba60f3c173b7c608bc2147fbf3ee53dd2951b38138247ca1278b44450550518f4bb09461a3ae9822dda3ffc1a8c98
-
SSDEEP
12288:HU5rCOTeiJtDory86zCziehUBfkklvu1XuNZ:HUQOJJtDIziehUBf9KXuN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2920 A4AC.tmp 1596 A558.tmp 4604 ADF3.tmp 1592 AEAF.tmp 1800 AF4B.tmp 3416 AFC8.tmp 1324 B045.tmp 1436 B110.tmp 2020 B18D.tmp 2744 B229.tmp 4628 B2E5.tmp 4156 B381.tmp 2252 B43C.tmp 2260 B546.tmp 4796 B5E2.tmp 2504 B65F.tmp 796 B70B.tmp 3360 B788.tmp 2900 B815.tmp 216 B8C1.tmp 3696 B9AB.tmp 500 BA57.tmp 940 BAC4.tmp 1360 BB61.tmp 2272 BBFD.tmp 3400 BC89.tmp 4428 BD26.tmp 4352 BDB2.tmp 3476 BE8D.tmp 2024 C091.tmp 432 C13D.tmp 5064 C1E8.tmp 780 C2E2.tmp 4544 C36F.tmp 5068 C3FC.tmp 4776 E31C.tmp 4144 EFFD.tmp 4176 9EE.tmp 1568 CBD.tmp 4152 F3D.tmp 3796 FBA.tmp 4976 1047.tmp 4840 10D4.tmp 4264 12E7.tmp 116 1364.tmp 3496 1410.tmp 2948 147D.tmp 532 150A.tmp 4796 1596.tmp 4056 1613.tmp 3960 16A0.tmp 3252 171D.tmp 4788 178A.tmp 3588 42A2.tmp 4256 48CC.tmp 580 4CB4.tmp 4604 4D40.tmp 3704 4D9E.tmp 4496 4E5A.tmp 3916 4F92.tmp 3384 52CE.tmp 4852 538A.tmp 3648 5436.tmp 2180 5520.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2920 1984 2023-08-26_d441420b250e4cc6c676e8d166809320_mafia_JC.exe 85 PID 1984 wrote to memory of 2920 1984 2023-08-26_d441420b250e4cc6c676e8d166809320_mafia_JC.exe 85 PID 1984 wrote to memory of 2920 1984 2023-08-26_d441420b250e4cc6c676e8d166809320_mafia_JC.exe 85 PID 2920 wrote to memory of 1596 2920 A4AC.tmp 87 PID 2920 wrote to memory of 1596 2920 A4AC.tmp 87 PID 2920 wrote to memory of 1596 2920 A4AC.tmp 87 PID 1596 wrote to memory of 4604 1596 A558.tmp 88 PID 1596 wrote to memory of 4604 1596 A558.tmp 88 PID 1596 wrote to memory of 4604 1596 A558.tmp 88 PID 4604 wrote to memory of 1592 4604 ADF3.tmp 89 PID 4604 wrote to memory of 1592 4604 ADF3.tmp 89 PID 4604 wrote to memory of 1592 4604 ADF3.tmp 89 PID 1592 wrote to memory of 1800 1592 AEAF.tmp 90 PID 1592 wrote to memory of 1800 1592 AEAF.tmp 90 PID 1592 wrote to memory of 1800 1592 AEAF.tmp 90 PID 1800 wrote to memory of 3416 1800 AF4B.tmp 91 PID 1800 wrote to memory of 3416 1800 AF4B.tmp 91 PID 1800 wrote to memory of 3416 1800 AF4B.tmp 91 PID 3416 wrote to memory of 1324 3416 AFC8.tmp 92 PID 3416 wrote to memory of 1324 3416 AFC8.tmp 92 PID 3416 wrote to memory of 1324 3416 AFC8.tmp 92 PID 1324 wrote to memory of 1436 1324 B045.tmp 94 PID 1324 wrote to memory of 1436 1324 B045.tmp 94 PID 1324 wrote to memory of 1436 1324 B045.tmp 94 PID 1436 wrote to memory of 2020 1436 B110.tmp 95 PID 1436 wrote to memory of 2020 1436 B110.tmp 95 PID 1436 wrote to memory of 2020 1436 B110.tmp 95 PID 2020 wrote to memory of 2744 2020 B18D.tmp 96 PID 2020 wrote to memory of 2744 2020 B18D.tmp 96 PID 2020 wrote to memory of 2744 2020 B18D.tmp 96 PID 2744 wrote to memory of 4628 2744 B229.tmp 97 PID 2744 wrote to memory of 4628 2744 B229.tmp 97 PID 2744 wrote to memory of 4628 2744 B229.tmp 97 PID 4628 wrote to memory of 4156 4628 B2E5.tmp 98 PID 4628 wrote to memory of 4156 4628 B2E5.tmp 98 PID 4628 wrote to memory of 4156 4628 B2E5.tmp 98 PID 4156 wrote to memory of 2252 4156 B381.tmp 99 PID 4156 wrote to memory of 2252 4156 B381.tmp 99 PID 4156 wrote to memory of 2252 4156 B381.tmp 99 PID 2252 wrote to memory of 2260 2252 B43C.tmp 100 PID 2252 wrote to memory of 2260 2252 B43C.tmp 100 PID 2252 wrote to memory of 2260 2252 B43C.tmp 100 PID 2260 wrote to memory of 4796 2260 B546.tmp 101 PID 2260 wrote to memory of 4796 2260 B546.tmp 101 PID 2260 wrote to memory of 4796 2260 B546.tmp 101 PID 4796 wrote to memory of 2504 4796 B5E2.tmp 102 PID 4796 wrote to memory of 2504 4796 B5E2.tmp 102 PID 4796 wrote to memory of 2504 4796 B5E2.tmp 102 PID 2504 wrote to memory of 796 2504 B65F.tmp 103 PID 2504 wrote to memory of 796 2504 B65F.tmp 103 PID 2504 wrote to memory of 796 2504 B65F.tmp 103 PID 796 wrote to memory of 3360 796 B70B.tmp 104 PID 796 wrote to memory of 3360 796 B70B.tmp 104 PID 796 wrote to memory of 3360 796 B70B.tmp 104 PID 3360 wrote to memory of 2900 3360 B788.tmp 106 PID 3360 wrote to memory of 2900 3360 B788.tmp 106 PID 3360 wrote to memory of 2900 3360 B788.tmp 106 PID 2900 wrote to memory of 216 2900 B815.tmp 107 PID 2900 wrote to memory of 216 2900 B815.tmp 107 PID 2900 wrote to memory of 216 2900 B815.tmp 107 PID 216 wrote to memory of 3696 216 B8C1.tmp 108 PID 216 wrote to memory of 3696 216 B8C1.tmp 108 PID 216 wrote to memory of 3696 216 B8C1.tmp 108 PID 3696 wrote to memory of 500 3696 B9AB.tmp 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_d441420b250e4cc6c676e8d166809320_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_d441420b250e4cc6c676e8d166809320_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\A4AC.tmp"C:\Users\Admin\AppData\Local\Temp\A4AC.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\A558.tmp"C:\Users\Admin\AppData\Local\Temp\A558.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\ADF3.tmp"C:\Users\Admin\AppData\Local\Temp\ADF3.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\AEAF.tmp"C:\Users\Admin\AppData\Local\Temp\AEAF.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\AF4B.tmp"C:\Users\Admin\AppData\Local\Temp\AF4B.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\B045.tmp"C:\Users\Admin\AppData\Local\Temp\B045.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\B110.tmp"C:\Users\Admin\AppData\Local\Temp\B110.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\B18D.tmp"C:\Users\Admin\AppData\Local\Temp\B18D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\B229.tmp"C:\Users\Admin\AppData\Local\Temp\B229.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\B2E5.tmp"C:\Users\Admin\AppData\Local\Temp\B2E5.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\B381.tmp"C:\Users\Admin\AppData\Local\Temp\B381.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\B43C.tmp"C:\Users\Admin\AppData\Local\Temp\B43C.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\B546.tmp"C:\Users\Admin\AppData\Local\Temp\B546.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\B5E2.tmp"C:\Users\Admin\AppData\Local\Temp\B5E2.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\B65F.tmp"C:\Users\Admin\AppData\Local\Temp\B65F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\B70B.tmp"C:\Users\Admin\AppData\Local\Temp\B70B.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\B788.tmp"C:\Users\Admin\AppData\Local\Temp\B788.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\B815.tmp"C:\Users\Admin\AppData\Local\Temp\B815.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\B8C1.tmp"C:\Users\Admin\AppData\Local\Temp\B8C1.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\BA57.tmp"C:\Users\Admin\AppData\Local\Temp\BA57.tmp"23⤵
- Executes dropped EXE
PID:500 -
C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"24⤵
- Executes dropped EXE
PID:940 -
C:\Users\Admin\AppData\Local\Temp\BB61.tmp"C:\Users\Admin\AppData\Local\Temp\BB61.tmp"25⤵
- Executes dropped EXE
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\BBFD.tmp"C:\Users\Admin\AppData\Local\Temp\BBFD.tmp"26⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\BC89.tmp"C:\Users\Admin\AppData\Local\Temp\BC89.tmp"27⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\BD26.tmp"C:\Users\Admin\AppData\Local\Temp\BD26.tmp"28⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"C:\Users\Admin\AppData\Local\Temp\BDB2.tmp"29⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\BE8D.tmp"C:\Users\Admin\AppData\Local\Temp\BE8D.tmp"30⤵
- Executes dropped EXE
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\C091.tmp"C:\Users\Admin\AppData\Local\Temp\C091.tmp"31⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\C13D.tmp"C:\Users\Admin\AppData\Local\Temp\C13D.tmp"32⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\C1E8.tmp"C:\Users\Admin\AppData\Local\Temp\C1E8.tmp"33⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"34⤵
- Executes dropped EXE
PID:780 -
C:\Users\Admin\AppData\Local\Temp\C36F.tmp"C:\Users\Admin\AppData\Local\Temp\C36F.tmp"35⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\C3FC.tmp"C:\Users\Admin\AppData\Local\Temp\C3FC.tmp"36⤵
- Executes dropped EXE
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\E31C.tmp"C:\Users\Admin\AppData\Local\Temp\E31C.tmp"37⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"C:\Users\Admin\AppData\Local\Temp\EFFD.tmp"38⤵
- Executes dropped EXE
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\9EE.tmp"C:\Users\Admin\AppData\Local\Temp\9EE.tmp"39⤵
- Executes dropped EXE
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\CBD.tmp"C:\Users\Admin\AppData\Local\Temp\CBD.tmp"40⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\F3D.tmp"C:\Users\Admin\AppData\Local\Temp\F3D.tmp"41⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\FBA.tmp"C:\Users\Admin\AppData\Local\Temp\FBA.tmp"42⤵
- Executes dropped EXE
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\1047.tmp"C:\Users\Admin\AppData\Local\Temp\1047.tmp"43⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\10D4.tmp"C:\Users\Admin\AppData\Local\Temp\10D4.tmp"44⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\12E7.tmp"C:\Users\Admin\AppData\Local\Temp\12E7.tmp"45⤵
- Executes dropped EXE
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\1364.tmp"C:\Users\Admin\AppData\Local\Temp\1364.tmp"46⤵
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\1410.tmp"C:\Users\Admin\AppData\Local\Temp\1410.tmp"47⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\147D.tmp"C:\Users\Admin\AppData\Local\Temp\147D.tmp"48⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\150A.tmp"C:\Users\Admin\AppData\Local\Temp\150A.tmp"49⤵
- Executes dropped EXE
PID:532 -
C:\Users\Admin\AppData\Local\Temp\1596.tmp"C:\Users\Admin\AppData\Local\Temp\1596.tmp"50⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\1613.tmp"C:\Users\Admin\AppData\Local\Temp\1613.tmp"51⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\16A0.tmp"C:\Users\Admin\AppData\Local\Temp\16A0.tmp"52⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\171D.tmp"C:\Users\Admin\AppData\Local\Temp\171D.tmp"53⤵
- Executes dropped EXE
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\178A.tmp"C:\Users\Admin\AppData\Local\Temp\178A.tmp"54⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\42A2.tmp"C:\Users\Admin\AppData\Local\Temp\42A2.tmp"55⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\48CC.tmp"C:\Users\Admin\AppData\Local\Temp\48CC.tmp"56⤵
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\4CB4.tmp"C:\Users\Admin\AppData\Local\Temp\4CB4.tmp"57⤵
- Executes dropped EXE
PID:580 -
C:\Users\Admin\AppData\Local\Temp\4D40.tmp"C:\Users\Admin\AppData\Local\Temp\4D40.tmp"58⤵
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\4D9E.tmp"C:\Users\Admin\AppData\Local\Temp\4D9E.tmp"59⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"C:\Users\Admin\AppData\Local\Temp\4E5A.tmp"60⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\4F92.tmp"C:\Users\Admin\AppData\Local\Temp\4F92.tmp"61⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\52CE.tmp"C:\Users\Admin\AppData\Local\Temp\52CE.tmp"62⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\538A.tmp"C:\Users\Admin\AppData\Local\Temp\538A.tmp"63⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\5436.tmp"C:\Users\Admin\AppData\Local\Temp\5436.tmp"64⤵
- Executes dropped EXE
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\5520.tmp"C:\Users\Admin\AppData\Local\Temp\5520.tmp"65⤵
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\55CC.tmp"C:\Users\Admin\AppData\Local\Temp\55CC.tmp"66⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\5668.tmp"C:\Users\Admin\AppData\Local\Temp\5668.tmp"67⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\56E5.tmp"C:\Users\Admin\AppData\Local\Temp\56E5.tmp"68⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\5752.tmp"C:\Users\Admin\AppData\Local\Temp\5752.tmp"69⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\581E.tmp"C:\Users\Admin\AppData\Local\Temp\581E.tmp"70⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\5908.tmp"C:\Users\Admin\AppData\Local\Temp\5908.tmp"71⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\5A31.tmp"C:\Users\Admin\AppData\Local\Temp\5A31.tmp"72⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\5A9E.tmp"C:\Users\Admin\AppData\Local\Temp\5A9E.tmp"73⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\5BE6.tmp"C:\Users\Admin\AppData\Local\Temp\5BE6.tmp"74⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"C:\Users\Admin\AppData\Local\Temp\5CE0.tmp"75⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\5DBB.tmp"C:\Users\Admin\AppData\Local\Temp\5DBB.tmp"76⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\5E96.tmp"C:\Users\Admin\AppData\Local\Temp\5E96.tmp"77⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\5F71.tmp"C:\Users\Admin\AppData\Local\Temp\5F71.tmp"78⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"C:\Users\Admin\AppData\Local\Temp\5FCE.tmp"79⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\601C.tmp"C:\Users\Admin\AppData\Local\Temp\601C.tmp"80⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\608A.tmp"C:\Users\Admin\AppData\Local\Temp\608A.tmp"81⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\60F7.tmp"C:\Users\Admin\AppData\Local\Temp\60F7.tmp"82⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\61D2.tmp"C:\Users\Admin\AppData\Local\Temp\61D2.tmp"83⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\630A.tmp"C:\Users\Admin\AppData\Local\Temp\630A.tmp"84⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\6387.tmp"C:\Users\Admin\AppData\Local\Temp\6387.tmp"85⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\6443.tmp"C:\Users\Admin\AppData\Local\Temp\6443.tmp"86⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\65D9.tmp"C:\Users\Admin\AppData\Local\Temp\65D9.tmp"87⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\6666.tmp"C:\Users\Admin\AppData\Local\Temp\6666.tmp"88⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\66F2.tmp"C:\Users\Admin\AppData\Local\Temp\66F2.tmp"89⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\6944.tmp"C:\Users\Admin\AppData\Local\Temp\6944.tmp"90⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\6A2F.tmp"C:\Users\Admin\AppData\Local\Temp\6A2F.tmp"91⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\6B86.tmp"C:\Users\Admin\AppData\Local\Temp\6B86.tmp"92⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\6C03.tmp"C:\Users\Admin\AppData\Local\Temp\6C03.tmp"93⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\6C80.tmp"C:\Users\Admin\AppData\Local\Temp\6C80.tmp"94⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\6CDE.tmp"C:\Users\Admin\AppData\Local\Temp\6CDE.tmp"95⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\6D7A.tmp"C:\Users\Admin\AppData\Local\Temp\6D7A.tmp"96⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\6E55.tmp"C:\Users\Admin\AppData\Local\Temp\6E55.tmp"97⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\6EC2.tmp"C:\Users\Admin\AppData\Local\Temp\6EC2.tmp"98⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"C:\Users\Admin\AppData\Local\Temp\6F5F.tmp"99⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\700B.tmp"C:\Users\Admin\AppData\Local\Temp\700B.tmp"100⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\70A7.tmp"C:\Users\Admin\AppData\Local\Temp\70A7.tmp"101⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\7105.tmp"C:\Users\Admin\AppData\Local\Temp\7105.tmp"102⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\7162.tmp"C:\Users\Admin\AppData\Local\Temp\7162.tmp"103⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\723D.tmp"C:\Users\Admin\AppData\Local\Temp\723D.tmp"104⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\729B.tmp"C:\Users\Admin\AppData\Local\Temp\729B.tmp"105⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\7308.tmp"C:\Users\Admin\AppData\Local\Temp\7308.tmp"106⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\7366.tmp"C:\Users\Admin\AppData\Local\Temp\7366.tmp"107⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\73E3.tmp"C:\Users\Admin\AppData\Local\Temp\73E3.tmp"108⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\7450.tmp"C:\Users\Admin\AppData\Local\Temp\7450.tmp"109⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\74BE.tmp"C:\Users\Admin\AppData\Local\Temp\74BE.tmp"110⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\753B.tmp"C:\Users\Admin\AppData\Local\Temp\753B.tmp"111⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\75A8.tmp"C:\Users\Admin\AppData\Local\Temp\75A8.tmp"112⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\775E.tmp"C:\Users\Admin\AppData\Local\Temp\775E.tmp"113⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\8DA5.tmp"C:\Users\Admin\AppData\Local\Temp\8DA5.tmp"114⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\90C2.tmp"C:\Users\Admin\AppData\Local\Temp\90C2.tmp"115⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\AC77.tmp"C:\Users\Admin\AppData\Local\Temp\AC77.tmp"116⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\BAB0.tmp"C:\Users\Admin\AppData\Local\Temp\BAB0.tmp"117⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\CEA5.tmp"C:\Users\Admin\AppData\Local\Temp\CEA5.tmp"118⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\DE84.tmp"C:\Users\Admin\AppData\Local\Temp\DE84.tmp"119⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\EA0D.tmp"C:\Users\Admin\AppData\Local\Temp\EA0D.tmp"120⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\EE05.tmp"C:\Users\Admin\AppData\Local\Temp\EE05.tmp"121⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\FEFC.tmp"C:\Users\Admin\AppData\Local\Temp\FEFC.tmp"122⤵PID:3624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-