Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_bbd9d401126d69a7a018ab29480465e5_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-06_bbd9d401126d69a7a018ab29480465e5_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_bbd9d401126d69a7a018ab29480465e5_mafia.exe
-
Size
536KB
-
MD5
bbd9d401126d69a7a018ab29480465e5
-
SHA1
86e0b6b729ce84119bb8cf59c5e3c50c8a6aac59
-
SHA256
61d4734d321ba26666285675e32a4f5cdad28e14bb7451cf3a01b514ede95f8e
-
SHA512
04ae894eb7416a6ad4d08158413ae2a3bdf32feabf27d77fea2dcdd71a1be2457ee8654e9573d4334bfbe357079515f0932e508b61251f4ebc76c8a8fa9d506c
-
SSDEEP
12288:wU5rCOTeiUdV9G42tFjNiwf152dpiUnilJeH2ocIZxVJ0ZT9:wUQOJUVGfQw9AgzjeW1IRJ0ZT9
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1696 E678.tmp 2560 E6F5.tmp 3060 318.tmp 3348 F944.tmp 3180 1316.tmp 5076 EAAE.tmp 3416 146D.tmp 4664 EBE6.tmp 2288 ECA2.tmp 1420 ED3E.tmp 4204 ED9C.tmp 3456 EE09.tmp 4864 EE86.tmp 4832 EEE4.tmp 4816 971.tmp 4136 svchost.exe 2372 F00D.tmp 3512 FEC3.tmp 5104 F174.tmp 3580 F201.tmp 3876 F25F.tmp 1228 F2FB.tmp 2236 F359.tmp 1508 F3E5.tmp 1432 F453.tmp 1864 F4B0.tmp 3568 F52D.tmp 4416 F5BA.tmp 4892 F666.tmp 2768 F6B4.tmp 3660 F731.tmp 4956 376.tmp 2576 F86A.tmp 1088 F8E7.tmp 3348 F944.tmp 1548 F9B2.tmp 4912 15E4.tmp 4144 73E.tmp 4240 FB19.tmp 1856 FC52.tmp 640 FCBF.tmp 3452 FD5B.tmp 1484 TrustedInstaller.exe 4008 FE65.tmp 3512 FEC3.tmp 2300 B84.tmp 4420 FF8E.tmp 3692 C8E.tmp 3504 D1A.tmp 652 EEF.tmp 3736 182.tmp 2544 23D.tmp 4124 2BA.tmp 3060 318.tmp 4956 376.tmp 3652 3F3.tmp 4432 460.tmp 4276 4ED.tmp 3900 56A.tmp 1632 1519.tmp 4912 15E4.tmp 4144 73E.tmp 4684 7CB.tmp 4496 848.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1696 1860 2024-01-06_bbd9d401126d69a7a018ab29480465e5_mafia.exe 87 PID 1860 wrote to memory of 1696 1860 2024-01-06_bbd9d401126d69a7a018ab29480465e5_mafia.exe 87 PID 1860 wrote to memory of 1696 1860 2024-01-06_bbd9d401126d69a7a018ab29480465e5_mafia.exe 87 PID 1696 wrote to memory of 2560 1696 E678.tmp 88 PID 1696 wrote to memory of 2560 1696 E678.tmp 88 PID 1696 wrote to memory of 2560 1696 E678.tmp 88 PID 2560 wrote to memory of 3060 2560 E6F5.tmp 138 PID 2560 wrote to memory of 3060 2560 E6F5.tmp 138 PID 2560 wrote to memory of 3060 2560 E6F5.tmp 138 PID 3060 wrote to memory of 3348 3060 318.tmp 109 PID 3060 wrote to memory of 3348 3060 318.tmp 109 PID 3060 wrote to memory of 3348 3060 318.tmp 109 PID 3348 wrote to memory of 3180 3348 F944.tmp 176 PID 3348 wrote to memory of 3180 3348 F944.tmp 176 PID 3348 wrote to memory of 3180 3348 F944.tmp 176 PID 3180 wrote to memory of 5076 3180 1316.tmp 183 PID 3180 wrote to memory of 5076 3180 1316.tmp 183 PID 3180 wrote to memory of 5076 3180 1316.tmp 183 PID 5076 wrote to memory of 3416 5076 EAAE.tmp 180 PID 5076 wrote to memory of 3416 5076 EAAE.tmp 180 PID 5076 wrote to memory of 3416 5076 EAAE.tmp 180 PID 3416 wrote to memory of 4664 3416 146D.tmp 182 PID 3416 wrote to memory of 4664 3416 146D.tmp 182 PID 3416 wrote to memory of 4664 3416 146D.tmp 182 PID 4664 wrote to memory of 2288 4664 EBE6.tmp 96 PID 4664 wrote to memory of 2288 4664 EBE6.tmp 96 PID 4664 wrote to memory of 2288 4664 EBE6.tmp 96 PID 2288 wrote to memory of 1420 2288 ECA2.tmp 181 PID 2288 wrote to memory of 1420 2288 ECA2.tmp 181 PID 2288 wrote to memory of 1420 2288 ECA2.tmp 181 PID 1420 wrote to memory of 4204 1420 ED3E.tmp 97 PID 1420 wrote to memory of 4204 1420 ED3E.tmp 97 PID 1420 wrote to memory of 4204 1420 ED3E.tmp 97 PID 4204 wrote to memory of 3456 4204 ED9C.tmp 179 PID 4204 wrote to memory of 3456 4204 ED9C.tmp 179 PID 4204 wrote to memory of 3456 4204 ED9C.tmp 179 PID 3456 wrote to memory of 4864 3456 EE09.tmp 175 PID 3456 wrote to memory of 4864 3456 EE09.tmp 175 PID 3456 wrote to memory of 4864 3456 EE09.tmp 175 PID 4864 wrote to memory of 4832 4864 EE86.tmp 172 PID 4864 wrote to memory of 4832 4864 EE86.tmp 172 PID 4864 wrote to memory of 4832 4864 EE86.tmp 172 PID 4832 wrote to memory of 4816 4832 EEE4.tmp 152 PID 4832 wrote to memory of 4816 4832 EEE4.tmp 152 PID 4832 wrote to memory of 4816 4832 EEE4.tmp 152 PID 4816 wrote to memory of 4136 4816 971.tmp 129 PID 4816 wrote to memory of 4136 4816 971.tmp 129 PID 4816 wrote to memory of 4136 4816 971.tmp 129 PID 4136 wrote to memory of 2372 4136 svchost.exe 100 PID 4136 wrote to memory of 2372 4136 svchost.exe 100 PID 4136 wrote to memory of 2372 4136 svchost.exe 100 PID 2372 wrote to memory of 3512 2372 F00D.tmp 128 PID 2372 wrote to memory of 3512 2372 F00D.tmp 128 PID 2372 wrote to memory of 3512 2372 F00D.tmp 128 PID 3512 wrote to memory of 5104 3512 FEC3.tmp 102 PID 3512 wrote to memory of 5104 3512 FEC3.tmp 102 PID 3512 wrote to memory of 5104 3512 FEC3.tmp 102 PID 5104 wrote to memory of 3580 5104 F174.tmp 158 PID 5104 wrote to memory of 3580 5104 F174.tmp 158 PID 5104 wrote to memory of 3580 5104 F174.tmp 158 PID 3580 wrote to memory of 3876 3580 F201.tmp 153 PID 3580 wrote to memory of 3876 3580 F201.tmp 153 PID 3580 wrote to memory of 3876 3580 F201.tmp 153 PID 3876 wrote to memory of 1228 3876 F25F.tmp 149
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_bbd9d401126d69a7a018ab29480465e5_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_bbd9d401126d69a7a018ab29480465e5_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\E678.tmp"C:\Users\Admin\AppData\Local\Temp\E678.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\E6F5.tmp"C:\Users\Admin\AppData\Local\Temp\E6F5.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\E7FE.tmp"C:\Users\Admin\AppData\Local\Temp\E7FE.tmp"4⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"5⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\EA21.tmp"C:\Users\Admin\AppData\Local\Temp\EA21.tmp"6⤵PID:3180
-
-
-
C:\Users\Admin\AppData\Local\Temp\376.tmp"C:\Users\Admin\AppData\Local\Temp\376.tmp"5⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\3F3.tmp"C:\Users\Admin\AppData\Local\Temp\3F3.tmp"6⤵
- Executes dropped EXE
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\460.tmp"C:\Users\Admin\AppData\Local\Temp\460.tmp"7⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\4ED.tmp"C:\Users\Admin\AppData\Local\Temp\4ED.tmp"8⤵
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\56A.tmp"C:\Users\Admin\AppData\Local\Temp\56A.tmp"9⤵
- Executes dropped EXE
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\5F6.tmp"C:\Users\Admin\AppData\Local\Temp\5F6.tmp"10⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\6D1.tmp"C:\Users\Admin\AppData\Local\Temp\6D1.tmp"11⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\73E.tmp"C:\Users\Admin\AppData\Local\Temp\73E.tmp"12⤵
- Executes dropped EXE
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\7CB.tmp"C:\Users\Admin\AppData\Local\Temp\7CB.tmp"13⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\848.tmp"C:\Users\Admin\AppData\Local\Temp\848.tmp"14⤵
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\8F4.tmp"C:\Users\Admin\AppData\Local\Temp\8F4.tmp"15⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\971.tmp"C:\Users\Admin\AppData\Local\Temp\971.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\9FE.tmp"C:\Users\Admin\AppData\Local\Temp\9FE.tmp"17⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\A7B.tmp"C:\Users\Admin\AppData\Local\Temp\A7B.tmp"18⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\AF8.tmp"C:\Users\Admin\AppData\Local\Temp\AF8.tmp"19⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\B84.tmp"C:\Users\Admin\AppData\Local\Temp\B84.tmp"20⤵
- Executes dropped EXE
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\BF2.tmp"C:\Users\Admin\AppData\Local\Temp\BF2.tmp"21⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\C8E.tmp"C:\Users\Admin\AppData\Local\Temp\C8E.tmp"22⤵
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\D1A.tmp"C:\Users\Admin\AppData\Local\Temp\D1A.tmp"23⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\D97.tmp"C:\Users\Admin\AppData\Local\Temp\D97.tmp"24⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\E24.tmp"C:\Users\Admin\AppData\Local\Temp\E24.tmp"25⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\E91.tmp"C:\Users\Admin\AppData\Local\Temp\E91.tmp"26⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\EEF.tmp"C:\Users\Admin\AppData\Local\Temp\EEF.tmp"27⤵
- Executes dropped EXE
PID:652 -
C:\Users\Admin\AppData\Local\Temp\F5D.tmp"C:\Users\Admin\AppData\Local\Temp\F5D.tmp"28⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\FCA.tmp"C:\Users\Admin\AppData\Local\Temp\FCA.tmp"29⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\1057.tmp"C:\Users\Admin\AppData\Local\Temp\1057.tmp"30⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\10D4.tmp"C:\Users\Admin\AppData\Local\Temp\10D4.tmp"31⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\119F.tmp"C:\Users\Admin\AppData\Local\Temp\119F.tmp"32⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\120C.tmp"C:\Users\Admin\AppData\Local\Temp\120C.tmp"33⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\1316.tmp"C:\Users\Admin\AppData\Local\Temp\1316.tmp"34⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\1393.tmp"C:\Users\Admin\AppData\Local\Temp\1393.tmp"35⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\1400.tmp"C:\Users\Admin\AppData\Local\Temp\1400.tmp"36⤵PID:724
-
C:\Users\Admin\AppData\Local\Temp\146D.tmp"C:\Users\Admin\AppData\Local\Temp\146D.tmp"37⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\EBE6.tmp"C:\Users\Admin\AppData\Local\Temp\EBE6.tmp"38⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\1519.tmp"C:\Users\Admin\AppData\Local\Temp\1519.tmp"38⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\15E4.tmp"C:\Users\Admin\AppData\Local\Temp\15E4.tmp"39⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\1633.tmp"C:\Users\Admin\AppData\Local\Temp\1633.tmp"40⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\16A0.tmp"C:\Users\Admin\AppData\Local\Temp\16A0.tmp"41⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\16FE.tmp"C:\Users\Admin\AppData\Local\Temp\16FE.tmp"42⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\177B.tmp"C:\Users\Admin\AppData\Local\Temp\177B.tmp"43⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\17D8.tmp"C:\Users\Admin\AppData\Local\Temp\17D8.tmp"44⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\1855.tmp"C:\Users\Admin\AppData\Local\Temp\1855.tmp"45⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\18E2.tmp"C:\Users\Admin\AppData\Local\Temp\18E2.tmp"46⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\1940.tmp"C:\Users\Admin\AppData\Local\Temp\1940.tmp"47⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\1A1B.tmp"C:\Users\Admin\AppData\Local\Temp\1A1B.tmp"48⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\1A98.tmp"C:\Users\Admin\AppData\Local\Temp\1A98.tmp"49⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"C:\Users\Admin\AppData\Local\Temp\1AF5.tmp"50⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\1F99.tmp"C:\Users\Admin\AppData\Local\Temp\1F99.tmp"51⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\2006.tmp"C:\Users\Admin\AppData\Local\Temp\2006.tmp"52⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\2083.tmp"C:\Users\Admin\AppData\Local\Temp\2083.tmp"53⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\2110.tmp"C:\Users\Admin\AppData\Local\Temp\2110.tmp"54⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\21DB.tmp"C:\Users\Admin\AppData\Local\Temp\21DB.tmp"55⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\2239.tmp"C:\Users\Admin\AppData\Local\Temp\2239.tmp"56⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"C:\Users\Admin\AppData\Local\Temp\2AD4.tmp"57⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\317B.tmp"C:\Users\Admin\AppData\Local\Temp\317B.tmp"58⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\31F8.tmp"C:\Users\Admin\AppData\Local\Temp\31F8.tmp"59⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"60⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\3F75.tmp"C:\Users\Admin\AppData\Local\Temp\3F75.tmp"61⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\4179.tmp"C:\Users\Admin\AppData\Local\Temp\4179.tmp"62⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\41C7.tmp"C:\Users\Admin\AppData\Local\Temp\41C7.tmp"63⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\4428.tmp"C:\Users\Admin\AppData\Local\Temp\4428.tmp"64⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\4486.tmp"C:\Users\Admin\AppData\Local\Temp\4486.tmp"65⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\45BE.tmp"C:\Users\Admin\AppData\Local\Temp\45BE.tmp"66⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\461C.tmp"C:\Users\Admin\AppData\Local\Temp\461C.tmp"67⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\468A.tmp"C:\Users\Admin\AppData\Local\Temp\468A.tmp"68⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\4716.tmp"C:\Users\Admin\AppData\Local\Temp\4716.tmp"69⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\4784.tmp"C:\Users\Admin\AppData\Local\Temp\4784.tmp"70⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\47F1.tmp"C:\Users\Admin\AppData\Local\Temp\47F1.tmp"71⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\485E.tmp"C:\Users\Admin\AppData\Local\Temp\485E.tmp"72⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\48BC.tmp"C:\Users\Admin\AppData\Local\Temp\48BC.tmp"73⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\491A.tmp"C:\Users\Admin\AppData\Local\Temp\491A.tmp"74⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\4987.tmp"C:\Users\Admin\AppData\Local\Temp\4987.tmp"75⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\4A04.tmp"C:\Users\Admin\AppData\Local\Temp\4A04.tmp"76⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\4A52.tmp"C:\Users\Admin\AppData\Local\Temp\4A52.tmp"77⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\4BBA.tmp"C:\Users\Admin\AppData\Local\Temp\4BBA.tmp"78⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\4C66.tmp"C:\Users\Admin\AppData\Local\Temp\4C66.tmp"79⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\50CB.tmp"C:\Users\Admin\AppData\Local\Temp\50CB.tmp"80⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\51E4.tmp"C:\Users\Admin\AppData\Local\Temp\51E4.tmp"81⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\5261.tmp"C:\Users\Admin\AppData\Local\Temp\5261.tmp"82⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\52DE.tmp"C:\Users\Admin\AppData\Local\Temp\52DE.tmp"83⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\534B.tmp"C:\Users\Admin\AppData\Local\Temp\534B.tmp"84⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\53A9.tmp"C:\Users\Admin\AppData\Local\Temp\53A9.tmp"85⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\5426.tmp"C:\Users\Admin\AppData\Local\Temp\5426.tmp"86⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\5493.tmp"C:\Users\Admin\AppData\Local\Temp\5493.tmp"87⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\557E.tmp"C:\Users\Admin\AppData\Local\Temp\557E.tmp"88⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\55EB.tmp"C:\Users\Admin\AppData\Local\Temp\55EB.tmp"89⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\5658.tmp"C:\Users\Admin\AppData\Local\Temp\5658.tmp"90⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\56C6.tmp"C:\Users\Admin\AppData\Local\Temp\56C6.tmp"91⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\5724.tmp"C:\Users\Admin\AppData\Local\Temp\5724.tmp"92⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\6760.tmp"C:\Users\Admin\AppData\Local\Temp\6760.tmp"93⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\76A2.tmp"C:\Users\Admin\AppData\Local\Temp\76A2.tmp"94⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\7896.tmp"C:\Users\Admin\AppData\Local\Temp\7896.tmp"95⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\7FD9.tmp"C:\Users\Admin\AppData\Local\Temp\7FD9.tmp"96⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\86AF.tmp"C:\Users\Admin\AppData\Local\Temp\86AF.tmp"97⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\8C2E.tmp"C:\Users\Admin\AppData\Local\Temp\8C2E.tmp"98⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\9025.tmp"C:\Users\Admin\AppData\Local\Temp\9025.tmp"99⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\9F39.tmp"C:\Users\Admin\AppData\Local\Temp\9F39.tmp"100⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\A350.tmp"C:\Users\Admin\AppData\Local\Temp\A350.tmp"101⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\A61E.tmp"C:\Users\Admin\AppData\Local\Temp\A61E.tmp"102⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\AAE1.tmp"C:\Users\Admin\AppData\Local\Temp\AAE1.tmp"103⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\B438.tmp"C:\Users\Admin\AppData\Local\Temp\B438.tmp"104⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\BC46.tmp"C:\Users\Admin\AppData\Local\Temp\BC46.tmp"105⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\C6A6.tmp"C:\Users\Admin\AppData\Local\Temp\C6A6.tmp"106⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\CF51.tmp"C:\Users\Admin\AppData\Local\Temp\CF51.tmp"107⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\D6B4.tmp"C:\Users\Admin\AppData\Local\Temp\D6B4.tmp"108⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\DF01.tmp"C:\Users\Admin\AppData\Local\Temp\DF01.tmp"109⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\E683.tmp"C:\Users\Admin\AppData\Local\Temp\E683.tmp"110⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\EB36.tmp"C:\Users\Admin\AppData\Local\Temp\EB36.tmp"111⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\EEA1.tmp"C:\Users\Admin\AppData\Local\Temp\EEA1.tmp"112⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\EFAA.tmp"C:\Users\Admin\AppData\Local\Temp\EFAA.tmp"113⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\F085.tmp"C:\Users\Admin\AppData\Local\Temp\F085.tmp"114⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\F18F.tmp"C:\Users\Admin\AppData\Local\Temp\F18F.tmp"115⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\F344.tmp"C:\Users\Admin\AppData\Local\Temp\F344.tmp"116⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\F43E.tmp"C:\Users\Admin\AppData\Local\Temp\F43E.tmp"117⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\F548.tmp"C:\Users\Admin\AppData\Local\Temp\F548.tmp"118⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\F652.tmp"C:\Users\Admin\AppData\Local\Temp\F652.tmp"119⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\F884.tmp"C:\Users\Admin\AppData\Local\Temp\F884.tmp"120⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\F920.tmp"C:\Users\Admin\AppData\Local\Temp\F920.tmp"121⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\F9EB.tmp"C:\Users\Admin\AppData\Local\Temp\F9EB.tmp"122⤵PID:4600
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-