Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_332c574978c312639012a4c9dcfac2ff_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_332c574978c312639012a4c9dcfac2ff_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_332c574978c312639012a4c9dcfac2ff_mafia.exe
-
Size
486KB
-
MD5
332c574978c312639012a4c9dcfac2ff
-
SHA1
a4ee30c6515d4e32cdf3baf53a5ba82e56e4b770
-
SHA256
919e70a78119e284221bfd52ef617b917b0d788aebc62fca0170bf16d0e2aac5
-
SHA512
fd1e77aae00627464d0561ec242595da71c50b129dc3892174dbabdc4ef419513990a2b6df4d42b778488c5c27ce7a2793af7b409eaef8ce40cfb3569c45e813
-
SSDEEP
12288:/U5rCOTeiD983xQXMxkRjnUZDyRsNs6YNZ:/UQOJD9qxIqDyRPbN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4912 3D71.tmp 4724 41E6.tmp 4828 438C.tmp 392 4522.tmp 1708 45CE.tmp 5092 4699.tmp 4700 4774.tmp 4492 483F.tmp 5068 49F5.tmp 1488 4D6F.tmp 3988 5222.tmp 3440 53E7.tmp 4824 558D.tmp 3672 5791.tmp 3540 5ABD.tmp 5060 5D6D.tmp 2972 5ED4.tmp 2504 6116.tmp 1800 626E.tmp 2396 650E.tmp 4924 65D9.tmp 4956 683B.tmp 564 6983.tmp 4708 6ACB.tmp 4468 6CA0.tmp 5016 6E94.tmp 3028 6F9D.tmp 2712 7431.tmp 2696 75C7.tmp 3764 778C.tmp 2128 7990.tmp 4728 7B07.tmp 4516 7E53.tmp 1464 8538.tmp 1708 85D5.tmp 5092 87F8.tmp 3352 894F.tmp 2132 8AD6.tmp 4284 8BEF.tmp 1804 8D76.tmp 1020 8F5A.tmp 4876 914E.tmp 348 92F4.tmp 4868 9390.tmp 2728 9527.tmp 4100 964F.tmp 464 97F5.tmp 4232 9892.tmp 1280 99CA.tmp 4500 9A47.tmp 756 9AC4.tmp 2876 9D16.tmp 2800 9DA2.tmp 1352 9E10.tmp 2136 A071.tmp 4204 A0EE.tmp 1632 A16B.tmp 4344 A2E2.tmp 2328 A94B.tmp 788 AA06.tmp 4976 AB10.tmp 3060 ABFA.tmp 5012 AC68.tmp 4164 ACF4.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 4912 3764 2024-01-10_332c574978c312639012a4c9dcfac2ff_mafia.exe 92 PID 3764 wrote to memory of 4912 3764 2024-01-10_332c574978c312639012a4c9dcfac2ff_mafia.exe 92 PID 3764 wrote to memory of 4912 3764 2024-01-10_332c574978c312639012a4c9dcfac2ff_mafia.exe 92 PID 4912 wrote to memory of 4724 4912 3D71.tmp 93 PID 4912 wrote to memory of 4724 4912 3D71.tmp 93 PID 4912 wrote to memory of 4724 4912 3D71.tmp 93 PID 4724 wrote to memory of 4828 4724 41E6.tmp 94 PID 4724 wrote to memory of 4828 4724 41E6.tmp 94 PID 4724 wrote to memory of 4828 4724 41E6.tmp 94 PID 4828 wrote to memory of 392 4828 438C.tmp 95 PID 4828 wrote to memory of 392 4828 438C.tmp 95 PID 4828 wrote to memory of 392 4828 438C.tmp 95 PID 392 wrote to memory of 1708 392 4522.tmp 96 PID 392 wrote to memory of 1708 392 4522.tmp 96 PID 392 wrote to memory of 1708 392 4522.tmp 96 PID 1708 wrote to memory of 5092 1708 45CE.tmp 97 PID 1708 wrote to memory of 5092 1708 45CE.tmp 97 PID 1708 wrote to memory of 5092 1708 45CE.tmp 97 PID 5092 wrote to memory of 4700 5092 4699.tmp 98 PID 5092 wrote to memory of 4700 5092 4699.tmp 98 PID 5092 wrote to memory of 4700 5092 4699.tmp 98 PID 4700 wrote to memory of 4492 4700 4774.tmp 100 PID 4700 wrote to memory of 4492 4700 4774.tmp 100 PID 4700 wrote to memory of 4492 4700 4774.tmp 100 PID 4492 wrote to memory of 5068 4492 483F.tmp 101 PID 4492 wrote to memory of 5068 4492 483F.tmp 101 PID 4492 wrote to memory of 5068 4492 483F.tmp 101 PID 5068 wrote to memory of 1488 5068 49F5.tmp 102 PID 5068 wrote to memory of 1488 5068 49F5.tmp 102 PID 5068 wrote to memory of 1488 5068 49F5.tmp 102 PID 1488 wrote to memory of 3988 1488 4D6F.tmp 103 PID 1488 wrote to memory of 3988 1488 4D6F.tmp 103 PID 1488 wrote to memory of 3988 1488 4D6F.tmp 103 PID 3988 wrote to memory of 3440 3988 5222.tmp 104 PID 3988 wrote to memory of 3440 3988 5222.tmp 104 PID 3988 wrote to memory of 3440 3988 5222.tmp 104 PID 3440 wrote to memory of 4824 3440 53E7.tmp 105 PID 3440 wrote to memory of 4824 3440 53E7.tmp 105 PID 3440 wrote to memory of 4824 3440 53E7.tmp 105 PID 4824 wrote to memory of 3672 4824 558D.tmp 106 PID 4824 wrote to memory of 3672 4824 558D.tmp 106 PID 4824 wrote to memory of 3672 4824 558D.tmp 106 PID 3672 wrote to memory of 3540 3672 5791.tmp 107 PID 3672 wrote to memory of 3540 3672 5791.tmp 107 PID 3672 wrote to memory of 3540 3672 5791.tmp 107 PID 3540 wrote to memory of 5060 3540 5ABD.tmp 109 PID 3540 wrote to memory of 5060 3540 5ABD.tmp 109 PID 3540 wrote to memory of 5060 3540 5ABD.tmp 109 PID 5060 wrote to memory of 2972 5060 5D6D.tmp 110 PID 5060 wrote to memory of 2972 5060 5D6D.tmp 110 PID 5060 wrote to memory of 2972 5060 5D6D.tmp 110 PID 2972 wrote to memory of 2504 2972 5ED4.tmp 112 PID 2972 wrote to memory of 2504 2972 5ED4.tmp 112 PID 2972 wrote to memory of 2504 2972 5ED4.tmp 112 PID 2504 wrote to memory of 1800 2504 6116.tmp 113 PID 2504 wrote to memory of 1800 2504 6116.tmp 113 PID 2504 wrote to memory of 1800 2504 6116.tmp 113 PID 1800 wrote to memory of 2396 1800 626E.tmp 114 PID 1800 wrote to memory of 2396 1800 626E.tmp 114 PID 1800 wrote to memory of 2396 1800 626E.tmp 114 PID 2396 wrote to memory of 4924 2396 650E.tmp 116 PID 2396 wrote to memory of 4924 2396 650E.tmp 116 PID 2396 wrote to memory of 4924 2396 650E.tmp 116 PID 4924 wrote to memory of 4956 4924 65D9.tmp 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_332c574978c312639012a4c9dcfac2ff_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_332c574978c312639012a4c9dcfac2ff_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\3D71.tmp"C:\Users\Admin\AppData\Local\Temp\3D71.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\41E6.tmp"C:\Users\Admin\AppData\Local\Temp\41E6.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\438C.tmp"C:\Users\Admin\AppData\Local\Temp\438C.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\4522.tmp"C:\Users\Admin\AppData\Local\Temp\4522.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\45CE.tmp"C:\Users\Admin\AppData\Local\Temp\45CE.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\4699.tmp"C:\Users\Admin\AppData\Local\Temp\4699.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\4774.tmp"C:\Users\Admin\AppData\Local\Temp\4774.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\483F.tmp"C:\Users\Admin\AppData\Local\Temp\483F.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\49F5.tmp"C:\Users\Admin\AppData\Local\Temp\49F5.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"C:\Users\Admin\AppData\Local\Temp\4D6F.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\5222.tmp"C:\Users\Admin\AppData\Local\Temp\5222.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\53E7.tmp"C:\Users\Admin\AppData\Local\Temp\53E7.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\558D.tmp"C:\Users\Admin\AppData\Local\Temp\558D.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\5791.tmp"C:\Users\Admin\AppData\Local\Temp\5791.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"C:\Users\Admin\AppData\Local\Temp\5D6D.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\5ED4.tmp"C:\Users\Admin\AppData\Local\Temp\5ED4.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\6116.tmp"C:\Users\Admin\AppData\Local\Temp\6116.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\626E.tmp"C:\Users\Admin\AppData\Local\Temp\626E.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\650E.tmp"C:\Users\Admin\AppData\Local\Temp\650E.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\65D9.tmp"C:\Users\Admin\AppData\Local\Temp\65D9.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\683B.tmp"C:\Users\Admin\AppData\Local\Temp\683B.tmp"23⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\6983.tmp"C:\Users\Admin\AppData\Local\Temp\6983.tmp"24⤵
- Executes dropped EXE
PID:564 -
C:\Users\Admin\AppData\Local\Temp\6ACB.tmp"C:\Users\Admin\AppData\Local\Temp\6ACB.tmp"25⤵
- Executes dropped EXE
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"C:\Users\Admin\AppData\Local\Temp\6CA0.tmp"26⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\6E94.tmp"C:\Users\Admin\AppData\Local\Temp\6E94.tmp"27⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\6F9D.tmp"C:\Users\Admin\AppData\Local\Temp\6F9D.tmp"28⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\7431.tmp"C:\Users\Admin\AppData\Local\Temp\7431.tmp"29⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\75C7.tmp"C:\Users\Admin\AppData\Local\Temp\75C7.tmp"30⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\778C.tmp"C:\Users\Admin\AppData\Local\Temp\778C.tmp"31⤵
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\7990.tmp"C:\Users\Admin\AppData\Local\Temp\7990.tmp"32⤵
- Executes dropped EXE
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\7B07.tmp"C:\Users\Admin\AppData\Local\Temp\7B07.tmp"33⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\7E53.tmp"C:\Users\Admin\AppData\Local\Temp\7E53.tmp"34⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\8538.tmp"C:\Users\Admin\AppData\Local\Temp\8538.tmp"35⤵
- Executes dropped EXE
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\85D5.tmp"C:\Users\Admin\AppData\Local\Temp\85D5.tmp"36⤵
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\87F8.tmp"C:\Users\Admin\AppData\Local\Temp\87F8.tmp"37⤵
- Executes dropped EXE
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\894F.tmp"C:\Users\Admin\AppData\Local\Temp\894F.tmp"38⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\8AD6.tmp"C:\Users\Admin\AppData\Local\Temp\8AD6.tmp"39⤵
- Executes dropped EXE
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\8BEF.tmp"C:\Users\Admin\AppData\Local\Temp\8BEF.tmp"40⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\8D76.tmp"C:\Users\Admin\AppData\Local\Temp\8D76.tmp"41⤵
- Executes dropped EXE
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\8F5A.tmp"C:\Users\Admin\AppData\Local\Temp\8F5A.tmp"42⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\914E.tmp"C:\Users\Admin\AppData\Local\Temp\914E.tmp"43⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\92F4.tmp"C:\Users\Admin\AppData\Local\Temp\92F4.tmp"44⤵
- Executes dropped EXE
PID:348 -
C:\Users\Admin\AppData\Local\Temp\9390.tmp"C:\Users\Admin\AppData\Local\Temp\9390.tmp"45⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\9527.tmp"C:\Users\Admin\AppData\Local\Temp\9527.tmp"46⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\964F.tmp"C:\Users\Admin\AppData\Local\Temp\964F.tmp"47⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\97F5.tmp"C:\Users\Admin\AppData\Local\Temp\97F5.tmp"48⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\9892.tmp"C:\Users\Admin\AppData\Local\Temp\9892.tmp"49⤵
- Executes dropped EXE
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\99CA.tmp"C:\Users\Admin\AppData\Local\Temp\99CA.tmp"50⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\9A47.tmp"C:\Users\Admin\AppData\Local\Temp\9A47.tmp"51⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\9AC4.tmp"C:\Users\Admin\AppData\Local\Temp\9AC4.tmp"52⤵
- Executes dropped EXE
PID:756 -
C:\Users\Admin\AppData\Local\Temp\9D16.tmp"C:\Users\Admin\AppData\Local\Temp\9D16.tmp"53⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\9DA2.tmp"C:\Users\Admin\AppData\Local\Temp\9DA2.tmp"54⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\9E10.tmp"C:\Users\Admin\AppData\Local\Temp\9E10.tmp"55⤵
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\A071.tmp"C:\Users\Admin\AppData\Local\Temp\A071.tmp"56⤵
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\A0EE.tmp"C:\Users\Admin\AppData\Local\Temp\A0EE.tmp"57⤵
- Executes dropped EXE
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\A16B.tmp"C:\Users\Admin\AppData\Local\Temp\A16B.tmp"58⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\A2E2.tmp"C:\Users\Admin\AppData\Local\Temp\A2E2.tmp"59⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\A94B.tmp"C:\Users\Admin\AppData\Local\Temp\A94B.tmp"60⤵
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\AA06.tmp"C:\Users\Admin\AppData\Local\Temp\AA06.tmp"61⤵
- Executes dropped EXE
PID:788 -
C:\Users\Admin\AppData\Local\Temp\AB10.tmp"C:\Users\Admin\AppData\Local\Temp\AB10.tmp"62⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\ABFA.tmp"C:\Users\Admin\AppData\Local\Temp\ABFA.tmp"63⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\AC68.tmp"C:\Users\Admin\AppData\Local\Temp\AC68.tmp"64⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\ACF4.tmp"C:\Users\Admin\AppData\Local\Temp\ACF4.tmp"65⤵
- Executes dropped EXE
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\AD71.tmp"C:\Users\Admin\AppData\Local\Temp\AD71.tmp"66⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\AF27.tmp"C:\Users\Admin\AppData\Local\Temp\AF27.tmp"67⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\B06F.tmp"C:\Users\Admin\AppData\Local\Temp\B06F.tmp"68⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\B0FC.tmp"C:\Users\Admin\AppData\Local\Temp\B0FC.tmp"69⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\B169.tmp"C:\Users\Admin\AppData\Local\Temp\B169.tmp"70⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\B1E6.tmp"C:\Users\Admin\AppData\Local\Temp\B1E6.tmp"71⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\B2A1.tmp"C:\Users\Admin\AppData\Local\Temp\B2A1.tmp"72⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\B30F.tmp"C:\Users\Admin\AppData\Local\Temp\B30F.tmp"73⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\B438.tmp"C:\Users\Admin\AppData\Local\Temp\B438.tmp"74⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\B4E4.tmp"C:\Users\Admin\AppData\Local\Temp\B4E4.tmp"75⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\B60C.tmp"C:\Users\Admin\AppData\Local\Temp\B60C.tmp"76⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\B699.tmp"C:\Users\Admin\AppData\Local\Temp\B699.tmp"77⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\B716.tmp"C:\Users\Admin\AppData\Local\Temp\B716.tmp"78⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\B7A3.tmp"C:\Users\Admin\AppData\Local\Temp\B7A3.tmp"79⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\B929.tmp"C:\Users\Admin\AppData\Local\Temp\B929.tmp"80⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\B9D5.tmp"C:\Users\Admin\AppData\Local\Temp\B9D5.tmp"81⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\BA62.tmp"C:\Users\Admin\AppData\Local\Temp\BA62.tmp"82⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\BAFE.tmp"C:\Users\Admin\AppData\Local\Temp\BAFE.tmp"83⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\BBD9.tmp"C:\Users\Admin\AppData\Local\Temp\BBD9.tmp"84⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\BC56.tmp"C:\Users\Admin\AppData\Local\Temp\BC56.tmp"85⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\BDAE.tmp"C:\Users\Admin\AppData\Local\Temp\BDAE.tmp"86⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\BE1B.tmp"C:\Users\Admin\AppData\Local\Temp\BE1B.tmp"87⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\BF15.tmp"C:\Users\Admin\AppData\Local\Temp\BF15.tmp"88⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\BF82.tmp"C:\Users\Admin\AppData\Local\Temp\BF82.tmp"89⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\BFF0.tmp"C:\Users\Admin\AppData\Local\Temp\BFF0.tmp"90⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\C05D.tmp"C:\Users\Admin\AppData\Local\Temp\C05D.tmp"91⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\C196.tmp"C:\Users\Admin\AppData\Local\Temp\C196.tmp"92⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\C34B.tmp"C:\Users\Admin\AppData\Local\Temp\C34B.tmp"93⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\C3D8.tmp"C:\Users\Admin\AppData\Local\Temp\C3D8.tmp"94⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\C57E.tmp"C:\Users\Admin\AppData\Local\Temp\C57E.tmp"95⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\C60A.tmp"C:\Users\Admin\AppData\Local\Temp\C60A.tmp"96⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\C697.tmp"C:\Users\Admin\AppData\Local\Temp\C697.tmp"97⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\C704.tmp"C:\Users\Admin\AppData\Local\Temp\C704.tmp"98⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\C7FE.tmp"C:\Users\Admin\AppData\Local\Temp\C7FE.tmp"99⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\CABD.tmp"C:\Users\Admin\AppData\Local\Temp\CABD.tmp"100⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\CBA8.tmp"C:\Users\Admin\AppData\Local\Temp\CBA8.tmp"101⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\CC25.tmp"C:\Users\Admin\AppData\Local\Temp\CC25.tmp"102⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\CCA2.tmp"C:\Users\Admin\AppData\Local\Temp\CCA2.tmp"103⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\CD3E.tmp"C:\Users\Admin\AppData\Local\Temp\CD3E.tmp"104⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\CE67.tmp"C:\Users\Admin\AppData\Local\Temp\CE67.tmp"105⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\CED4.tmp"C:\Users\Admin\AppData\Local\Temp\CED4.tmp"106⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\CF61.tmp"C:\Users\Admin\AppData\Local\Temp\CF61.tmp"107⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\D099.tmp"C:\Users\Admin\AppData\Local\Temp\D099.tmp"108⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\D116.tmp"C:\Users\Admin\AppData\Local\Temp\D116.tmp"109⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\D1A3.tmp"C:\Users\Admin\AppData\Local\Temp\D1A3.tmp"110⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\D220.tmp"C:\Users\Admin\AppData\Local\Temp\D220.tmp"111⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\D28D.tmp"C:\Users\Admin\AppData\Local\Temp\D28D.tmp"112⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\D424.tmp"C:\Users\Admin\AppData\Local\Temp\D424.tmp"113⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\D4C0.tmp"C:\Users\Admin\AppData\Local\Temp\D4C0.tmp"114⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\D52D.tmp"C:\Users\Admin\AppData\Local\Temp\D52D.tmp"115⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\D618.tmp"C:\Users\Admin\AppData\Local\Temp\D618.tmp"116⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\D721.tmp"C:\Users\Admin\AppData\Local\Temp\D721.tmp"117⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\D7AE.tmp"C:\Users\Admin\AppData\Local\Temp\D7AE.tmp"118⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\D82B.tmp"C:\Users\Admin\AppData\Local\Temp\D82B.tmp"119⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\D898.tmp"C:\Users\Admin\AppData\Local\Temp\D898.tmp"120⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\DB86.tmp"C:\Users\Admin\AppData\Local\Temp\DB86.tmp"121⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\DF7E.tmp"C:\Users\Admin\AppData\Local\Temp\DF7E.tmp"122⤵PID:1820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-