Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_93df996036f4926f9287f1a78a377719_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_93df996036f4926f9287f1a78a377719_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_93df996036f4926f9287f1a78a377719_mafia_JC.exe
-
Size
486KB
-
MD5
93df996036f4926f9287f1a78a377719
-
SHA1
6a05cfb0e80907d5f97c5c25a0917e694160fb49
-
SHA256
63eb18e0478cddd451866fa31221848ab650a814392ef00feafe231d27bb605c
-
SHA512
4491ee11d434e3c18fa191ed9aeeac5329ce0c3fbae5912f54514d102626e721b9aa4cab7cb208e5d33a74078b02254ccbcce493f88d6ce181db5863d530216c
-
SSDEEP
12288:/U5rCOTeiDZIDtqVlGawIELM69qHpIuIqB53NZ:/UQOJDZ+ttuEQEf+JN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1144 50F9.tmp 3508 53B9.tmp 3468 558D.tmp 2416 57A1.tmp 3248 58C9.tmp 2420 59F2.tmp 1544 5BB7.tmp 4580 5D8C.tmp 4688 5EE4.tmp 4468 60B9.tmp 3544 627E.tmp 4160 6443.tmp 3852 65CA.tmp 3164 6954.tmp 2132 6B19.tmp 2876 6CAF.tmp 316 7114.tmp 1012 721E.tmp 4180 72BA.tmp 1960 74CD.tmp 3184 756A.tmp 3620 778C.tmp 4404 7867.tmp 4060 7932.tmp 748 79DE.tmp 4188 7B46.tmp 1280 7C20.tmp 4440 7EA1.tmp 996 8160.tmp 1260 873C.tmp 4360 89EC.tmp 3076 8CCA.tmp 2176 8EDD.tmp 3280 9006.tmp 4812 9390.tmp 3756 9527.tmp 2440 9824.tmp 1144 9F68.tmp 4616 A062.tmp 5020 A0DF.tmp 2248 A1D9.tmp 3212 A5B1.tmp 3152 A795.tmp 4164 A90C.tmp 4036 A97A.tmp 4624 A9F7.tmp 4700 AA64.tmp 5112 ABDB.tmp 4688 AD62.tmp 2516 AEAA.tmp 4780 B021.tmp 2268 B215.tmp 3544 B495.tmp 3416 B67A.tmp 3304 B7F1.tmp 3996 B86E.tmp 2708 B8DB.tmp 2816 BA52.tmp 2132 BACF.tmp 3676 BB6B.tmp 760 BCB4.tmp 1444 BD40.tmp 2368 BE4A.tmp 1520 BEE6.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 820 wrote to memory of 1144 820 2023-08-25_93df996036f4926f9287f1a78a377719_mafia_JC.exe 87 PID 820 wrote to memory of 1144 820 2023-08-25_93df996036f4926f9287f1a78a377719_mafia_JC.exe 87 PID 820 wrote to memory of 1144 820 2023-08-25_93df996036f4926f9287f1a78a377719_mafia_JC.exe 87 PID 1144 wrote to memory of 3508 1144 50F9.tmp 88 PID 1144 wrote to memory of 3508 1144 50F9.tmp 88 PID 1144 wrote to memory of 3508 1144 50F9.tmp 88 PID 3508 wrote to memory of 3468 3508 53B9.tmp 89 PID 3508 wrote to memory of 3468 3508 53B9.tmp 89 PID 3508 wrote to memory of 3468 3508 53B9.tmp 89 PID 3468 wrote to memory of 2416 3468 558D.tmp 90 PID 3468 wrote to memory of 2416 3468 558D.tmp 90 PID 3468 wrote to memory of 2416 3468 558D.tmp 90 PID 2416 wrote to memory of 3248 2416 57A1.tmp 92 PID 2416 wrote to memory of 3248 2416 57A1.tmp 92 PID 2416 wrote to memory of 3248 2416 57A1.tmp 92 PID 3248 wrote to memory of 2420 3248 58C9.tmp 93 PID 3248 wrote to memory of 2420 3248 58C9.tmp 93 PID 3248 wrote to memory of 2420 3248 58C9.tmp 93 PID 2420 wrote to memory of 1544 2420 59F2.tmp 94 PID 2420 wrote to memory of 1544 2420 59F2.tmp 94 PID 2420 wrote to memory of 1544 2420 59F2.tmp 94 PID 1544 wrote to memory of 4580 1544 5BB7.tmp 95 PID 1544 wrote to memory of 4580 1544 5BB7.tmp 95 PID 1544 wrote to memory of 4580 1544 5BB7.tmp 95 PID 4580 wrote to memory of 4688 4580 5D8C.tmp 96 PID 4580 wrote to memory of 4688 4580 5D8C.tmp 96 PID 4580 wrote to memory of 4688 4580 5D8C.tmp 96 PID 4688 wrote to memory of 4468 4688 5EE4.tmp 97 PID 4688 wrote to memory of 4468 4688 5EE4.tmp 97 PID 4688 wrote to memory of 4468 4688 5EE4.tmp 97 PID 4468 wrote to memory of 3544 4468 60B9.tmp 98 PID 4468 wrote to memory of 3544 4468 60B9.tmp 98 PID 4468 wrote to memory of 3544 4468 60B9.tmp 98 PID 3544 wrote to memory of 4160 3544 627E.tmp 99 PID 3544 wrote to memory of 4160 3544 627E.tmp 99 PID 3544 wrote to memory of 4160 3544 627E.tmp 99 PID 4160 wrote to memory of 3852 4160 6443.tmp 100 PID 4160 wrote to memory of 3852 4160 6443.tmp 100 PID 4160 wrote to memory of 3852 4160 6443.tmp 100 PID 3852 wrote to memory of 3164 3852 65CA.tmp 101 PID 3852 wrote to memory of 3164 3852 65CA.tmp 101 PID 3852 wrote to memory of 3164 3852 65CA.tmp 101 PID 3164 wrote to memory of 2132 3164 6954.tmp 102 PID 3164 wrote to memory of 2132 3164 6954.tmp 102 PID 3164 wrote to memory of 2132 3164 6954.tmp 102 PID 2132 wrote to memory of 2876 2132 6B19.tmp 103 PID 2132 wrote to memory of 2876 2132 6B19.tmp 103 PID 2132 wrote to memory of 2876 2132 6B19.tmp 103 PID 2876 wrote to memory of 316 2876 6CAF.tmp 104 PID 2876 wrote to memory of 316 2876 6CAF.tmp 104 PID 2876 wrote to memory of 316 2876 6CAF.tmp 104 PID 316 wrote to memory of 1012 316 7114.tmp 105 PID 316 wrote to memory of 1012 316 7114.tmp 105 PID 316 wrote to memory of 1012 316 7114.tmp 105 PID 1012 wrote to memory of 4180 1012 721E.tmp 107 PID 1012 wrote to memory of 4180 1012 721E.tmp 107 PID 1012 wrote to memory of 4180 1012 721E.tmp 107 PID 4180 wrote to memory of 1960 4180 72BA.tmp 108 PID 4180 wrote to memory of 1960 4180 72BA.tmp 108 PID 4180 wrote to memory of 1960 4180 72BA.tmp 108 PID 1960 wrote to memory of 3184 1960 74CD.tmp 110 PID 1960 wrote to memory of 3184 1960 74CD.tmp 110 PID 1960 wrote to memory of 3184 1960 74CD.tmp 110 PID 3184 wrote to memory of 3620 3184 756A.tmp 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_93df996036f4926f9287f1a78a377719_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_93df996036f4926f9287f1a78a377719_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\50F9.tmp"C:\Users\Admin\AppData\Local\Temp\50F9.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\53B9.tmp"C:\Users\Admin\AppData\Local\Temp\53B9.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\558D.tmp"C:\Users\Admin\AppData\Local\Temp\558D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\57A1.tmp"C:\Users\Admin\AppData\Local\Temp\57A1.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\58C9.tmp"C:\Users\Admin\AppData\Local\Temp\58C9.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\59F2.tmp"C:\Users\Admin\AppData\Local\Temp\59F2.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"C:\Users\Admin\AppData\Local\Temp\5BB7.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\5D8C.tmp"C:\Users\Admin\AppData\Local\Temp\5D8C.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\5EE4.tmp"C:\Users\Admin\AppData\Local\Temp\5EE4.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\60B9.tmp"C:\Users\Admin\AppData\Local\Temp\60B9.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\627E.tmp"C:\Users\Admin\AppData\Local\Temp\627E.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\6443.tmp"C:\Users\Admin\AppData\Local\Temp\6443.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\65CA.tmp"C:\Users\Admin\AppData\Local\Temp\65CA.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\6954.tmp"C:\Users\Admin\AppData\Local\Temp\6954.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\6B19.tmp"C:\Users\Admin\AppData\Local\Temp\6B19.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\6CAF.tmp"C:\Users\Admin\AppData\Local\Temp\6CAF.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\7114.tmp"C:\Users\Admin\AppData\Local\Temp\7114.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\721E.tmp"C:\Users\Admin\AppData\Local\Temp\721E.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\72BA.tmp"C:\Users\Admin\AppData\Local\Temp\72BA.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\74CD.tmp"C:\Users\Admin\AppData\Local\Temp\74CD.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\756A.tmp"C:\Users\Admin\AppData\Local\Temp\756A.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\778C.tmp"C:\Users\Admin\AppData\Local\Temp\778C.tmp"23⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\7867.tmp"C:\Users\Admin\AppData\Local\Temp\7867.tmp"24⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\7932.tmp"C:\Users\Admin\AppData\Local\Temp\7932.tmp"25⤵
- Executes dropped EXE
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\79DE.tmp"C:\Users\Admin\AppData\Local\Temp\79DE.tmp"26⤵
- Executes dropped EXE
PID:748 -
C:\Users\Admin\AppData\Local\Temp\7B46.tmp"C:\Users\Admin\AppData\Local\Temp\7B46.tmp"27⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\7C20.tmp"C:\Users\Admin\AppData\Local\Temp\7C20.tmp"28⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\7EA1.tmp"C:\Users\Admin\AppData\Local\Temp\7EA1.tmp"29⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\8160.tmp"C:\Users\Admin\AppData\Local\Temp\8160.tmp"30⤵
- Executes dropped EXE
PID:996 -
C:\Users\Admin\AppData\Local\Temp\873C.tmp"C:\Users\Admin\AppData\Local\Temp\873C.tmp"31⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\89EC.tmp"C:\Users\Admin\AppData\Local\Temp\89EC.tmp"32⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\8CCA.tmp"C:\Users\Admin\AppData\Local\Temp\8CCA.tmp"33⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\8EDD.tmp"C:\Users\Admin\AppData\Local\Temp\8EDD.tmp"34⤵
- Executes dropped EXE
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\9006.tmp"C:\Users\Admin\AppData\Local\Temp\9006.tmp"35⤵
- Executes dropped EXE
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\9390.tmp"C:\Users\Admin\AppData\Local\Temp\9390.tmp"36⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\9527.tmp"C:\Users\Admin\AppData\Local\Temp\9527.tmp"37⤵
- Executes dropped EXE
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\9824.tmp"C:\Users\Admin\AppData\Local\Temp\9824.tmp"38⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\9F68.tmp"C:\Users\Admin\AppData\Local\Temp\9F68.tmp"39⤵
- Executes dropped EXE
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\A062.tmp"C:\Users\Admin\AppData\Local\Temp\A062.tmp"40⤵
- Executes dropped EXE
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\A0DF.tmp"C:\Users\Admin\AppData\Local\Temp\A0DF.tmp"41⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\A1D9.tmp"C:\Users\Admin\AppData\Local\Temp\A1D9.tmp"42⤵
- Executes dropped EXE
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\A5B1.tmp"C:\Users\Admin\AppData\Local\Temp\A5B1.tmp"43⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\A795.tmp"C:\Users\Admin\AppData\Local\Temp\A795.tmp"44⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\A90C.tmp"C:\Users\Admin\AppData\Local\Temp\A90C.tmp"45⤵
- Executes dropped EXE
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\A97A.tmp"C:\Users\Admin\AppData\Local\Temp\A97A.tmp"46⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\A9F7.tmp"C:\Users\Admin\AppData\Local\Temp\A9F7.tmp"47⤵
- Executes dropped EXE
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\AA64.tmp"C:\Users\Admin\AppData\Local\Temp\AA64.tmp"48⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\ABDB.tmp"C:\Users\Admin\AppData\Local\Temp\ABDB.tmp"49⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\AD62.tmp"C:\Users\Admin\AppData\Local\Temp\AD62.tmp"50⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\AEAA.tmp"C:\Users\Admin\AppData\Local\Temp\AEAA.tmp"51⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\B021.tmp"C:\Users\Admin\AppData\Local\Temp\B021.tmp"52⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\B215.tmp"C:\Users\Admin\AppData\Local\Temp\B215.tmp"53⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\B495.tmp"C:\Users\Admin\AppData\Local\Temp\B495.tmp"54⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\B67A.tmp"C:\Users\Admin\AppData\Local\Temp\B67A.tmp"55⤵
- Executes dropped EXE
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\B7F1.tmp"C:\Users\Admin\AppData\Local\Temp\B7F1.tmp"56⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\B86E.tmp"C:\Users\Admin\AppData\Local\Temp\B86E.tmp"57⤵
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\B8DB.tmp"C:\Users\Admin\AppData\Local\Temp\B8DB.tmp"58⤵
- Executes dropped EXE
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\BA52.tmp"C:\Users\Admin\AppData\Local\Temp\BA52.tmp"59⤵
- Executes dropped EXE
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\BACF.tmp"C:\Users\Admin\AppData\Local\Temp\BACF.tmp"60⤵
- Executes dropped EXE
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\BB6B.tmp"C:\Users\Admin\AppData\Local\Temp\BB6B.tmp"61⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\BCB4.tmp"C:\Users\Admin\AppData\Local\Temp\BCB4.tmp"62⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\BD40.tmp"C:\Users\Admin\AppData\Local\Temp\BD40.tmp"63⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\BE4A.tmp"C:\Users\Admin\AppData\Local\Temp\BE4A.tmp"64⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\BEE6.tmp"C:\Users\Admin\AppData\Local\Temp\BEE6.tmp"65⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\BF92.tmp"C:\Users\Admin\AppData\Local\Temp\BF92.tmp"66⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\BFFF.tmp"C:\Users\Admin\AppData\Local\Temp\BFFF.tmp"67⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\C1C4.tmp"C:\Users\Admin\AppData\Local\Temp\C1C4.tmp"68⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\C723.tmp"C:\Users\Admin\AppData\Local\Temp\C723.tmp"69⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\C7FE.tmp"C:\Users\Admin\AppData\Local\Temp\C7FE.tmp"70⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\C956.tmp"C:\Users\Admin\AppData\Local\Temp\C956.tmp"71⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\CCA2.tmp"C:\Users\Admin\AppData\Local\Temp\CCA2.tmp"72⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\CD3E.tmp"C:\Users\Admin\AppData\Local\Temp\CD3E.tmp"73⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\CDCB.tmp"C:\Users\Admin\AppData\Local\Temp\CDCB.tmp"74⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\CEB5.tmp"C:\Users\Admin\AppData\Local\Temp\CEB5.tmp"75⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\D099.tmp"C:\Users\Admin\AppData\Local\Temp\D099.tmp"76⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\D126.tmp"C:\Users\Admin\AppData\Local\Temp\D126.tmp"77⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\D1B3.tmp"C:\Users\Admin\AppData\Local\Temp\D1B3.tmp"78⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\D2CC.tmp"C:\Users\Admin\AppData\Local\Temp\D2CC.tmp"79⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\D4DF.tmp"C:\Users\Admin\AppData\Local\Temp\D4DF.tmp"80⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\D54C.tmp"C:\Users\Admin\AppData\Local\Temp\D54C.tmp"81⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\D5BA.tmp"C:\Users\Admin\AppData\Local\Temp\D5BA.tmp"82⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\D646.tmp"C:\Users\Admin\AppData\Local\Temp\D646.tmp"83⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\D6D3.tmp"C:\Users\Admin\AppData\Local\Temp\D6D3.tmp"84⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\D80C.tmp"C:\Users\Admin\AppData\Local\Temp\D80C.tmp"85⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\D9B1.tmp"C:\Users\Admin\AppData\Local\Temp\D9B1.tmp"86⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\DA1F.tmp"C:\Users\Admin\AppData\Local\Temp\DA1F.tmp"87⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\DA8C.tmp"C:\Users\Admin\AppData\Local\Temp\DA8C.tmp"88⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\DB19.tmp"C:\Users\Admin\AppData\Local\Temp\DB19.tmp"89⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\DF20.tmp"C:\Users\Admin\AppData\Local\Temp\DF20.tmp"90⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\DFCC.tmp"C:\Users\Admin\AppData\Local\Temp\DFCC.tmp"91⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\E039.tmp"C:\Users\Admin\AppData\Local\Temp\E039.tmp"92⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\E0C6.tmp"C:\Users\Admin\AppData\Local\Temp\E0C6.tmp"93⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\E133.tmp"C:\Users\Admin\AppData\Local\Temp\E133.tmp"94⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\E29B.tmp"C:\Users\Admin\AppData\Local\Temp\E29B.tmp"95⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\E441.tmp"C:\Users\Admin\AppData\Local\Temp\E441.tmp"96⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\E4CD.tmp"C:\Users\Admin\AppData\Local\Temp\E4CD.tmp"97⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\E75D.tmp"C:\Users\Admin\AppData\Local\Temp\E75D.tmp"98⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\E7CB.tmp"C:\Users\Admin\AppData\Local\Temp\E7CB.tmp"99⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\E838.tmp"C:\Users\Admin\AppData\Local\Temp\E838.tmp"100⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\E8C5.tmp"C:\Users\Admin\AppData\Local\Temp\E8C5.tmp"101⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\EB07.tmp"C:\Users\Admin\AppData\Local\Temp\EB07.tmp"102⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\EB94.tmp"C:\Users\Admin\AppData\Local\Temp\EB94.tmp"103⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\ECBC.tmp"C:\Users\Admin\AppData\Local\Temp\ECBC.tmp"104⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\ED59.tmp"C:\Users\Admin\AppData\Local\Temp\ED59.tmp"105⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\EDC6.tmp"C:\Users\Admin\AppData\Local\Temp\EDC6.tmp"106⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\EE33.tmp"C:\Users\Admin\AppData\Local\Temp\EE33.tmp"107⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\EF4D.tmp"C:\Users\Admin\AppData\Local\Temp\EF4D.tmp"108⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\EFCA.tmp"C:\Users\Admin\AppData\Local\Temp\EFCA.tmp"109⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\F21B.tmp"C:\Users\Admin\AppData\Local\Temp\F21B.tmp"110⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\F298.tmp"C:\Users\Admin\AppData\Local\Temp\F298.tmp"111⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\F3E1.tmp"C:\Users\Admin\AppData\Local\Temp\F3E1.tmp"112⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\F46D.tmp"C:\Users\Admin\AppData\Local\Temp\F46D.tmp"113⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\F623.tmp"C:\Users\Admin\AppData\Local\Temp\F623.tmp"114⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\F6A0.tmp"C:\Users\Admin\AppData\Local\Temp\F6A0.tmp"115⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\F72C.tmp"C:\Users\Admin\AppData\Local\Temp\F72C.tmp"116⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\F79A.tmp"C:\Users\Admin\AppData\Local\Temp\F79A.tmp"117⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\F874.tmp"C:\Users\Admin\AppData\Local\Temp\F874.tmp"118⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\F8E2.tmp"C:\Users\Admin\AppData\Local\Temp\F8E2.tmp"119⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\FAF5.tmp"C:\Users\Admin\AppData\Local\Temp\FAF5.tmp"120⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\FCD9.tmp"C:\Users\Admin\AppData\Local\Temp\FCD9.tmp"121⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\FD66.tmp"C:\Users\Admin\AppData\Local\Temp\FD66.tmp"122⤵PID:2140
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-