Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_dd69c4eb5682f0849123dccca8536892_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_dd69c4eb5682f0849123dccca8536892_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_dd69c4eb5682f0849123dccca8536892_mafia_JC.exe
-
Size
527KB
-
MD5
dd69c4eb5682f0849123dccca8536892
-
SHA1
bba6742725e0328e63a66825f43f47be76bace57
-
SHA256
833cd57d2fd23830acb1f0adf826006f7261b1ad891bc7fe568b7be4aa74516a
-
SHA512
a5e34fd6293f83b4c3d35c2863df6653003d4b881ee755ea6c44a1cfa8d76bf94bca1bb75ff8360d26d87a53b13c91459ca78d2abb350a46d2f3fc4c3f6f13e1
-
SSDEEP
12288:fU5rCOTeidP001OMWBczzkOZyXz3eW+G8DZu:fUQOJd80k9WfkOZkz3eWuDo
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2144 B8B1.tmp 4716 B98C.tmp 3452 BA28.tmp 268 BB03.tmp 1656 BBBE.tmp 2344 BC7A.tmp 4172 BD26.tmp 2032 BDE1.tmp 4728 BE9D.tmp 3788 BF49.tmp 4884 BFF4.tmp 664 C081.tmp 3448 C12D.tmp 2088 C246.tmp 5092 C2E2.tmp 4464 C35F.tmp 560 C40B.tmp 5036 C4B7.tmp 3000 C553.tmp 2852 C60F.tmp 4000 C6AB.tmp 4280 C757.tmp 4408 C9B8.tmp 4572 CA45.tmp 4360 CAE1.tmp 3880 CB9D.tmp 1628 CC0A.tmp 2156 CDFE.tmp 4452 CEBA.tmp 2280 CF94.tmp 3392 D021.tmp 968 D0AE.tmp 4960 D14A.tmp 4380 D1E6.tmp 5108 D263.tmp 380 D2F0.tmp 860 D34E.tmp 3280 D3CB.tmp 4860 D467.tmp 4720 D4E4.tmp 2936 D551.tmp 1868 D5ED.tmp 1764 D716.tmp 2684 D7F1.tmp 4328 D87E.tmp 1960 D8DB.tmp 3352 D958.tmp 1732 D9C6.tmp 792 DA62.tmp 544 DACF.tmp 904 DB4C.tmp 1420 DC95.tmp 4416 DD21.tmp 4564 DD9E.tmp 1292 DE1B.tmp 560 DFE0.tmp 5036 E06D.tmp 2204 E109.tmp 2500 E167.tmp 2852 E1F4.tmp 5060 E280.tmp 2876 E30D.tmp 3636 E37A.tmp 4116 E3D8.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 2144 3888 2023-08-25_dd69c4eb5682f0849123dccca8536892_mafia_JC.exe 85 PID 3888 wrote to memory of 2144 3888 2023-08-25_dd69c4eb5682f0849123dccca8536892_mafia_JC.exe 85 PID 3888 wrote to memory of 2144 3888 2023-08-25_dd69c4eb5682f0849123dccca8536892_mafia_JC.exe 85 PID 2144 wrote to memory of 4716 2144 B8B1.tmp 87 PID 2144 wrote to memory of 4716 2144 B8B1.tmp 87 PID 2144 wrote to memory of 4716 2144 B8B1.tmp 87 PID 4716 wrote to memory of 3452 4716 B98C.tmp 88 PID 4716 wrote to memory of 3452 4716 B98C.tmp 88 PID 4716 wrote to memory of 3452 4716 B98C.tmp 88 PID 3452 wrote to memory of 268 3452 BA28.tmp 89 PID 3452 wrote to memory of 268 3452 BA28.tmp 89 PID 3452 wrote to memory of 268 3452 BA28.tmp 89 PID 268 wrote to memory of 1656 268 BB03.tmp 90 PID 268 wrote to memory of 1656 268 BB03.tmp 90 PID 268 wrote to memory of 1656 268 BB03.tmp 90 PID 1656 wrote to memory of 2344 1656 BBBE.tmp 91 PID 1656 wrote to memory of 2344 1656 BBBE.tmp 91 PID 1656 wrote to memory of 2344 1656 BBBE.tmp 91 PID 2344 wrote to memory of 4172 2344 BC7A.tmp 92 PID 2344 wrote to memory of 4172 2344 BC7A.tmp 92 PID 2344 wrote to memory of 4172 2344 BC7A.tmp 92 PID 4172 wrote to memory of 2032 4172 BD26.tmp 93 PID 4172 wrote to memory of 2032 4172 BD26.tmp 93 PID 4172 wrote to memory of 2032 4172 BD26.tmp 93 PID 2032 wrote to memory of 4728 2032 BDE1.tmp 94 PID 2032 wrote to memory of 4728 2032 BDE1.tmp 94 PID 2032 wrote to memory of 4728 2032 BDE1.tmp 94 PID 4728 wrote to memory of 3788 4728 BE9D.tmp 95 PID 4728 wrote to memory of 3788 4728 BE9D.tmp 95 PID 4728 wrote to memory of 3788 4728 BE9D.tmp 95 PID 3788 wrote to memory of 4884 3788 BF49.tmp 96 PID 3788 wrote to memory of 4884 3788 BF49.tmp 96 PID 3788 wrote to memory of 4884 3788 BF49.tmp 96 PID 4884 wrote to memory of 664 4884 BFF4.tmp 97 PID 4884 wrote to memory of 664 4884 BFF4.tmp 97 PID 4884 wrote to memory of 664 4884 BFF4.tmp 97 PID 664 wrote to memory of 3448 664 C081.tmp 98 PID 664 wrote to memory of 3448 664 C081.tmp 98 PID 664 wrote to memory of 3448 664 C081.tmp 98 PID 3448 wrote to memory of 2088 3448 C12D.tmp 99 PID 3448 wrote to memory of 2088 3448 C12D.tmp 99 PID 3448 wrote to memory of 2088 3448 C12D.tmp 99 PID 2088 wrote to memory of 5092 2088 C246.tmp 100 PID 2088 wrote to memory of 5092 2088 C246.tmp 100 PID 2088 wrote to memory of 5092 2088 C246.tmp 100 PID 5092 wrote to memory of 4464 5092 C2E2.tmp 101 PID 5092 wrote to memory of 4464 5092 C2E2.tmp 101 PID 5092 wrote to memory of 4464 5092 C2E2.tmp 101 PID 4464 wrote to memory of 560 4464 C35F.tmp 102 PID 4464 wrote to memory of 560 4464 C35F.tmp 102 PID 4464 wrote to memory of 560 4464 C35F.tmp 102 PID 560 wrote to memory of 5036 560 C40B.tmp 103 PID 560 wrote to memory of 5036 560 C40B.tmp 103 PID 560 wrote to memory of 5036 560 C40B.tmp 103 PID 5036 wrote to memory of 3000 5036 C4B7.tmp 104 PID 5036 wrote to memory of 3000 5036 C4B7.tmp 104 PID 5036 wrote to memory of 3000 5036 C4B7.tmp 104 PID 3000 wrote to memory of 2852 3000 C553.tmp 105 PID 3000 wrote to memory of 2852 3000 C553.tmp 105 PID 3000 wrote to memory of 2852 3000 C553.tmp 105 PID 2852 wrote to memory of 4000 2852 C60F.tmp 108 PID 2852 wrote to memory of 4000 2852 C60F.tmp 108 PID 2852 wrote to memory of 4000 2852 C60F.tmp 108 PID 4000 wrote to memory of 4280 4000 C6AB.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_dd69c4eb5682f0849123dccca8536892_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_dd69c4eb5682f0849123dccca8536892_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\B98C.tmp"C:\Users\Admin\AppData\Local\Temp\B98C.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\BA28.tmp"C:\Users\Admin\AppData\Local\Temp\BA28.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\BB03.tmp"C:\Users\Admin\AppData\Local\Temp\BB03.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"C:\Users\Admin\AppData\Local\Temp\BC7A.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\BD26.tmp"C:\Users\Admin\AppData\Local\Temp\BD26.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\BF49.tmp"C:\Users\Admin\AppData\Local\Temp\BF49.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\BFF4.tmp"C:\Users\Admin\AppData\Local\Temp\BFF4.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\C081.tmp"C:\Users\Admin\AppData\Local\Temp\C081.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\C12D.tmp"C:\Users\Admin\AppData\Local\Temp\C12D.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\C246.tmp"C:\Users\Admin\AppData\Local\Temp\C246.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\C35F.tmp"C:\Users\Admin\AppData\Local\Temp\C35F.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\C40B.tmp"C:\Users\Admin\AppData\Local\Temp\C40B.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\C553.tmp"C:\Users\Admin\AppData\Local\Temp\C553.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\C60F.tmp"C:\Users\Admin\AppData\Local\Temp\C60F.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"C:\Users\Admin\AppData\Local\Temp\C6AB.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\C757.tmp"C:\Users\Admin\AppData\Local\Temp\C757.tmp"23⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\C9B8.tmp"C:\Users\Admin\AppData\Local\Temp\C9B8.tmp"24⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\CA45.tmp"C:\Users\Admin\AppData\Local\Temp\CA45.tmp"25⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\CAE1.tmp"C:\Users\Admin\AppData\Local\Temp\CAE1.tmp"26⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"C:\Users\Admin\AppData\Local\Temp\CB9D.tmp"27⤵
- Executes dropped EXE
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\CC0A.tmp"C:\Users\Admin\AppData\Local\Temp\CC0A.tmp"28⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\CDFE.tmp"C:\Users\Admin\AppData\Local\Temp\CDFE.tmp"29⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"C:\Users\Admin\AppData\Local\Temp\CEBA.tmp"30⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\CF94.tmp"C:\Users\Admin\AppData\Local\Temp\CF94.tmp"31⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\D021.tmp"C:\Users\Admin\AppData\Local\Temp\D021.tmp"32⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"C:\Users\Admin\AppData\Local\Temp\D0AE.tmp"33⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\D14A.tmp"C:\Users\Admin\AppData\Local\Temp\D14A.tmp"34⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"C:\Users\Admin\AppData\Local\Temp\D1E6.tmp"35⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\D263.tmp"C:\Users\Admin\AppData\Local\Temp\D263.tmp"36⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\D2F0.tmp"C:\Users\Admin\AppData\Local\Temp\D2F0.tmp"37⤵
- Executes dropped EXE
PID:380 -
C:\Users\Admin\AppData\Local\Temp\D34E.tmp"C:\Users\Admin\AppData\Local\Temp\D34E.tmp"38⤵
- Executes dropped EXE
PID:860 -
C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"C:\Users\Admin\AppData\Local\Temp\D3CB.tmp"39⤵
- Executes dropped EXE
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\D467.tmp"C:\Users\Admin\AppData\Local\Temp\D467.tmp"40⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\D4E4.tmp"C:\Users\Admin\AppData\Local\Temp\D4E4.tmp"41⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\D551.tmp"C:\Users\Admin\AppData\Local\Temp\D551.tmp"42⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"43⤵
- Executes dropped EXE
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\D716.tmp"C:\Users\Admin\AppData\Local\Temp\D716.tmp"44⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\D7F1.tmp"C:\Users\Admin\AppData\Local\Temp\D7F1.tmp"45⤵
- Executes dropped EXE
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\D87E.tmp"C:\Users\Admin\AppData\Local\Temp\D87E.tmp"46⤵
- Executes dropped EXE
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"C:\Users\Admin\AppData\Local\Temp\D8DB.tmp"47⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\D958.tmp"C:\Users\Admin\AppData\Local\Temp\D958.tmp"48⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\D9C6.tmp"C:\Users\Admin\AppData\Local\Temp\D9C6.tmp"49⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\DA62.tmp"C:\Users\Admin\AppData\Local\Temp\DA62.tmp"50⤵
- Executes dropped EXE
PID:792 -
C:\Users\Admin\AppData\Local\Temp\DACF.tmp"C:\Users\Admin\AppData\Local\Temp\DACF.tmp"51⤵
- Executes dropped EXE
PID:544 -
C:\Users\Admin\AppData\Local\Temp\DB4C.tmp"C:\Users\Admin\AppData\Local\Temp\DB4C.tmp"52⤵
- Executes dropped EXE
PID:904 -
C:\Users\Admin\AppData\Local\Temp\DC95.tmp"C:\Users\Admin\AppData\Local\Temp\DC95.tmp"53⤵
- Executes dropped EXE
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\DD21.tmp"C:\Users\Admin\AppData\Local\Temp\DD21.tmp"54⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\DD9E.tmp"C:\Users\Admin\AppData\Local\Temp\DD9E.tmp"55⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\DE1B.tmp"C:\Users\Admin\AppData\Local\Temp\DE1B.tmp"56⤵
- Executes dropped EXE
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"57⤵
- Executes dropped EXE
PID:560 -
C:\Users\Admin\AppData\Local\Temp\E06D.tmp"C:\Users\Admin\AppData\Local\Temp\E06D.tmp"58⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\E109.tmp"C:\Users\Admin\AppData\Local\Temp\E109.tmp"59⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\E167.tmp"C:\Users\Admin\AppData\Local\Temp\E167.tmp"60⤵
- Executes dropped EXE
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\E1F4.tmp"C:\Users\Admin\AppData\Local\Temp\E1F4.tmp"61⤵
- Executes dropped EXE
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\E280.tmp"C:\Users\Admin\AppData\Local\Temp\E280.tmp"62⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\E30D.tmp"C:\Users\Admin\AppData\Local\Temp\E30D.tmp"63⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\E37A.tmp"C:\Users\Admin\AppData\Local\Temp\E37A.tmp"64⤵
- Executes dropped EXE
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"C:\Users\Admin\AppData\Local\Temp\E3D8.tmp"65⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\E445.tmp"C:\Users\Admin\AppData\Local\Temp\E445.tmp"66⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"67⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\E53F.tmp"C:\Users\Admin\AppData\Local\Temp\E53F.tmp"68⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\E5AD.tmp"C:\Users\Admin\AppData\Local\Temp\E5AD.tmp"69⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\E60A.tmp"C:\Users\Admin\AppData\Local\Temp\E60A.tmp"70⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\E668.tmp"C:\Users\Admin\AppData\Local\Temp\E668.tmp"71⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\E714.tmp"C:\Users\Admin\AppData\Local\Temp\E714.tmp"72⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\E781.tmp"C:\Users\Admin\AppData\Local\Temp\E781.tmp"73⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\E7EF.tmp"C:\Users\Admin\AppData\Local\Temp\E7EF.tmp"74⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\E85C.tmp"C:\Users\Admin\AppData\Local\Temp\E85C.tmp"75⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"76⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\E947.tmp"C:\Users\Admin\AppData\Local\Temp\E947.tmp"77⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\E9B4.tmp"C:\Users\Admin\AppData\Local\Temp\E9B4.tmp"78⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\EA21.tmp"C:\Users\Admin\AppData\Local\Temp\EA21.tmp"79⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\F23F.tmp"C:\Users\Admin\AppData\Local\Temp\F23F.tmp"80⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\FE26.tmp"C:\Users\Admin\AppData\Local\Temp\FE26.tmp"81⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\56A.tmp"C:\Users\Admin\AppData\Local\Temp\56A.tmp"82⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\952.tmp"C:\Users\Admin\AppData\Local\Temp\952.tmp"83⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\E34.tmp"C:\Users\Admin\AppData\Local\Temp\E34.tmp"84⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\14EA.tmp"C:\Users\Admin\AppData\Local\Temp\14EA.tmp"85⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"C:\Users\Admin\AppData\Local\Temp\1BC0.tmp"86⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\1D76.tmp"C:\Users\Admin\AppData\Local\Temp\1D76.tmp"87⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\219C.tmp"C:\Users\Admin\AppData\Local\Temp\219C.tmp"88⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\243C.tmp"C:\Users\Admin\AppData\Local\Temp\243C.tmp"89⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\2769.tmp"C:\Users\Admin\AppData\Local\Temp\2769.tmp"90⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"91⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\2F87.tmp"C:\Users\Admin\AppData\Local\Temp\2F87.tmp"92⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\343A.tmp"C:\Users\Admin\AppData\Local\Temp\343A.tmp"93⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\37F3.tmp"C:\Users\Admin\AppData\Local\Temp\37F3.tmp"94⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\41C7.tmp"C:\Users\Admin\AppData\Local\Temp\41C7.tmp"95⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\489D.tmp"C:\Users\Admin\AppData\Local\Temp\489D.tmp"96⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\4B5C.tmp"C:\Users\Admin\AppData\Local\Temp\4B5C.tmp"97⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\57A1.tmp"C:\Users\Admin\AppData\Local\Temp\57A1.tmp"98⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\6424.tmp"C:\Users\Admin\AppData\Local\Temp\6424.tmp"99⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\6E45.tmp"C:\Users\Admin\AppData\Local\Temp\6E45.tmp"100⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\8018.tmp"C:\Users\Admin\AppData\Local\Temp\8018.tmp"101⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\89BD.tmp"C:\Users\Admin\AppData\Local\Temp\89BD.tmp"102⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\A4A7.tmp"C:\Users\Admin\AppData\Local\Temp\A4A7.tmp"103⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\B34D.tmp"C:\Users\Admin\AppData\Local\Temp\B34D.tmp"104⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\B6E7.tmp"C:\Users\Admin\AppData\Local\Temp\B6E7.tmp"105⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\B87D.tmp"C:\Users\Admin\AppData\Local\Temp\B87D.tmp"106⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\B949.tmp"C:\Users\Admin\AppData\Local\Temp\B949.tmp"107⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\BAFE.tmp"C:\Users\Admin\AppData\Local\Temp\BAFE.tmp"108⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\BC75.tmp"C:\Users\Admin\AppData\Local\Temp\BC75.tmp"109⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\BD5F.tmp"C:\Users\Admin\AppData\Local\Temp\BD5F.tmp"110⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\BDEC.tmp"C:\Users\Admin\AppData\Local\Temp\BDEC.tmp"111⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\BEF6.tmp"C:\Users\Admin\AppData\Local\Temp\BEF6.tmp"112⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\C02E.tmp"C:\Users\Admin\AppData\Local\Temp\C02E.tmp"113⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\C147.tmp"C:\Users\Admin\AppData\Local\Temp\C147.tmp"114⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\C1B5.tmp"C:\Users\Admin\AppData\Local\Temp\C1B5.tmp"115⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\C261.tmp"C:\Users\Admin\AppData\Local\Temp\C261.tmp"116⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\C30D.tmp"C:\Users\Admin\AppData\Local\Temp\C30D.tmp"117⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\C37A.tmp"C:\Users\Admin\AppData\Local\Temp\C37A.tmp"118⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\C3D8.tmp"C:\Users\Admin\AppData\Local\Temp\C3D8.tmp"119⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\C52F.tmp"C:\Users\Admin\AppData\Local\Temp\C52F.tmp"120⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\C5FB.tmp"C:\Users\Admin\AppData\Local\Temp\C5FB.tmp"121⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\C6B6.tmp"C:\Users\Admin\AppData\Local\Temp\C6B6.tmp"122⤵PID:3012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-