Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_3febd75c87d87b575360f9c2dfb3314a_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_3febd75c87d87b575360f9c2dfb3314a_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_3febd75c87d87b575360f9c2dfb3314a_mafia_JC.exe
-
Size
487KB
-
MD5
3febd75c87d87b575360f9c2dfb3314a
-
SHA1
4f6fc8d7fed36f1c7d10148ab78cf941e70a482c
-
SHA256
4f63b1e896ec451d5ac193abf3c5d2400a10f339004d67239e29bdcdc7259708
-
SHA512
fce794bc1784b5e01dd50ebc059da6e91ec10d0dd38221d2b8db755cb27882e1e84131013f14b8130e6ae51ff32c8432c6fab73a82f9effb3caa8630844e258c
-
SSDEEP
12288:yU5rCOTeiNYoxrX0RNcNHDiqKV7R1g5bZ:yUQOJNVNOB9Gb
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1292 9DA7.tmp 4952 9E53.tmp 444 A7B9.tmp 672 C822.tmp 4824 C8AF.tmp 2884 D496.tmp 3340 D532.tmp 5076 D5DE.tmp 3200 F00D.tmp 3836 FA4E.tmp 840 FAEA.tmp 1220 FBC5.tmp 4140 1587.tmp 4372 1613.tmp 3396 16B0.tmp 1268 2371.tmp 4388 26CD.tmp 2368 28B1.tmp 100 2A18.tmp 4744 2EDB.tmp 2828 2FB6.tmp 900 30B0.tmp 3584 317B.tmp 4588 3227.tmp 2984 32D3.tmp 1192 365D.tmp 1044 3728.tmp 3528 37D4.tmp 1892 38AF.tmp 3752 3A83.tmp 1876 3B8D.tmp 3056 3C39.tmp 4448 3D71.tmp 3672 3E7B.tmp 2612 3EF8.tmp 4632 3F75.tmp 5008 408E.tmp 800 4198.tmp 4496 4282.tmp 4908 433E.tmp 552 467A.tmp 2492 4707.tmp 4396 47A3.tmp 5064 483F.tmp 1324 48DB.tmp 4148 4AB0.tmp 3552 4B5C.tmp 3140 4C85.tmp 2748 4D40.tmp 1196 4DEC.tmp 4140 5DDA.tmp 2940 70B6.tmp 2236 7124.tmp 4152 73C4.tmp 3564 7421.tmp 2952 748F.tmp 2068 751B.tmp 4228 76E1.tmp 4772 9A76.tmp 4572 A88F.tmp 3428 A95A.tmp 3356 C4F1.tmp 3684 D7AE.tmp 2136 EAD8.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 1292 212 2023-08-26_3febd75c87d87b575360f9c2dfb3314a_mafia_JC.exe 85 PID 212 wrote to memory of 1292 212 2023-08-26_3febd75c87d87b575360f9c2dfb3314a_mafia_JC.exe 85 PID 212 wrote to memory of 1292 212 2023-08-26_3febd75c87d87b575360f9c2dfb3314a_mafia_JC.exe 85 PID 1292 wrote to memory of 4952 1292 9DA7.tmp 87 PID 1292 wrote to memory of 4952 1292 9DA7.tmp 87 PID 1292 wrote to memory of 4952 1292 9DA7.tmp 87 PID 4952 wrote to memory of 444 4952 9E53.tmp 88 PID 4952 wrote to memory of 444 4952 9E53.tmp 88 PID 4952 wrote to memory of 444 4952 9E53.tmp 88 PID 444 wrote to memory of 672 444 A7B9.tmp 89 PID 444 wrote to memory of 672 444 A7B9.tmp 89 PID 444 wrote to memory of 672 444 A7B9.tmp 89 PID 672 wrote to memory of 4824 672 C822.tmp 90 PID 672 wrote to memory of 4824 672 C822.tmp 90 PID 672 wrote to memory of 4824 672 C822.tmp 90 PID 4824 wrote to memory of 2884 4824 C8AF.tmp 91 PID 4824 wrote to memory of 2884 4824 C8AF.tmp 91 PID 4824 wrote to memory of 2884 4824 C8AF.tmp 91 PID 2884 wrote to memory of 3340 2884 D496.tmp 92 PID 2884 wrote to memory of 3340 2884 D496.tmp 92 PID 2884 wrote to memory of 3340 2884 D496.tmp 92 PID 3340 wrote to memory of 5076 3340 D532.tmp 93 PID 3340 wrote to memory of 5076 3340 D532.tmp 93 PID 3340 wrote to memory of 5076 3340 D532.tmp 93 PID 5076 wrote to memory of 3200 5076 D5DE.tmp 94 PID 5076 wrote to memory of 3200 5076 D5DE.tmp 94 PID 5076 wrote to memory of 3200 5076 D5DE.tmp 94 PID 3200 wrote to memory of 3836 3200 F00D.tmp 95 PID 3200 wrote to memory of 3836 3200 F00D.tmp 95 PID 3200 wrote to memory of 3836 3200 F00D.tmp 95 PID 3836 wrote to memory of 840 3836 FA4E.tmp 96 PID 3836 wrote to memory of 840 3836 FA4E.tmp 96 PID 3836 wrote to memory of 840 3836 FA4E.tmp 96 PID 840 wrote to memory of 1220 840 FAEA.tmp 98 PID 840 wrote to memory of 1220 840 FAEA.tmp 98 PID 840 wrote to memory of 1220 840 FAEA.tmp 98 PID 1220 wrote to memory of 4140 1220 FBC5.tmp 99 PID 1220 wrote to memory of 4140 1220 FBC5.tmp 99 PID 1220 wrote to memory of 4140 1220 FBC5.tmp 99 PID 4140 wrote to memory of 4372 4140 1587.tmp 102 PID 4140 wrote to memory of 4372 4140 1587.tmp 102 PID 4140 wrote to memory of 4372 4140 1587.tmp 102 PID 4372 wrote to memory of 3396 4372 1613.tmp 103 PID 4372 wrote to memory of 3396 4372 1613.tmp 103 PID 4372 wrote to memory of 3396 4372 1613.tmp 103 PID 3396 wrote to memory of 1268 3396 16B0.tmp 104 PID 3396 wrote to memory of 1268 3396 16B0.tmp 104 PID 3396 wrote to memory of 1268 3396 16B0.tmp 104 PID 1268 wrote to memory of 4388 1268 2371.tmp 105 PID 1268 wrote to memory of 4388 1268 2371.tmp 105 PID 1268 wrote to memory of 4388 1268 2371.tmp 105 PID 4388 wrote to memory of 2368 4388 26CD.tmp 106 PID 4388 wrote to memory of 2368 4388 26CD.tmp 106 PID 4388 wrote to memory of 2368 4388 26CD.tmp 106 PID 2368 wrote to memory of 100 2368 28B1.tmp 107 PID 2368 wrote to memory of 100 2368 28B1.tmp 107 PID 2368 wrote to memory of 100 2368 28B1.tmp 107 PID 100 wrote to memory of 4744 100 2A18.tmp 108 PID 100 wrote to memory of 4744 100 2A18.tmp 108 PID 100 wrote to memory of 4744 100 2A18.tmp 108 PID 4744 wrote to memory of 2828 4744 2EDB.tmp 109 PID 4744 wrote to memory of 2828 4744 2EDB.tmp 109 PID 4744 wrote to memory of 2828 4744 2EDB.tmp 109 PID 2828 wrote to memory of 900 2828 2FB6.tmp 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_3febd75c87d87b575360f9c2dfb3314a_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_3febd75c87d87b575360f9c2dfb3314a_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\9DA7.tmp"C:\Users\Admin\AppData\Local\Temp\9DA7.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\9E53.tmp"C:\Users\Admin\AppData\Local\Temp\9E53.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\C822.tmp"C:\Users\Admin\AppData\Local\Temp\C822.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\C8AF.tmp"C:\Users\Admin\AppData\Local\Temp\C8AF.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\D496.tmp"C:\Users\Admin\AppData\Local\Temp\D496.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\D532.tmp"C:\Users\Admin\AppData\Local\Temp\D532.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"C:\Users\Admin\AppData\Local\Temp\D5DE.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\F00D.tmp"C:\Users\Admin\AppData\Local\Temp\F00D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\FA4E.tmp"C:\Users\Admin\AppData\Local\Temp\FA4E.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\FAEA.tmp"C:\Users\Admin\AppData\Local\Temp\FAEA.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\1587.tmp"C:\Users\Admin\AppData\Local\Temp\1587.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\1613.tmp"C:\Users\Admin\AppData\Local\Temp\1613.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\16B0.tmp"C:\Users\Admin\AppData\Local\Temp\16B0.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\2371.tmp"C:\Users\Admin\AppData\Local\Temp\2371.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\26CD.tmp"C:\Users\Admin\AppData\Local\Temp\26CD.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\28B1.tmp"C:\Users\Admin\AppData\Local\Temp\28B1.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\2A18.tmp"C:\Users\Admin\AppData\Local\Temp\2A18.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"C:\Users\Admin\AppData\Local\Temp\2EDB.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"C:\Users\Admin\AppData\Local\Temp\2FB6.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\30B0.tmp"C:\Users\Admin\AppData\Local\Temp\30B0.tmp"23⤵
- Executes dropped EXE
PID:900 -
C:\Users\Admin\AppData\Local\Temp\317B.tmp"C:\Users\Admin\AppData\Local\Temp\317B.tmp"24⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\3227.tmp"C:\Users\Admin\AppData\Local\Temp\3227.tmp"25⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"26⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\365D.tmp"C:\Users\Admin\AppData\Local\Temp\365D.tmp"27⤵
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\3728.tmp"C:\Users\Admin\AppData\Local\Temp\3728.tmp"28⤵
- Executes dropped EXE
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\37D4.tmp"C:\Users\Admin\AppData\Local\Temp\37D4.tmp"29⤵
- Executes dropped EXE
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\38AF.tmp"C:\Users\Admin\AppData\Local\Temp\38AF.tmp"30⤵
- Executes dropped EXE
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\3A83.tmp"C:\Users\Admin\AppData\Local\Temp\3A83.tmp"31⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\3B8D.tmp"C:\Users\Admin\AppData\Local\Temp\3B8D.tmp"32⤵
- Executes dropped EXE
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\3C39.tmp"C:\Users\Admin\AppData\Local\Temp\3C39.tmp"33⤵
- Executes dropped EXE
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\3D71.tmp"C:\Users\Admin\AppData\Local\Temp\3D71.tmp"34⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"C:\Users\Admin\AppData\Local\Temp\3E7B.tmp"35⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\3EF8.tmp"C:\Users\Admin\AppData\Local\Temp\3EF8.tmp"36⤵
- Executes dropped EXE
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\3F75.tmp"C:\Users\Admin\AppData\Local\Temp\3F75.tmp"37⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\408E.tmp"C:\Users\Admin\AppData\Local\Temp\408E.tmp"38⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\4198.tmp"C:\Users\Admin\AppData\Local\Temp\4198.tmp"39⤵
- Executes dropped EXE
PID:800 -
C:\Users\Admin\AppData\Local\Temp\4282.tmp"C:\Users\Admin\AppData\Local\Temp\4282.tmp"40⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\433E.tmp"C:\Users\Admin\AppData\Local\Temp\433E.tmp"41⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\467A.tmp"C:\Users\Admin\AppData\Local\Temp\467A.tmp"42⤵
- Executes dropped EXE
PID:552 -
C:\Users\Admin\AppData\Local\Temp\4707.tmp"C:\Users\Admin\AppData\Local\Temp\4707.tmp"43⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\47A3.tmp"C:\Users\Admin\AppData\Local\Temp\47A3.tmp"44⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\483F.tmp"C:\Users\Admin\AppData\Local\Temp\483F.tmp"45⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\48DB.tmp"C:\Users\Admin\AppData\Local\Temp\48DB.tmp"46⤵
- Executes dropped EXE
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\4AB0.tmp"C:\Users\Admin\AppData\Local\Temp\4AB0.tmp"47⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\4B5C.tmp"C:\Users\Admin\AppData\Local\Temp\4B5C.tmp"48⤵
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\4C85.tmp"C:\Users\Admin\AppData\Local\Temp\4C85.tmp"49⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\4D40.tmp"C:\Users\Admin\AppData\Local\Temp\4D40.tmp"50⤵
- Executes dropped EXE
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"C:\Users\Admin\AppData\Local\Temp\4DEC.tmp"51⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\5DDA.tmp"C:\Users\Admin\AppData\Local\Temp\5DDA.tmp"52⤵
- Executes dropped EXE
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\70B6.tmp"C:\Users\Admin\AppData\Local\Temp\70B6.tmp"53⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\7124.tmp"C:\Users\Admin\AppData\Local\Temp\7124.tmp"54⤵
- Executes dropped EXE
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\73C4.tmp"C:\Users\Admin\AppData\Local\Temp\73C4.tmp"55⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\7421.tmp"C:\Users\Admin\AppData\Local\Temp\7421.tmp"56⤵
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\748F.tmp"C:\Users\Admin\AppData\Local\Temp\748F.tmp"57⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\751B.tmp"C:\Users\Admin\AppData\Local\Temp\751B.tmp"58⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\76E1.tmp"C:\Users\Admin\AppData\Local\Temp\76E1.tmp"59⤵
- Executes dropped EXE
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\9A76.tmp"C:\Users\Admin\AppData\Local\Temp\9A76.tmp"60⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\A88F.tmp"C:\Users\Admin\AppData\Local\Temp\A88F.tmp"61⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\A95A.tmp"C:\Users\Admin\AppData\Local\Temp\A95A.tmp"62⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\C4F1.tmp"C:\Users\Admin\AppData\Local\Temp\C4F1.tmp"63⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\D7AE.tmp"C:\Users\Admin\AppData\Local\Temp\D7AE.tmp"64⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\EAD8.tmp"C:\Users\Admin\AppData\Local\Temp\EAD8.tmp"65⤵
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\FD85.tmp"C:\Users\Admin\AppData\Local\Temp\FD85.tmp"66⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\CD7.tmp"C:\Users\Admin\AppData\Local\Temp\CD7.tmp"67⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\1870.tmp"C:\Users\Admin\AppData\Local\Temp\1870.tmp"68⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\1AC2.tmp"C:\Users\Admin\AppData\Local\Temp\1AC2.tmp"69⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\1C68.tmp"C:\Users\Admin\AppData\Local\Temp\1C68.tmp"70⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\1D52.tmp"C:\Users\Admin\AppData\Local\Temp\1D52.tmp"71⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\1EE8.tmp"C:\Users\Admin\AppData\Local\Temp\1EE8.tmp"72⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\1FF2.tmp"C:\Users\Admin\AppData\Local\Temp\1FF2.tmp"73⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\20BD.tmp"C:\Users\Admin\AppData\Local\Temp\20BD.tmp"74⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\2263.tmp"C:\Users\Admin\AppData\Local\Temp\2263.tmp"75⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\239B.tmp"C:\Users\Admin\AppData\Local\Temp\239B.tmp"76⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\2447.tmp"C:\Users\Admin\AppData\Local\Temp\2447.tmp"77⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\24D4.tmp"C:\Users\Admin\AppData\Local\Temp\24D4.tmp"78⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\25FD.tmp"C:\Users\Admin\AppData\Local\Temp\25FD.tmp"79⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\26D7.tmp"C:\Users\Admin\AppData\Local\Temp\26D7.tmp"80⤵PID:712
-
C:\Users\Admin\AppData\Local\Temp\2783.tmp"C:\Users\Admin\AppData\Local\Temp\2783.tmp"81⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\287D.tmp"C:\Users\Admin\AppData\Local\Temp\287D.tmp"82⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\29E5.tmp"C:\Users\Admin\AppData\Local\Temp\29E5.tmp"83⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\2A81.tmp"C:\Users\Admin\AppData\Local\Temp\2A81.tmp"84⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2B0E.tmp"C:\Users\Admin\AppData\Local\Temp\2B0E.tmp"85⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\2B7B.tmp"C:\Users\Admin\AppData\Local\Temp\2B7B.tmp"86⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\2BF8.tmp"C:\Users\Admin\AppData\Local\Temp\2BF8.tmp"87⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\2C75.tmp"C:\Users\Admin\AppData\Local\Temp\2C75.tmp"88⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\2CE2.tmp"C:\Users\Admin\AppData\Local\Temp\2CE2.tmp"89⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\2DBD.tmp"C:\Users\Admin\AppData\Local\Temp\2DBD.tmp"90⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\2EB7.tmp"C:\Users\Admin\AppData\Local\Temp\2EB7.tmp"91⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\2F44.tmp"C:\Users\Admin\AppData\Local\Temp\2F44.tmp"92⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\2FC1.tmp"C:\Users\Admin\AppData\Local\Temp\2FC1.tmp"93⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\307C.tmp"C:\Users\Admin\AppData\Local\Temp\307C.tmp"94⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\3222.tmp"C:\Users\Admin\AppData\Local\Temp\3222.tmp"95⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\330C.tmp"C:\Users\Admin\AppData\Local\Temp\330C.tmp"96⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\33B8.tmp"C:\Users\Admin\AppData\Local\Temp\33B8.tmp"97⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\3435.tmp"C:\Users\Admin\AppData\Local\Temp\3435.tmp"98⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\34E1.tmp"C:\Users\Admin\AppData\Local\Temp\34E1.tmp"99⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\354F.tmp"C:\Users\Admin\AppData\Local\Temp\354F.tmp"100⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\35DB.tmp"C:\Users\Admin\AppData\Local\Temp\35DB.tmp"101⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\3658.tmp"C:\Users\Admin\AppData\Local\Temp\3658.tmp"102⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\36E5.tmp"C:\Users\Admin\AppData\Local\Temp\36E5.tmp"103⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\3781.tmp"C:\Users\Admin\AppData\Local\Temp\3781.tmp"104⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\5857.tmp"C:\Users\Admin\AppData\Local\Temp\5857.tmp"105⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\6E9E.tmp"C:\Users\Admin\AppData\Local\Temp\6E9E.tmp"106⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\92C0.tmp"C:\Users\Admin\AppData\Local\Temp\92C0.tmp"107⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\936C.tmp"C:\Users\Admin\AppData\Local\Temp\936C.tmp"108⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\9418.tmp"C:\Users\Admin\AppData\Local\Temp\9418.tmp"109⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\9495.tmp"C:\Users\Admin\AppData\Local\Temp\9495.tmp"110⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\9522.tmp"C:\Users\Admin\AppData\Local\Temp\9522.tmp"111⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\959F.tmp"C:\Users\Admin\AppData\Local\Temp\959F.tmp"112⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\964B.tmp"C:\Users\Admin\AppData\Local\Temp\964B.tmp"113⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\96E7.tmp"C:\Users\Admin\AppData\Local\Temp\96E7.tmp"114⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\9919.tmp"C:\Users\Admin\AppData\Local\Temp\9919.tmp"115⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\99B6.tmp"C:\Users\Admin\AppData\Local\Temp\99B6.tmp"116⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\9A33.tmp"C:\Users\Admin\AppData\Local\Temp\9A33.tmp"117⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\9A90.tmp"C:\Users\Admin\AppData\Local\Temp\9A90.tmp"118⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\9AFE.tmp"C:\Users\Admin\AppData\Local\Temp\9AFE.tmp"119⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\9C75.tmp"C:\Users\Admin\AppData\Local\Temp\9C75.tmp"120⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\9D11.tmp"C:\Users\Admin\AppData\Local\Temp\9D11.tmp"121⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\B694.tmp"C:\Users\Admin\AppData\Local\Temp\B694.tmp"122⤵PID:4856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-