Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_5f6d9c1fe489138cbb9fa7792d192bc2_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_5f6d9c1fe489138cbb9fa7792d192bc2_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_5f6d9c1fe489138cbb9fa7792d192bc2_mafia_JC.exe
-
Size
486KB
-
MD5
5f6d9c1fe489138cbb9fa7792d192bc2
-
SHA1
d0d07109342d437fc53ee03e6f89e51044f9d450
-
SHA256
009d63ee13a81991c644cbb83f3a6bfa6ebbd268112a73faf842205faaf179ae
-
SHA512
d68336f54e370867c7dfc88321e2bcf5045d5e0176c12918a1f85ebab7a200ff15291f9fa0a54d41e9e04aac4e350c0356500fd4d06d8285eba71508f6f3d33c
-
SSDEEP
12288:/U5rCOTeiDKSdIzqIQSOSwbZO4b1DjV9lx7NZ:/UQOJDKSdIzRQZHbZO4bBhpN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4260 9DC6.tmp 1264 9E53.tmp 2044 9EE0.tmp 3820 9F9B.tmp 2200 A028.tmp 1888 A0D4.tmp 3036 A170.tmp 432 A1FD.tmp 2436 A299.tmp 536 A345.tmp 1268 A3C2.tmp 3396 A46E.tmp 4736 A50A.tmp 2808 A5A6.tmp 3828 A642.tmp 560 A6EE.tmp 868 A76B.tmp 1592 A7D9.tmp 3464 A846.tmp 4140 A8D3.tmp 2900 A950.tmp 4184 A9EC.tmp 3824 AAA7.tmp 4152 AB34.tmp 1040 ABA1.tmp 2868 AC0F.tmp 1556 ACBB.tmp 752 AD18.tmp 2444 ADA5.tmp 3196 AE22.tmp 4380 AEBE.tmp 3680 AF5A.tmp 2756 AFF7.tmp 3112 B0E1.tmp 1048 B14E.tmp 1624 B1BC.tmp 636 B239.tmp 4436 B2A6.tmp 5096 B304.tmp 4956 B362.tmp 3652 B3EE.tmp 4228 B46B.tmp 4260 B517.tmp 4016 B5E2.tmp 3992 B65F.tmp 4760 B6DC.tmp 3800 B74A.tmp 1516 B7D6.tmp 2616 B844.tmp 1308 B8B1.tmp 4884 B92E.tmp 2812 B99B.tmp 4972 BA18.tmp 3100 BAA5.tmp 4100 BB32.tmp 2436 BBAF.tmp 4860 BC3B.tmp 64 BCB8.tmp 1740 BD55.tmp 1636 BDD2.tmp 2892 BE4F.tmp 1964 BECC.tmp 2072 BF77.tmp 2904 BFF4.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4128 wrote to memory of 4260 4128 2023-08-25_5f6d9c1fe489138cbb9fa7792d192bc2_mafia_JC.exe 86 PID 4128 wrote to memory of 4260 4128 2023-08-25_5f6d9c1fe489138cbb9fa7792d192bc2_mafia_JC.exe 86 PID 4128 wrote to memory of 4260 4128 2023-08-25_5f6d9c1fe489138cbb9fa7792d192bc2_mafia_JC.exe 86 PID 4260 wrote to memory of 1264 4260 9DC6.tmp 87 PID 4260 wrote to memory of 1264 4260 9DC6.tmp 87 PID 4260 wrote to memory of 1264 4260 9DC6.tmp 87 PID 1264 wrote to memory of 2044 1264 9E53.tmp 88 PID 1264 wrote to memory of 2044 1264 9E53.tmp 88 PID 1264 wrote to memory of 2044 1264 9E53.tmp 88 PID 2044 wrote to memory of 3820 2044 9EE0.tmp 89 PID 2044 wrote to memory of 3820 2044 9EE0.tmp 89 PID 2044 wrote to memory of 3820 2044 9EE0.tmp 89 PID 3820 wrote to memory of 2200 3820 9F9B.tmp 90 PID 3820 wrote to memory of 2200 3820 9F9B.tmp 90 PID 3820 wrote to memory of 2200 3820 9F9B.tmp 90 PID 2200 wrote to memory of 1888 2200 A028.tmp 91 PID 2200 wrote to memory of 1888 2200 A028.tmp 91 PID 2200 wrote to memory of 1888 2200 A028.tmp 91 PID 1888 wrote to memory of 3036 1888 A0D4.tmp 92 PID 1888 wrote to memory of 3036 1888 A0D4.tmp 92 PID 1888 wrote to memory of 3036 1888 A0D4.tmp 92 PID 3036 wrote to memory of 432 3036 A170.tmp 93 PID 3036 wrote to memory of 432 3036 A170.tmp 93 PID 3036 wrote to memory of 432 3036 A170.tmp 93 PID 432 wrote to memory of 2436 432 A1FD.tmp 94 PID 432 wrote to memory of 2436 432 A1FD.tmp 94 PID 432 wrote to memory of 2436 432 A1FD.tmp 94 PID 2436 wrote to memory of 536 2436 A299.tmp 95 PID 2436 wrote to memory of 536 2436 A299.tmp 95 PID 2436 wrote to memory of 536 2436 A299.tmp 95 PID 536 wrote to memory of 1268 536 A345.tmp 96 PID 536 wrote to memory of 1268 536 A345.tmp 96 PID 536 wrote to memory of 1268 536 A345.tmp 96 PID 1268 wrote to memory of 3396 1268 A3C2.tmp 97 PID 1268 wrote to memory of 3396 1268 A3C2.tmp 97 PID 1268 wrote to memory of 3396 1268 A3C2.tmp 97 PID 3396 wrote to memory of 4736 3396 A46E.tmp 98 PID 3396 wrote to memory of 4736 3396 A46E.tmp 98 PID 3396 wrote to memory of 4736 3396 A46E.tmp 98 PID 4736 wrote to memory of 2808 4736 A50A.tmp 99 PID 4736 wrote to memory of 2808 4736 A50A.tmp 99 PID 4736 wrote to memory of 2808 4736 A50A.tmp 99 PID 2808 wrote to memory of 3828 2808 A5A6.tmp 100 PID 2808 wrote to memory of 3828 2808 A5A6.tmp 100 PID 2808 wrote to memory of 3828 2808 A5A6.tmp 100 PID 3828 wrote to memory of 560 3828 A642.tmp 101 PID 3828 wrote to memory of 560 3828 A642.tmp 101 PID 3828 wrote to memory of 560 3828 A642.tmp 101 PID 560 wrote to memory of 868 560 A6EE.tmp 102 PID 560 wrote to memory of 868 560 A6EE.tmp 102 PID 560 wrote to memory of 868 560 A6EE.tmp 102 PID 868 wrote to memory of 1592 868 A76B.tmp 103 PID 868 wrote to memory of 1592 868 A76B.tmp 103 PID 868 wrote to memory of 1592 868 A76B.tmp 103 PID 1592 wrote to memory of 3464 1592 A7D9.tmp 104 PID 1592 wrote to memory of 3464 1592 A7D9.tmp 104 PID 1592 wrote to memory of 3464 1592 A7D9.tmp 104 PID 3464 wrote to memory of 4140 3464 A846.tmp 105 PID 3464 wrote to memory of 4140 3464 A846.tmp 105 PID 3464 wrote to memory of 4140 3464 A846.tmp 105 PID 4140 wrote to memory of 2900 4140 A8D3.tmp 106 PID 4140 wrote to memory of 2900 4140 A8D3.tmp 106 PID 4140 wrote to memory of 2900 4140 A8D3.tmp 106 PID 2900 wrote to memory of 4184 2900 A950.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_5f6d9c1fe489138cbb9fa7792d192bc2_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_5f6d9c1fe489138cbb9fa7792d192bc2_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\9DC6.tmp"C:\Users\Admin\AppData\Local\Temp\9DC6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\9E53.tmp"C:\Users\Admin\AppData\Local\Temp\9E53.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\9F9B.tmp"C:\Users\Admin\AppData\Local\Temp\9F9B.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\A028.tmp"C:\Users\Admin\AppData\Local\Temp\A028.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\A0D4.tmp"C:\Users\Admin\AppData\Local\Temp\A0D4.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\A170.tmp"C:\Users\Admin\AppData\Local\Temp\A170.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\A1FD.tmp"C:\Users\Admin\AppData\Local\Temp\A1FD.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\A299.tmp"C:\Users\Admin\AppData\Local\Temp\A299.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\A345.tmp"C:\Users\Admin\AppData\Local\Temp\A345.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\A3C2.tmp"C:\Users\Admin\AppData\Local\Temp\A3C2.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\A46E.tmp"C:\Users\Admin\AppData\Local\Temp\A46E.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\A50A.tmp"C:\Users\Admin\AppData\Local\Temp\A50A.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"C:\Users\Admin\AppData\Local\Temp\A5A6.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\A642.tmp"C:\Users\Admin\AppData\Local\Temp\A642.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"C:\Users\Admin\AppData\Local\Temp\A6EE.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\A76B.tmp"C:\Users\Admin\AppData\Local\Temp\A76B.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\A7D9.tmp"C:\Users\Admin\AppData\Local\Temp\A7D9.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\A846.tmp"C:\Users\Admin\AppData\Local\Temp\A846.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\A8D3.tmp"C:\Users\Admin\AppData\Local\Temp\A8D3.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\A950.tmp"C:\Users\Admin\AppData\Local\Temp\A950.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\A9EC.tmp"C:\Users\Admin\AppData\Local\Temp\A9EC.tmp"23⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\AAA7.tmp"C:\Users\Admin\AppData\Local\Temp\AAA7.tmp"24⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\AB34.tmp"C:\Users\Admin\AppData\Local\Temp\AB34.tmp"25⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\ABA1.tmp"C:\Users\Admin\AppData\Local\Temp\ABA1.tmp"26⤵
- Executes dropped EXE
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"27⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"28⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\AD18.tmp"C:\Users\Admin\AppData\Local\Temp\AD18.tmp"29⤵
- Executes dropped EXE
PID:752 -
C:\Users\Admin\AppData\Local\Temp\ADA5.tmp"C:\Users\Admin\AppData\Local\Temp\ADA5.tmp"30⤵
- Executes dropped EXE
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\AE22.tmp"C:\Users\Admin\AppData\Local\Temp\AE22.tmp"31⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\AEBE.tmp"C:\Users\Admin\AppData\Local\Temp\AEBE.tmp"32⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\AF5A.tmp"C:\Users\Admin\AppData\Local\Temp\AF5A.tmp"33⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\AFF7.tmp"C:\Users\Admin\AppData\Local\Temp\AFF7.tmp"34⤵
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"C:\Users\Admin\AppData\Local\Temp\B0E1.tmp"35⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\B14E.tmp"C:\Users\Admin\AppData\Local\Temp\B14E.tmp"36⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"37⤵
- Executes dropped EXE
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\B239.tmp"C:\Users\Admin\AppData\Local\Temp\B239.tmp"38⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"39⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\B304.tmp"C:\Users\Admin\AppData\Local\Temp\B304.tmp"40⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\B362.tmp"C:\Users\Admin\AppData\Local\Temp\B362.tmp"41⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"42⤵
- Executes dropped EXE
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\B46B.tmp"C:\Users\Admin\AppData\Local\Temp\B46B.tmp"43⤵
- Executes dropped EXE
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\B517.tmp"C:\Users\Admin\AppData\Local\Temp\B517.tmp"44⤵
- Executes dropped EXE
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\B5E2.tmp"C:\Users\Admin\AppData\Local\Temp\B5E2.tmp"45⤵
- Executes dropped EXE
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\B65F.tmp"C:\Users\Admin\AppData\Local\Temp\B65F.tmp"46⤵
- Executes dropped EXE
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"47⤵
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\B74A.tmp"C:\Users\Admin\AppData\Local\Temp\B74A.tmp"48⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"49⤵
- Executes dropped EXE
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\B844.tmp"C:\Users\Admin\AppData\Local\Temp\B844.tmp"50⤵
- Executes dropped EXE
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"C:\Users\Admin\AppData\Local\Temp\B8B1.tmp"51⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\B92E.tmp"C:\Users\Admin\AppData\Local\Temp\B92E.tmp"52⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\B99B.tmp"C:\Users\Admin\AppData\Local\Temp\B99B.tmp"53⤵
- Executes dropped EXE
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\BA18.tmp"C:\Users\Admin\AppData\Local\Temp\BA18.tmp"54⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\BAA5.tmp"C:\Users\Admin\AppData\Local\Temp\BAA5.tmp"55⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\BB32.tmp"C:\Users\Admin\AppData\Local\Temp\BB32.tmp"56⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\BBAF.tmp"C:\Users\Admin\AppData\Local\Temp\BBAF.tmp"57⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"58⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\BCB8.tmp"C:\Users\Admin\AppData\Local\Temp\BCB8.tmp"59⤵
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\BD55.tmp"C:\Users\Admin\AppData\Local\Temp\BD55.tmp"60⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"61⤵
- Executes dropped EXE
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"C:\Users\Admin\AppData\Local\Temp\BE4F.tmp"62⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\BECC.tmp"C:\Users\Admin\AppData\Local\Temp\BECC.tmp"63⤵
- Executes dropped EXE
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\BF77.tmp"C:\Users\Admin\AppData\Local\Temp\BF77.tmp"64⤵
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\BFF4.tmp"C:\Users\Admin\AppData\Local\Temp\BFF4.tmp"65⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\C091.tmp"C:\Users\Admin\AppData\Local\Temp\C091.tmp"66⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\C11D.tmp"C:\Users\Admin\AppData\Local\Temp\C11D.tmp"67⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\C1BA.tmp"C:\Users\Admin\AppData\Local\Temp\C1BA.tmp"68⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\C237.tmp"C:\Users\Admin\AppData\Local\Temp\C237.tmp"69⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"C:\Users\Admin\AppData\Local\Temp\C2A4.tmp"70⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\C321.tmp"C:\Users\Admin\AppData\Local\Temp\C321.tmp"71⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\C3BD.tmp"C:\Users\Admin\AppData\Local\Temp\C3BD.tmp"72⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\C44A.tmp"C:\Users\Admin\AppData\Local\Temp\C44A.tmp"73⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\C4E6.tmp"C:\Users\Admin\AppData\Local\Temp\C4E6.tmp"74⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\C563.tmp"C:\Users\Admin\AppData\Local\Temp\C563.tmp"75⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\C5D0.tmp"C:\Users\Admin\AppData\Local\Temp\C5D0.tmp"76⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\C64D.tmp"C:\Users\Admin\AppData\Local\Temp\C64D.tmp"77⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\C6DA.tmp"C:\Users\Admin\AppData\Local\Temp\C6DA.tmp"78⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\C757.tmp"C:\Users\Admin\AppData\Local\Temp\C757.tmp"79⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\C7D4.tmp"C:\Users\Admin\AppData\Local\Temp\C7D4.tmp"80⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\C851.tmp"C:\Users\Admin\AppData\Local\Temp\C851.tmp"81⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\C8DE.tmp"C:\Users\Admin\AppData\Local\Temp\C8DE.tmp"82⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\C95B.tmp"C:\Users\Admin\AppData\Local\Temp\C95B.tmp"83⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\C9D8.tmp"C:\Users\Admin\AppData\Local\Temp\C9D8.tmp"84⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\CA35.tmp"C:\Users\Admin\AppData\Local\Temp\CA35.tmp"85⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\CAA3.tmp"C:\Users\Admin\AppData\Local\Temp\CAA3.tmp"86⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\CB20.tmp"C:\Users\Admin\AppData\Local\Temp\CB20.tmp"87⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\CB7E.tmp"C:\Users\Admin\AppData\Local\Temp\CB7E.tmp"88⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"C:\Users\Admin\AppData\Local\Temp\CC1A.tmp"89⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\CCA6.tmp"C:\Users\Admin\AppData\Local\Temp\CCA6.tmp"90⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\CD33.tmp"C:\Users\Admin\AppData\Local\Temp\CD33.tmp"91⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"92⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"C:\Users\Admin\AppData\Local\Temp\CE0E.tmp"93⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"C:\Users\Admin\AppData\Local\Temp\CE8B.tmp"94⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"C:\Users\Admin\AppData\Local\Temp\CEF8.tmp"95⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\CF85.tmp"C:\Users\Admin\AppData\Local\Temp\CF85.tmp"96⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"C:\Users\Admin\AppData\Local\Temp\CFF2.tmp"97⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\DD21.tmp"C:\Users\Admin\AppData\Local\Temp\DD21.tmp"98⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\E119.tmp"C:\Users\Admin\AppData\Local\Temp\E119.tmp"99⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"C:\Users\Admin\AppData\Local\Temp\E1D4.tmp"100⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"C:\Users\Admin\AppData\Local\Temp\E4B3.tmp"101⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\E53F.tmp"C:\Users\Admin\AppData\Local\Temp\E53F.tmp"102⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\E82D.tmp"C:\Users\Admin\AppData\Local\Temp\E82D.tmp"103⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"C:\Users\Admin\AppData\Local\Temp\E8CA.tmp"104⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\E9D3.tmp"C:\Users\Admin\AppData\Local\Temp\E9D3.tmp"105⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\EBC7.tmp"C:\Users\Admin\AppData\Local\Temp\EBC7.tmp"106⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\EE09.tmp"C:\Users\Admin\AppData\Local\Temp\EE09.tmp"107⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\EFDE.tmp"C:\Users\Admin\AppData\Local\Temp\EFDE.tmp"108⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\F211.tmp"C:\Users\Admin\AppData\Local\Temp\F211.tmp"109⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\F4C0.tmp"C:\Users\Admin\AppData\Local\Temp\F4C0.tmp"110⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"C:\Users\Admin\AppData\Local\Temp\F7FC.tmp"111⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\FB38.tmp"C:\Users\Admin\AppData\Local\Temp\FB38.tmp"112⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\FD0D.tmp"C:\Users\Admin\AppData\Local\Temp\FD0D.tmp"113⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\FE84.tmp"C:\Users\Admin\AppData\Local\Temp\FE84.tmp"114⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\2BA.tmp"C:\Users\Admin\AppData\Local\Temp\2BA.tmp"115⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\961.tmp"C:\Users\Admin\AppData\Local\Temp\961.tmp"116⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\9DE.tmp"C:\Users\Admin\AppData\Local\Temp\9DE.tmp"117⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\B94.tmp"C:\Users\Admin\AppData\Local\Temp\B94.tmp"118⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\D2A.tmp"C:\Users\Admin\AppData\Local\Temp\D2A.tmp"119⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\ED0.tmp"C:\Users\Admin\AppData\Local\Temp\ED0.tmp"120⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\11DD.tmp"C:\Users\Admin\AppData\Local\Temp\11DD.tmp"121⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\18A4.tmp"C:\Users\Admin\AppData\Local\Temp\18A4.tmp"122⤵PID:4116
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-